aboutsummaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorJason Zaman <perfinion@gentoo.org>2020-02-15 21:05:46 +0800
committerJason Zaman <perfinion@gentoo.org>2020-02-15 21:05:46 +0800
commit8864fd39c06d9e1583051604895982fa46336c39 (patch)
treee979678ad9ecbd4815a2584844ed43b466ea86a9 /doc
parentaccess_vectors: Remove gentoo-specific unused permissions (diff)
downloadhardened-refpolicy-8864fd39c06d9e1583051604895982fa46336c39.tar.gz
hardened-refpolicy-8864fd39c06d9e1583051604895982fa46336c39.tar.bz2
hardened-refpolicy-8864fd39c06d9e1583051604895982fa46336c39.zip
Update generated files
Signed-off-by: Jason Zaman <perfinion@gentoo.org>
Diffstat (limited to 'doc')
-rw-r--r--doc/policy.xml15944
1 files changed, 8391 insertions, 7553 deletions
diff --git a/doc/policy.xml b/doc/policy.xml
index ad2a05a0..cfdf3253 100644
--- a/doc/policy.xml
+++ b/doc/policy.xml
@@ -953,7 +953,7 @@ Domain prefix to be used.
</summary>
</param>
</template>
-<interface name="cfengine_read_lib_files" lineno="46">
+<interface name="cfengine_read_lib_files" lineno="45">
<summary>
Read cfengine lib files.
</summary>
@@ -963,7 +963,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="cfengine_dontaudit_write_log_files" lineno="66">
+<interface name="cfengine_dontaudit_write_log_files" lineno="65">
<summary>
Do not audit attempts to write
cfengine log files.
@@ -974,7 +974,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="cfengine_admin" lineno="91">
+<interface name="cfengine_admin" lineno="90">
<summary>
All of the rules required to
administrate an cfengine environment.
@@ -2406,7 +2406,7 @@ Domain Allowed Access
</summary>
</param>
</interface>
-<interface name="portage_domtrans_fetch" lineno="235">
+<interface name="portage_domtrans_fetch" lineno="233">
<summary>
Execute tree management functions
(fetching, layman, ...) in the
@@ -2418,7 +2418,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="portage_run_fetch" lineno="264">
+<interface name="portage_run_fetch" lineno="262">
<summary>
Execute tree management functions
(fetching, layman, ...) in the
@@ -2438,7 +2438,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="portage_domtrans_gcc_config" lineno="283">
+<interface name="portage_domtrans_gcc_config" lineno="281">
<summary>
Execute gcc-config in the gcc config domain.
</summary>
@@ -2448,7 +2448,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="portage_run_gcc_config" lineno="310">
+<interface name="portage_run_gcc_config" lineno="308">
<summary>
Execute gcc-config in the gcc config
domain, and allow the specified role
@@ -2466,7 +2466,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="portage_dontaudit_use_fds" lineno="330">
+<interface name="portage_dontaudit_use_fds" lineno="328">
<summary>
Do not audit attempts to use
portage file descriptors.
@@ -2477,7 +2477,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="portage_dontaudit_search_tmp" lineno="349">
+<interface name="portage_dontaudit_search_tmp" lineno="347">
<summary>
Do not audit attempts to search the
portage temporary directories.
@@ -2488,7 +2488,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="portage_dontaudit_rw_tmp_files" lineno="368">
+<interface name="portage_dontaudit_rw_tmp_files" lineno="366">
<summary>
Do not audit attempts to read and write
the portage temporary files.
@@ -2499,7 +2499,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="portage_eselect_module" lineno="393">
+<interface name="portage_eselect_module" lineno="391">
<summary>
Allow the domain to run within an eselect module script.
</summary>
@@ -2509,7 +2509,7 @@ Domain to allow within an eselect module
</summary>
</param>
</interface>
-<interface name="portage_ro_role" lineno="416">
+<interface name="portage_ro_role" lineno="414">
<summary>
Read all portage files
</summary>
@@ -2524,7 +2524,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="portage_read_db" lineno="436">
+<interface name="portage_read_db" lineno="434">
<summary>
Read portage db files
</summary>
@@ -2534,7 +2534,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="portage_read_cache" lineno="456">
+<interface name="portage_read_cache" lineno="454">
<summary>
Read portage cache files
</summary>
@@ -2544,7 +2544,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="portage_read_config" lineno="477">
+<interface name="portage_read_config" lineno="475">
<summary>
Read portage configuration files
</summary>
@@ -2554,7 +2554,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="portage_read_ebuild" lineno="499">
+<interface name="portage_read_ebuild" lineno="497">
<summary>
Read portage ebuild files
</summary>
@@ -2564,7 +2564,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="portage_read_log" lineno="521">
+<interface name="portage_read_log" lineno="519">
<summary>
Read portage log files
</summary>
@@ -2574,7 +2574,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="portage_read_srcrepo" lineno="540">
+<interface name="portage_read_srcrepo" lineno="538">
<summary>
Read portage src repository files
</summary>
@@ -2584,7 +2584,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="portage_dontaudit_write_cache" lineno="562">
+<interface name="portage_dontaudit_write_cache" lineno="560">
<summary>
Do not audit writing portage cache files
</summary>
@@ -3911,7 +3911,7 @@ The user domain associated with the role.
</summary>
</param>
</template>
-<interface name="sudo_sigchld" lineno="184">
+<interface name="sudo_sigchld" lineno="189">
<summary>
Send a SIGCHLD signal to the sudo domain.
</summary>
@@ -4654,7 +4654,7 @@ User domain for the role
</summary>
</param>
</interface>
-<interface name="chromium_rw_tmp_pipes" lineno="57">
+<interface name="chromium_rw_tmp_pipes" lineno="60">
<summary>
Read-write access to Chromiums' temporary fifo files
</summary>
@@ -4664,7 +4664,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="chromium_tmp_filetrans" lineno="86">
+<interface name="chromium_tmp_filetrans" lineno="89">
<summary>
Automatically use the specified type for resources created in chromium's
temporary locations
@@ -4685,7 +4685,7 @@ The name of the resource being created
</summary>
</param>
</interface>
-<interface name="chromium_domtrans" lineno="105">
+<interface name="chromium_domtrans" lineno="108">
<summary>
Execute a domain transition to the chromium domain (chromium_t)
</summary>
@@ -4695,7 +4695,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="chromium_run" lineno="130">
+<interface name="chromium_run" lineno="133">
<summary>
Execute chromium in the chromium domain and allow the specified role to access the chromium domain
</summary>
@@ -4787,6 +4787,52 @@ Domain allowed access.
</param>
</interface>
</module>
+<module name="cryfs" filename="policy/modules/apps/cryfs.if">
+<summary>CryFS and similar other tools which mount encrypted directories using FUSE.</summary>
+<interface name="cryfs_role" lineno="18">
+<summary>
+Role access for CryFS.
+</summary>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<param name="domain">
+<summary>
+User domain for the role.
+</summary>
+</param>
+</interface>
+<tunable name="cryfs_read_generic_user_content" dftval="true">
+<desc>
+<p>
+Grant the cryfs domains read access to generic user content
+</p>
+</desc>
+</tunable>
+<tunable name="cryfs_read_all_user_content" dftval="false">
+<desc>
+<p>
+Grant the cryfs domains read access to all user content
+</p>
+</desc>
+</tunable>
+<tunable name="cryfs_manage_generic_user_content" dftval="false">
+<desc>
+<p>
+Grant the cryfs domains manage rights on generic user content
+</p>
+</desc>
+</tunable>
+<tunable name="cryfs_manage_all_user_content" dftval="false">
+<desc>
+<p>
+Grant the cryfs domains manage rights on all user content
+</p>
+</desc>
+</tunable>
+</module>
<module name="evolution" filename="policy/modules/apps/evolution.if">
<summary>Evolution email client.</summary>
<interface name="evolution_role" lineno="18">
@@ -7313,7 +7359,7 @@ Domain prefix to be used.
</summary>
</param>
</template>
-<template name="qemu_role" lineno="114">
+<template name="qemu_role" lineno="113">
<summary>
Role access for qemu.
</summary>
@@ -7328,7 +7374,7 @@ User domain for the role.
</summary>
</param>
</template>
-<interface name="qemu_domtrans" lineno="135">
+<interface name="qemu_domtrans" lineno="134">
<summary>
Execute a domain transition to run qemu.
</summary>
@@ -7338,7 +7384,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="qemu_exec" lineno="154">
+<interface name="qemu_exec" lineno="153">
<summary>
Execute a qemu in the caller domain.
</summary>
@@ -7348,7 +7394,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qemu_run" lineno="181">
+<interface name="qemu_run" lineno="180">
<summary>
Execute qemu in the qemu domain,
and allow the specified role the
@@ -7366,7 +7412,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="qemu_read_state" lineno="200">
+<interface name="qemu_read_state" lineno="199">
<summary>
Read qemu process state files.
</summary>
@@ -7376,7 +7422,7 @@ Domain to allow access.
</summary>
</param>
</interface>
-<interface name="qemu_setsched" lineno="221">
+<interface name="qemu_setsched" lineno="220">
<summary>
Set qemu scheduler.
</summary>
@@ -7386,7 +7432,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qemu_signal" lineno="239">
+<interface name="qemu_signal" lineno="238">
<summary>
Send generic signals to qemu.
</summary>
@@ -7396,7 +7442,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qemu_kill" lineno="257">
+<interface name="qemu_kill" lineno="256">
<summary>
Send kill signals to qemu.
</summary>
@@ -7406,7 +7452,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qemu_stream_connect" lineno="276">
+<interface name="qemu_stream_connect" lineno="275">
<summary>
Connect to qemu with a unix
domain stream socket.
@@ -7417,7 +7463,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qemu_delete_pid_sock_file" lineno="295">
+<interface name="qemu_delete_pid_sock_file" lineno="294">
<summary>
Unlink qemu socket
</summary>
@@ -7427,7 +7473,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qemu_domtrans_unconfined" lineno="314">
+<interface name="qemu_domtrans_unconfined" lineno="313">
<summary>
Execute a domain transition to
run qemu unconfined.
@@ -7438,7 +7484,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="qemu_manage_tmp_dirs" lineno="334">
+<interface name="qemu_manage_tmp_dirs" lineno="333">
<summary>
Create, read, write, and delete
qemu temporary directories.
@@ -7449,7 +7495,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qemu_manage_tmp_files" lineno="354">
+<interface name="qemu_manage_tmp_files" lineno="353">
<summary>
Create, read, write, and delete
qemu temporary files.
@@ -7460,7 +7506,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="qemu_spec_domtrans" lineno="388">
+<interface name="qemu_spec_domtrans" lineno="387">
<summary>
Execute qemu in a specified domain.
</summary>
@@ -7485,7 +7531,7 @@ Domain to transition to.
</summary>
</param>
</interface>
-<interface name="qemu_entry_type" lineno="408">
+<interface name="qemu_entry_type" lineno="407">
<summary>
Make qemu executable files an
entrypoint for the specified domain.
@@ -7496,7 +7542,7 @@ The domain for which qemu_exec_t is an entrypoint.
</summary>
</param>
</interface>
-<interface name="qemu_rw_pid_sock_files" lineno="428">
+<interface name="qemu_rw_pid_sock_files" lineno="427">
<summary>
Read/write to qemu socket files in /var/run
</summary>
@@ -8679,7 +8725,7 @@ The daemon (osd, mds or mon) for which the rules are created
</summary>
</param>
</template>
-<interface name="ceph_admin" lineno="65">
+<interface name="ceph_admin" lineno="66">
<summary>
Administrative access for Ceph
</summary>
@@ -8694,7 +8740,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="ceph_read_key" lineno="98">
+<interface name="ceph_read_key" lineno="99">
<summary>
Read Ceph key files
</summary>
@@ -9816,7 +9862,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_read_bin_pipes" lineno="269">
+<interface name="corecmd_read_bin_pipes" lineno="265">
<summary>
Read pipes in bin directories.
</summary>
@@ -9826,7 +9872,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_read_bin_sockets" lineno="288">
+<interface name="corecmd_read_bin_sockets" lineno="284">
<summary>
Read named sockets in bin directories.
</summary>
@@ -9836,7 +9882,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_exec_bin" lineno="328">
+<interface name="corecmd_exec_bin" lineno="324">
<summary>
Execute generic programs in bin directories,
in the caller domain.
@@ -9867,7 +9913,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_manage_bin_files" lineno="347">
+<interface name="corecmd_manage_bin_files" lineno="343">
<summary>
Create, read, write, and delete bin files.
</summary>
@@ -9877,7 +9923,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_relabel_bin_files" lineno="366">
+<interface name="corecmd_relabel_bin_files" lineno="362">
<summary>
Relabel to and from the bin type.
</summary>
@@ -9887,7 +9933,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_mmap_bin_files" lineno="385">
+<interface name="corecmd_mmap_bin_files" lineno="381">
<summary>
Mmap a bin file as executable.
</summary>
@@ -9897,7 +9943,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_bin_spec_domtrans" lineno="430">
+<interface name="corecmd_bin_spec_domtrans" lineno="426">
<summary>
Execute a file in a bin directory
in the specified domain but do not
@@ -9933,7 +9979,7 @@ The type of the new process.
</summary>
</param>
</interface>
-<interface name="corecmd_bin_domtrans" lineno="473">
+<interface name="corecmd_bin_domtrans" lineno="469">
<summary>
Execute a file in a bin directory
in the specified domain.
@@ -9967,7 +10013,7 @@ The type of the new process.
</summary>
</param>
</interface>
-<interface name="corecmd_check_exec_shell" lineno="492">
+<interface name="corecmd_check_exec_shell" lineno="488">
<summary>
Check if a shell is executable (DAC-wise).
</summary>
@@ -9977,7 +10023,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_exec_shell" lineno="529">
+<interface name="corecmd_exec_shell" lineno="525">
<summary>
Execute shells in the caller domain.
</summary>
@@ -10005,7 +10051,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_shell_spec_domtrans" lineno="567">
+<interface name="corecmd_shell_spec_domtrans" lineno="563">
<summary>
Execute a shell in the target domain. This
is an explicit transition, requiring the
@@ -10034,7 +10080,7 @@ The type of the shell process.
</summary>
</param>
</interface>
-<interface name="corecmd_shell_domtrans" lineno="601">
+<interface name="corecmd_shell_domtrans" lineno="597">
<summary>
Execute a shell in the specified domain.
</summary>
@@ -10059,7 +10105,7 @@ The type of the shell process.
</summary>
</param>
</interface>
-<interface name="corecmd_exec_chroot" lineno="620">
+<interface name="corecmd_exec_chroot" lineno="616">
<summary>
Execute chroot in the caller domain.
</summary>
@@ -10069,7 +10115,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_getattr_all_executables" lineno="641">
+<interface name="corecmd_getattr_all_executables" lineno="637">
<summary>
Get the attributes of all executable files.
</summary>
@@ -10080,7 +10126,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="corecmd_read_all_executables" lineno="662">
+<interface name="corecmd_read_all_executables" lineno="658">
<summary>
Read all executable files.
</summary>
@@ -10091,7 +10137,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="corecmd_exec_all_executables" lineno="682">
+<interface name="corecmd_exec_all_executables" lineno="678">
<summary>
Execute all executable files.
</summary>
@@ -10102,7 +10148,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="corecmd_dontaudit_exec_all_executables" lineno="703">
+<interface name="corecmd_dontaudit_exec_all_executables" lineno="699">
<summary>
Do not audit attempts to execute all executables.
</summary>
@@ -10112,7 +10158,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corecmd_manage_all_executables" lineno="722">
+<interface name="corecmd_manage_all_executables" lineno="718">
<summary>
Create, read, write, and all executable files.
</summary>
@@ -10123,7 +10169,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="corecmd_relabel_all_executables" lineno="744">
+<interface name="corecmd_relabel_all_executables" lineno="740">
<summary>
Relabel to and from the bin type.
</summary>
@@ -10134,7 +10180,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="corecmd_mmap_all_executables" lineno="764">
+<interface name="corecmd_mmap_all_executables" lineno="760">
<summary>
Mmap all executables as executable.
</summary>
@@ -10144,7 +10190,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_relabel_bin_dirs" lineno="786">
+<interface name="corecmd_relabel_bin_dirs" lineno="782">
<summary>
Relabel to and from the bin type.
</summary>
@@ -10154,7 +10200,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corecmd_relabel_bin_lnk_files" lineno="804">
+<interface name="corecmd_relabel_bin_lnk_files" lineno="800">
<summary>
Relabel to and from the bin type.
</summary>
@@ -11002,7 +11048,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_bind_all_nodes" lineno="1298">
+<interface name="corenet_sctp_bind_all_nodes" lineno="1294">
<summary>
Bind SCTP sockets to all nodes.
</summary>
@@ -11012,7 +11058,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_tcp_sendrecv_generic_port" lineno="1317">
+<interface name="corenet_dontaudit_tcp_sendrecv_generic_port" lineno="1313">
<summary>
Do not audit send and receive TCP network traffic on generic ports.
</summary>
@@ -11022,7 +11068,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_send_generic_port" lineno="1335">
+<interface name="corenet_udp_send_generic_port" lineno="1327">
<summary>
Send UDP network traffic on generic ports.
</summary>
@@ -11032,7 +11078,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_receive_generic_port" lineno="1353">
+<interface name="corenet_udp_receive_generic_port" lineno="1341">
<summary>
Receive UDP network traffic on generic ports.
</summary>
@@ -11042,7 +11088,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_sendrecv_generic_port" lineno="1371">
+<interface name="corenet_udp_sendrecv_generic_port" lineno="1355">
<summary>
Send and receive UDP network traffic on generic ports.
</summary>
@@ -11052,7 +11098,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_bind_generic_port" lineno="1386">
+<interface name="corenet_tcp_bind_generic_port" lineno="1369">
<summary>
Bind TCP sockets to generic ports.
</summary>
@@ -11062,7 +11108,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_tcp_bind_generic_port" lineno="1406">
+<interface name="corenet_dontaudit_tcp_bind_generic_port" lineno="1389">
<summary>
Do not audit bind TCP sockets to generic ports.
</summary>
@@ -11072,7 +11118,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_udp_bind_generic_port" lineno="1424">
+<interface name="corenet_udp_bind_generic_port" lineno="1407">
<summary>
Bind UDP sockets to generic ports.
</summary>
@@ -11082,7 +11128,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_connect_generic_port" lineno="1444">
+<interface name="corenet_tcp_connect_generic_port" lineno="1427">
<summary>
Connect TCP sockets to generic ports.
</summary>
@@ -11092,7 +11138,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_all_ports" lineno="1488">
+<interface name="corenet_tcp_sendrecv_all_ports" lineno="1471">
<summary>
Send and receive TCP network traffic on all ports.
</summary>
@@ -11128,7 +11174,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_all_ports" lineno="1506">
+<interface name="corenet_udp_send_all_ports" lineno="1485">
<summary>
Send UDP network traffic on all ports.
</summary>
@@ -11138,7 +11184,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_bind_generic_port" lineno="1524">
+<interface name="corenet_sctp_bind_generic_port" lineno="1499">
<summary>
Bind SCTP sockets to generic ports.
</summary>
@@ -11148,7 +11194,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_receive_all_ports" lineno="1544">
+<interface name="corenet_udp_receive_all_ports" lineno="1519">
<summary>
Receive UDP network traffic on all ports.
</summary>
@@ -11158,7 +11204,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_sendrecv_all_ports" lineno="1586">
+<interface name="corenet_udp_sendrecv_all_ports" lineno="1557">
<summary>
Send and receive UDP network traffic on all ports.
</summary>
@@ -11192,7 +11238,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sctp_bind_generic_port" lineno="1602">
+<interface name="corenet_dontaudit_sctp_bind_generic_port" lineno="1572">
<summary>
Do not audit attempts to bind SCTP
sockets to generic ports.
@@ -11203,7 +11249,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_bind_all_ports" lineno="1620">
+<interface name="corenet_tcp_bind_all_ports" lineno="1590">
<summary>
Bind TCP sockets to all ports.
</summary>
@@ -11213,7 +11259,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_tcp_bind_all_ports" lineno="1639">
+<interface name="corenet_dontaudit_tcp_bind_all_ports" lineno="1609">
<summary>
Do not audit attepts to bind TCP sockets to any ports.
</summary>
@@ -11223,7 +11269,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_udp_bind_all_ports" lineno="1657">
+<interface name="corenet_udp_bind_all_ports" lineno="1627">
<summary>
Bind UDP sockets to all ports.
</summary>
@@ -11233,7 +11279,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_connect_generic_port" lineno="1676">
+<interface name="corenet_sctp_connect_generic_port" lineno="1646">
<summary>
Connect SCTP sockets to generic ports.
</summary>
@@ -11243,7 +11289,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_udp_bind_all_ports" lineno="1694">
+<interface name="corenet_dontaudit_udp_bind_all_ports" lineno="1664">
<summary>
Do not audit attepts to bind UDP sockets to any ports.
</summary>
@@ -11253,7 +11299,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_connect_all_ports" lineno="1740">
+<interface name="corenet_tcp_connect_all_ports" lineno="1710">
<summary>
Connect TCP sockets to all ports.
</summary>
@@ -11291,7 +11337,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="1"/>
</interface>
-<interface name="corenet_dontaudit_tcp_connect_all_ports" lineno="1759">
+<interface name="corenet_dontaudit_tcp_connect_all_ports" lineno="1729">
<summary>
Do not audit attempts to connect TCP sockets
to all ports.
@@ -11302,7 +11348,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_reserved_port" lineno="1777">
+<interface name="corenet_tcp_sendrecv_reserved_port" lineno="1747">
<summary>
Send and receive TCP network traffic on generic reserved ports.
</summary>
@@ -11312,7 +11358,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_send_reserved_port" lineno="1795">
+<interface name="corenet_udp_send_reserved_port" lineno="1761">
<summary>
Send UDP network traffic on generic reserved ports.
</summary>
@@ -11322,7 +11368,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_receive_reserved_port" lineno="1813">
+<interface name="corenet_udp_receive_reserved_port" lineno="1775">
<summary>
Receive UDP network traffic on generic reserved ports.
</summary>
@@ -11332,7 +11378,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_sendrecv_reserved_port" lineno="1831">
+<interface name="corenet_udp_sendrecv_reserved_port" lineno="1789">
<summary>
Send and receive UDP network traffic on generic reserved ports.
</summary>
@@ -11342,7 +11388,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_bind_reserved_port" lineno="1846">
+<interface name="corenet_tcp_bind_reserved_port" lineno="1803">
<summary>
Bind TCP sockets to generic reserved ports.
</summary>
@@ -11352,7 +11398,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_bind_all_ports" lineno="1865">
+<interface name="corenet_sctp_bind_all_ports" lineno="1822">
<summary>
Bind SCTP sockets to all ports.
</summary>
@@ -11362,7 +11408,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_bind_reserved_port" lineno="1884">
+<interface name="corenet_udp_bind_reserved_port" lineno="1841">
<summary>
Bind UDP sockets to generic reserved ports.
</summary>
@@ -11372,7 +11418,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_connect_reserved_port" lineno="1903">
+<interface name="corenet_tcp_connect_reserved_port" lineno="1860">
<summary>
Connect TCP sockets to generic reserved ports.
</summary>
@@ -11382,7 +11428,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_sctp_bind_all_ports" lineno="1921">
+<interface name="corenet_dontaudit_sctp_bind_all_ports" lineno="1878">
<summary>
Do not audit attempts to bind SCTP sockets to any ports.
</summary>
@@ -11392,7 +11438,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_all_reserved_ports" lineno="1939">
+<interface name="corenet_tcp_sendrecv_all_reserved_ports" lineno="1896">
<summary>
Send and receive TCP network traffic on all reserved ports.
</summary>
@@ -11402,7 +11448,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_send_all_reserved_ports" lineno="1957">
+<interface name="corenet_udp_send_all_reserved_ports" lineno="1910">
<summary>
Send UDP network traffic on all reserved ports.
</summary>
@@ -11412,7 +11458,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_receive_all_reserved_ports" lineno="1975">
+<interface name="corenet_udp_receive_all_reserved_ports" lineno="1924">
<summary>
Receive UDP network traffic on all reserved ports.
</summary>
@@ -11422,7 +11468,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_sendrecv_all_reserved_ports" lineno="1993">
+<interface name="corenet_udp_sendrecv_all_reserved_ports" lineno="1938">
<summary>
Send and receive UDP network traffic on all reserved ports.
</summary>
@@ -11432,7 +11478,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_connect_all_ports" lineno="2008">
+<interface name="corenet_sctp_connect_all_ports" lineno="1952">
<summary>
Connect SCTP sockets to all ports.
</summary>
@@ -11442,7 +11488,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_bind_all_reserved_ports" lineno="2026">
+<interface name="corenet_tcp_bind_all_reserved_ports" lineno="1970">
<summary>
Bind TCP sockets to all reserved ports.
</summary>
@@ -11452,7 +11498,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_tcp_bind_all_reserved_ports" lineno="2045">
+<interface name="corenet_dontaudit_tcp_bind_all_reserved_ports" lineno="1989">
<summary>
Do not audit attempts to bind TCP sockets to all reserved ports.
</summary>
@@ -11462,7 +11508,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_udp_bind_all_reserved_ports" lineno="2063">
+<interface name="corenet_udp_bind_all_reserved_ports" lineno="2007">
<summary>
Bind UDP sockets to all reserved ports.
</summary>
@@ -11472,7 +11518,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_udp_bind_all_reserved_ports" lineno="2082">
+<interface name="corenet_dontaudit_udp_bind_all_reserved_ports" lineno="2026">
<summary>
Do not audit attempts to bind UDP sockets to all reserved ports.
</summary>
@@ -11482,7 +11528,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_sctp_connect_all_ports" lineno="2101">
+<interface name="corenet_dontaudit_sctp_connect_all_ports" lineno="2045">
<summary>
Do not audit attempts to connect SCTP sockets
to all ports.
@@ -11493,7 +11539,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_bind_all_unreserved_ports" lineno="2119">
+<interface name="corenet_tcp_bind_all_unreserved_ports" lineno="2063">
<summary>
Bind TCP sockets to all ports > 1024.
</summary>
@@ -11503,7 +11549,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_bind_all_unreserved_ports" lineno="2137">
+<interface name="corenet_udp_bind_all_unreserved_ports" lineno="2081">
<summary>
Bind UDP sockets to all ports > 1024.
</summary>
@@ -11513,7 +11559,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_connect_all_reserved_ports" lineno="2155">
+<interface name="corenet_tcp_connect_all_reserved_ports" lineno="2099">
<summary>
Connect TCP sockets to reserved ports.
</summary>
@@ -11523,7 +11569,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_connect_all_unreserved_ports" lineno="2173">
+<interface name="corenet_sctp_connect_all_unreserved_ports" lineno="2117">
<summary>
Connect SCTP sockets to all ports > 1024.
</summary>
@@ -11533,7 +11579,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_tcp_connect_all_unreserved_ports" lineno="2192">
+<interface name="corenet_dontaudit_tcp_connect_all_unreserved_ports" lineno="2136">
<summary>
Do not audit connect attempts to TCP sockets on
ports greater than 1024.
@@ -11544,7 +11590,7 @@ Domain not to audit access to.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_connect_all_unreserved_ports" lineno="2210">
+<interface name="corenet_tcp_connect_all_unreserved_ports" lineno="2154">
<summary>
Connect TCP sockets to all ports > 1024.
</summary>
@@ -11554,7 +11600,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_tcp_connect_all_reserved_ports" lineno="2229">
+<interface name="corenet_dontaudit_tcp_connect_all_reserved_ports" lineno="2173">
<summary>
Do not audit attempts to connect TCP sockets
all reserved ports.
@@ -11565,7 +11611,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_connect_all_rpc_ports" lineno="2247">
+<interface name="corenet_tcp_connect_all_rpc_ports" lineno="2191">
<summary>
Connect TCP sockets to rpc ports.
</summary>
@@ -11575,7 +11621,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_tcp_connect_all_rpc_ports" lineno="2266">
+<interface name="corenet_dontaudit_tcp_connect_all_rpc_ports" lineno="2210">
<summary>
Do not audit attempts to connect TCP sockets
all rpc ports.
@@ -11586,7 +11632,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_bind_reserved_port" lineno="2284">
+<interface name="corenet_sctp_bind_reserved_port" lineno="2228">
<summary>
Bind SCTP sockets to generic reserved ports.
</summary>
@@ -11596,7 +11642,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_read_tun_tap_dev" lineno="2303">
+<interface name="corenet_read_tun_tap_dev" lineno="2247">
<summary>
Read the TUN/TAP virtual network device.
</summary>
@@ -11606,7 +11652,7 @@ The domain read allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_write_tun_tap_dev" lineno="2322">
+<interface name="corenet_write_tun_tap_dev" lineno="2266">
<summary>
Write the TUN/TAP virtual network device.
</summary>
@@ -11616,7 +11662,7 @@ The domain allowed write access.
</summary>
</param>
</interface>
-<interface name="corenet_rw_tun_tap_dev" lineno="2341">
+<interface name="corenet_rw_tun_tap_dev" lineno="2285">
<summary>
Read and write the TUN/TAP virtual network device.
</summary>
@@ -11626,7 +11672,7 @@ The domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_connect_reserved_port" lineno="2360">
+<interface name="corenet_sctp_connect_reserved_port" lineno="2304">
<summary>
Connect SCTP sockets to generic reserved ports.
</summary>
@@ -11636,7 +11682,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_rw_tun_tap_dev" lineno="2379">
+<interface name="corenet_dontaudit_rw_tun_tap_dev" lineno="2323">
<summary>
Do not audit attempts to read or write the TUN/TAP
virtual network device.
@@ -11647,7 +11693,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_getattr_ppp_dev" lineno="2397">
+<interface name="corenet_getattr_ppp_dev" lineno="2341">
<summary>
Getattr the point-to-point device.
</summary>
@@ -11657,7 +11703,7 @@ The domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_rw_ppp_dev" lineno="2415">
+<interface name="corenet_rw_ppp_dev" lineno="2359">
<summary>
Read and write the point-to-point device.
</summary>
@@ -11667,7 +11713,7 @@ The domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_bind_all_rpc_ports" lineno="2434">
+<interface name="corenet_tcp_bind_all_rpc_ports" lineno="2378">
<summary>
Bind TCP sockets to all RPC ports.
</summary>
@@ -11677,7 +11723,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_tcp_bind_all_rpc_ports" lineno="2453">
+<interface name="corenet_dontaudit_tcp_bind_all_rpc_ports" lineno="2397">
<summary>
Do not audit attempts to bind TCP sockets to all RPC ports.
</summary>
@@ -11687,7 +11733,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_udp_bind_all_rpc_ports" lineno="2471">
+<interface name="corenet_udp_bind_all_rpc_ports" lineno="2415">
<summary>
Bind UDP sockets to all RPC ports.
</summary>
@@ -11697,7 +11743,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_udp_bind_all_rpc_ports" lineno="2490">
+<interface name="corenet_dontaudit_udp_bind_all_rpc_ports" lineno="2434">
<summary>
Do not audit attempts to bind UDP sockets to all RPC ports.
</summary>
@@ -11707,7 +11753,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_bind_all_reserved_ports" lineno="2508">
+<interface name="corenet_sctp_bind_all_reserved_ports" lineno="2452">
<summary>
Bind SCTP sockets to all reserved ports.
</summary>
@@ -11717,7 +11763,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_recvfrom_netlabel" lineno="2527">
+<interface name="corenet_tcp_recvfrom_netlabel" lineno="2471">
<summary>
Receive TCP packets from a NetLabel connection.
</summary>
@@ -11727,7 +11773,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_recvfrom_unlabeled" lineno="2546">
+<interface name="corenet_tcp_recvfrom_unlabeled" lineno="2490">
<summary>
Receive TCP packets from an unlabled connection.
</summary>
@@ -11737,7 +11783,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_sctp_bind_all_reserved_ports" lineno="2566">
+<interface name="corenet_dontaudit_sctp_bind_all_reserved_ports" lineno="2510">
<summary>
Do not audit attempts to bind SCTP sockets to all reserved ports.
</summary>
@@ -11747,7 +11793,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_tcp_recvfrom_netlabel" lineno="2585">
+<interface name="corenet_dontaudit_tcp_recvfrom_netlabel" lineno="2529">
<summary>
Do not audit attempts to receive TCP packets from a NetLabel
connection.
@@ -11758,7 +11804,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_tcp_recvfrom_unlabeled" lineno="2605">
+<interface name="corenet_dontaudit_tcp_recvfrom_unlabeled" lineno="2549">
<summary>
Do not audit attempts to receive TCP packets from an unlabeled
connection.
@@ -11769,7 +11815,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_udp_recvfrom_netlabel" lineno="2625">
+<interface name="corenet_udp_recvfrom_netlabel" lineno="2569">
<summary>
Receive UDP packets from a NetLabel connection.
</summary>
@@ -11779,7 +11825,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_udp_recvfrom_unlabeled" lineno="2644">
+<interface name="corenet_udp_recvfrom_unlabeled" lineno="2588">
<summary>
Receive UDP packets from an unlabeled connection.
</summary>
@@ -11789,7 +11835,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_bind_all_unreserved_ports" lineno="2664">
+<interface name="corenet_sctp_bind_all_unreserved_ports" lineno="2608">
<summary>
Bind SCTP sockets to all ports > 1024.
</summary>
@@ -11799,7 +11845,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_udp_recvfrom_netlabel" lineno="2683">
+<interface name="corenet_dontaudit_udp_recvfrom_netlabel" lineno="2627">
<summary>
Do not audit attempts to receive UDP packets from a NetLabel
connection.
@@ -11810,7 +11856,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_udp_recvfrom_unlabeled" lineno="2703">
+<interface name="corenet_dontaudit_udp_recvfrom_unlabeled" lineno="2647">
<summary>
Do not audit attempts to receive UDP packets from an unlabeled
connection.
@@ -11821,7 +11867,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_raw_recvfrom_netlabel" lineno="2723">
+<interface name="corenet_raw_recvfrom_netlabel" lineno="2667">
<summary>
Receive Raw IP packets from a NetLabel connection.
</summary>
@@ -11831,7 +11877,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_raw_recvfrom_unlabeled" lineno="2742">
+<interface name="corenet_raw_recvfrom_unlabeled" lineno="2686">
<summary>
Receive Raw IP packets from an unlabeled connection.
</summary>
@@ -11841,7 +11887,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_raw_recvfrom_netlabel" lineno="2763">
+<interface name="corenet_dontaudit_raw_recvfrom_netlabel" lineno="2707">
<summary>
Do not audit attempts to receive Raw IP packets from a NetLabel
connection.
@@ -11852,7 +11898,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_connect_all_reserved_ports" lineno="2782">
+<interface name="corenet_sctp_connect_all_reserved_ports" lineno="2726">
<summary>
Connect SCTP sockets to reserved ports.
</summary>
@@ -11862,7 +11908,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_raw_recvfrom_unlabeled" lineno="2801">
+<interface name="corenet_dontaudit_raw_recvfrom_unlabeled" lineno="2745">
<summary>
Do not audit attempts to receive Raw IP packets from an unlabeled
connection.
@@ -11873,7 +11919,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_all_recvfrom_unlabeled" lineno="2833">
+<interface name="corenet_all_recvfrom_unlabeled" lineno="2777">
<summary>
Receive packets from an unlabeled connection.
</summary>
@@ -11895,7 +11941,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_all_recvfrom_netlabel" lineno="2866">
+<interface name="corenet_all_recvfrom_netlabel" lineno="2810">
<summary>
Receive packets from a NetLabel connection.
</summary>
@@ -11916,7 +11962,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_all_recvfrom_unlabeled" lineno="2885">
+<interface name="corenet_dontaudit_all_recvfrom_unlabeled" lineno="2829">
<summary>
Do not audit attempts to receive packets from an unlabeled connection.
</summary>
@@ -11926,7 +11972,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_sctp_connect_all_reserved_ports" lineno="2908">
+<interface name="corenet_dontaudit_sctp_connect_all_reserved_ports" lineno="2852">
<summary>
Do not audit attempts to connect SCTP sockets
all reserved ports.
@@ -11937,7 +11983,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_dontaudit_all_recvfrom_netlabel" lineno="2927">
+<interface name="corenet_dontaudit_all_recvfrom_netlabel" lineno="2871">
<summary>
Do not audit attempts to receive packets from a NetLabel
connection.
@@ -11948,7 +11994,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_recvfrom_labeled" lineno="2959">
+<interface name="corenet_tcp_recvfrom_labeled" lineno="2903">
<summary>
Rules for receiving labeled TCP packets.
</summary>
@@ -11971,7 +12017,7 @@ Peer domain.
</summary>
</param>
</interface>
-<interface name="corenet_udp_recvfrom_labeled" lineno="2987">
+<interface name="corenet_udp_recvfrom_labeled" lineno="2931">
<summary>
Rules for receiving labeled UDP packets.
</summary>
@@ -11986,7 +12032,7 @@ Peer domain.
</summary>
</param>
</interface>
-<interface name="corenet_raw_recvfrom_labeled" lineno="3012">
+<interface name="corenet_raw_recvfrom_labeled" lineno="2956">
<summary>
Rules for receiving labeled raw IP packets.
</summary>
@@ -12001,7 +12047,7 @@ Peer domain.
</summary>
</param>
</interface>
-<interface name="corenet_all_recvfrom_labeled" lineno="3046">
+<interface name="corenet_all_recvfrom_labeled" lineno="2990">
<summary>
Rules for receiving labeled packets via TCP, UDP and raw IP.
</summary>
@@ -12025,7 +12071,7 @@ Peer domain.
</summary>
</param>
</interface>
-<interface name="corenet_setcontext_all_spds" lineno="3064">
+<interface name="corenet_setcontext_all_spds" lineno="3008">
<summary>
Allow specified type to set the context of
a SPD entry for labeled ipsec associations.
@@ -12036,7 +12082,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_generic_client_packets" lineno="3082">
+<interface name="corenet_send_generic_client_packets" lineno="3026">
<summary>
Send generic client packets.
</summary>
@@ -12046,7 +12092,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_receive_generic_client_packets" lineno="3100">
+<interface name="corenet_receive_generic_client_packets" lineno="3044">
<summary>
Receive generic client packets.
</summary>
@@ -12056,7 +12102,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sendrecv_generic_client_packets" lineno="3118">
+<interface name="corenet_sendrecv_generic_client_packets" lineno="3062">
<summary>
Send and receive generic client packets.
</summary>
@@ -12066,7 +12112,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_relabelto_generic_client_packets" lineno="3133">
+<interface name="corenet_relabelto_generic_client_packets" lineno="3077">
<summary>
Relabel packets to the generic client packet type.
</summary>
@@ -12076,7 +12122,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_generic_server_packets" lineno="3151">
+<interface name="corenet_send_generic_server_packets" lineno="3095">
<summary>
Send generic server packets.
</summary>
@@ -12086,7 +12132,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_receive_generic_server_packets" lineno="3169">
+<interface name="corenet_receive_generic_server_packets" lineno="3113">
<summary>
Receive generic server packets.
</summary>
@@ -12096,7 +12142,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sendrecv_generic_server_packets" lineno="3187">
+<interface name="corenet_sendrecv_generic_server_packets" lineno="3131">
<summary>
Send and receive generic server packets.
</summary>
@@ -12106,7 +12152,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_relabelto_generic_server_packets" lineno="3202">
+<interface name="corenet_relabelto_generic_server_packets" lineno="3146">
<summary>
Relabel packets to the generic server packet type.
</summary>
@@ -12116,7 +12162,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sendrecv_unlabeled_packets" lineno="3227">
+<interface name="corenet_sendrecv_unlabeled_packets" lineno="3171">
<summary>
Send and receive unlabeled packets.
</summary>
@@ -12133,7 +12179,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_all_client_packets" lineno="3241">
+<interface name="corenet_send_all_client_packets" lineno="3185">
<summary>
Send all client packets.
</summary>
@@ -12143,7 +12189,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_receive_all_client_packets" lineno="3259">
+<interface name="corenet_receive_all_client_packets" lineno="3203">
<summary>
Receive all client packets.
</summary>
@@ -12153,7 +12199,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sendrecv_all_client_packets" lineno="3277">
+<interface name="corenet_sendrecv_all_client_packets" lineno="3221">
<summary>
Send and receive all client packets.
</summary>
@@ -12163,7 +12209,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_relabelto_all_client_packets" lineno="3292">
+<interface name="corenet_relabelto_all_client_packets" lineno="3236">
<summary>
Relabel packets to any client packet type.
</summary>
@@ -12173,7 +12219,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_all_server_packets" lineno="3310">
+<interface name="corenet_send_all_server_packets" lineno="3254">
<summary>
Send all server packets.
</summary>
@@ -12183,7 +12229,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_recvfrom_netlabel" lineno="3328">
+<interface name="corenet_sctp_recvfrom_netlabel" lineno="3272">
<summary>
Receive SCTP packets from a NetLabel connection.
</summary>
@@ -12193,7 +12239,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_receive_all_server_packets" lineno="3346">
+<interface name="corenet_receive_all_server_packets" lineno="3290">
<summary>
Receive all server packets.
</summary>
@@ -12203,7 +12249,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sendrecv_all_server_packets" lineno="3364">
+<interface name="corenet_sendrecv_all_server_packets" lineno="3308">
<summary>
Send and receive all server packets.
</summary>
@@ -12213,7 +12259,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_relabelto_all_server_packets" lineno="3379">
+<interface name="corenet_relabelto_all_server_packets" lineno="3323">
<summary>
Relabel packets to any server packet type.
</summary>
@@ -12223,7 +12269,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_recvfrom_unlabeled" lineno="3397">
+<interface name="corenet_sctp_recvfrom_unlabeled" lineno="3341">
<summary>
Receive SCTP packets from an unlabled connection.
</summary>
@@ -12233,7 +12279,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_all_packets" lineno="3418">
+<interface name="corenet_send_all_packets" lineno="3362">
<summary>
Send all packets.
</summary>
@@ -12243,7 +12289,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_receive_all_packets" lineno="3436">
+<interface name="corenet_receive_all_packets" lineno="3380">
<summary>
Receive all packets.
</summary>
@@ -12253,7 +12299,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sendrecv_all_packets" lineno="3454">
+<interface name="corenet_sendrecv_all_packets" lineno="3398">
<summary>
Send and receive all packets.
</summary>
@@ -12263,7 +12309,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_relabelto_all_packets" lineno="3469">
+<interface name="corenet_relabelto_all_packets" lineno="3413">
<summary>
Relabel packets to any packet type.
</summary>
@@ -12273,7 +12319,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_ib_access_unlabeled_pkeys" lineno="3487">
+<interface name="corenet_ib_access_unlabeled_pkeys" lineno="3431">
<summary>
Access unlabeled infiniband pkeys.
</summary>
@@ -12283,7 +12329,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_ib_access_all_pkeys" lineno="3501">
+<interface name="corenet_ib_access_all_pkeys" lineno="3445">
<summary>
Access all labeled infiniband pkeys.
</summary>
@@ -12293,7 +12339,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_ib_manage_subnet_all_endports" lineno="3519">
+<interface name="corenet_ib_manage_subnet_all_endports" lineno="3463">
<summary>
Manage subnets on all labeled Infiniband endports
</summary>
@@ -12303,7 +12349,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_ib_manage_subnet_unlabeled_endports" lineno="3537">
+<interface name="corenet_ib_manage_subnet_unlabeled_endports" lineno="3481">
<summary>
Manage subnet on all unlabeled Infiniband endports
</summary>
@@ -12313,7 +12359,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_sctp_recvfrom_labeled" lineno="3556">
+<interface name="corenet_sctp_recvfrom_labeled" lineno="3500">
<summary>
Rules for receiving labeled SCTP packets.
</summary>
@@ -12328,7 +12374,7 @@ Peer domain.
</summary>
</param>
</interface>
-<interface name="corenet_unconfined" lineno="3579">
+<interface name="corenet_unconfined" lineno="3523">
<summary>
Unconfined access to network objects.
</summary>
@@ -12338,7 +12384,7 @@ The domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_adb_port" lineno="3599">
+<interface name="corenet_tcp_sendrecv_adb_port" lineno="3543">
<summary>
Send and receive TCP traffic on the adb port.
</summary>
@@ -12349,7 +12395,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_adb_port" lineno="3618">
+<interface name="corenet_udp_send_adb_port" lineno="3558">
<summary>
Send UDP traffic on the adb port.
</summary>
@@ -12360,7 +12406,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_adb_port" lineno="3637">
+<interface name="corenet_dontaudit_udp_send_adb_port" lineno="3573">
<summary>
Do not audit attempts to send UDP traffic on the adb port.
</summary>
@@ -12371,7 +12417,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_adb_port" lineno="3656">
+<interface name="corenet_udp_receive_adb_port" lineno="3588">
<summary>
Receive UDP traffic on the adb port.
</summary>
@@ -12382,7 +12428,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_adb_port" lineno="3675">
+<interface name="corenet_dontaudit_udp_receive_adb_port" lineno="3603">
<summary>
Do not audit attempts to receive UDP traffic on the adb port.
</summary>
@@ -12393,7 +12439,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_adb_port" lineno="3694">
+<interface name="corenet_udp_sendrecv_adb_port" lineno="3618">
<summary>
Send and receive UDP traffic on the adb port.
</summary>
@@ -12404,7 +12450,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_adb_port" lineno="3711">
+<interface name="corenet_dontaudit_udp_sendrecv_adb_port" lineno="3634">
<summary>
Do not audit attempts to send and receive
UDP traffic on the adb port.
@@ -12416,7 +12462,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_adb_port" lineno="3727">
+<interface name="corenet_tcp_bind_adb_port" lineno="3649">
<summary>
Bind TCP sockets to the adb port.
</summary>
@@ -12427,7 +12473,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_adb_port" lineno="3747">
+<interface name="corenet_udp_bind_adb_port" lineno="3669">
<summary>
Bind UDP sockets to the adb port.
</summary>
@@ -12438,7 +12484,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_adb_port" lineno="3766">
+<interface name="corenet_tcp_connect_adb_port" lineno="3688">
<summary>
Make a TCP connection to the adb port.
</summary>
@@ -12448,7 +12494,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_adb_client_packets" lineno="3786">
+<interface name="corenet_send_adb_client_packets" lineno="3708">
<summary>
Send adb_client packets.
</summary>
@@ -12459,7 +12505,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3805">
+<interface name="corenet_dontaudit_send_adb_client_packets" lineno="3727">
<summary>
Do not audit attempts to send adb_client packets.
</summary>
@@ -12470,7 +12516,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_adb_client_packets" lineno="3824">
+<interface name="corenet_receive_adb_client_packets" lineno="3746">
<summary>
Receive adb_client packets.
</summary>
@@ -12481,7 +12527,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3843">
+<interface name="corenet_dontaudit_receive_adb_client_packets" lineno="3765">
<summary>
Do not audit attempts to receive adb_client packets.
</summary>
@@ -12492,7 +12538,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_adb_client_packets" lineno="3862">
+<interface name="corenet_sendrecv_adb_client_packets" lineno="3784">
<summary>
Send and receive adb_client packets.
</summary>
@@ -12503,7 +12549,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3878">
+<interface name="corenet_dontaudit_sendrecv_adb_client_packets" lineno="3800">
<summary>
Do not audit attempts to send and receive adb_client packets.
</summary>
@@ -12514,7 +12560,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_adb_client_packets" lineno="3893">
+<interface name="corenet_relabelto_adb_client_packets" lineno="3815">
<summary>
Relabel packets to adb_client the packet type.
</summary>
@@ -12524,7 +12570,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_adb_server_packets" lineno="3913">
+<interface name="corenet_send_adb_server_packets" lineno="3835">
<summary>
Send adb_server packets.
</summary>
@@ -12535,7 +12581,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3932">
+<interface name="corenet_dontaudit_send_adb_server_packets" lineno="3854">
<summary>
Do not audit attempts to send adb_server packets.
</summary>
@@ -12546,7 +12592,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_adb_server_packets" lineno="3951">
+<interface name="corenet_receive_adb_server_packets" lineno="3873">
<summary>
Receive adb_server packets.
</summary>
@@ -12557,7 +12603,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="3970">
+<interface name="corenet_dontaudit_receive_adb_server_packets" lineno="3892">
<summary>
Do not audit attempts to receive adb_server packets.
</summary>
@@ -12568,7 +12614,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_adb_server_packets" lineno="3989">
+<interface name="corenet_sendrecv_adb_server_packets" lineno="3911">
<summary>
Send and receive adb_server packets.
</summary>
@@ -12579,7 +12625,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="4005">
+<interface name="corenet_dontaudit_sendrecv_adb_server_packets" lineno="3927">
<summary>
Do not audit attempts to send and receive adb_server packets.
</summary>
@@ -12590,7 +12636,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_adb_server_packets" lineno="4020">
+<interface name="corenet_relabelto_adb_server_packets" lineno="3942">
<summary>
Relabel packets to adb_server the packet type.
</summary>
@@ -12600,7 +12646,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="4042">
+<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="3964">
<summary>
Send and receive TCP traffic on the afs_bos port.
</summary>
@@ -12611,7 +12657,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_afs_bos_port" lineno="4061">
+<interface name="corenet_udp_send_afs_bos_port" lineno="3979">
<summary>
Send UDP traffic on the afs_bos port.
</summary>
@@ -12622,7 +12668,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="4080">
+<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="3994">
<summary>
Do not audit attempts to send UDP traffic on the afs_bos port.
</summary>
@@ -12633,7 +12679,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_afs_bos_port" lineno="4099">
+<interface name="corenet_udp_receive_afs_bos_port" lineno="4009">
<summary>
Receive UDP traffic on the afs_bos port.
</summary>
@@ -12644,7 +12690,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4118">
+<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4024">
<summary>
Do not audit attempts to receive UDP traffic on the afs_bos port.
</summary>
@@ -12655,7 +12701,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4137">
+<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4039">
<summary>
Send and receive UDP traffic on the afs_bos port.
</summary>
@@ -12666,7 +12712,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4154">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4055">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs_bos port.
@@ -12678,7 +12724,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_afs_bos_port" lineno="4170">
+<interface name="corenet_tcp_bind_afs_bos_port" lineno="4070">
<summary>
Bind TCP sockets to the afs_bos port.
</summary>
@@ -12689,7 +12735,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs_bos_port" lineno="4190">
+<interface name="corenet_udp_bind_afs_bos_port" lineno="4090">
<summary>
Bind UDP sockets to the afs_bos port.
</summary>
@@ -12700,7 +12746,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs_bos_port" lineno="4209">
+<interface name="corenet_tcp_connect_afs_bos_port" lineno="4109">
<summary>
Make a TCP connection to the afs_bos port.
</summary>
@@ -12710,7 +12756,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_bos_client_packets" lineno="4229">
+<interface name="corenet_send_afs_bos_client_packets" lineno="4129">
<summary>
Send afs_bos_client packets.
</summary>
@@ -12721,7 +12767,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4248">
+<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4148">
<summary>
Do not audit attempts to send afs_bos_client packets.
</summary>
@@ -12732,7 +12778,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_bos_client_packets" lineno="4267">
+<interface name="corenet_receive_afs_bos_client_packets" lineno="4167">
<summary>
Receive afs_bos_client packets.
</summary>
@@ -12743,7 +12789,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4286">
+<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4186">
<summary>
Do not audit attempts to receive afs_bos_client packets.
</summary>
@@ -12754,7 +12800,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4305">
+<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4205">
<summary>
Send and receive afs_bos_client packets.
</summary>
@@ -12765,7 +12811,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4321">
+<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4221">
<summary>
Do not audit attempts to send and receive afs_bos_client packets.
</summary>
@@ -12776,7 +12822,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4336">
+<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4236">
<summary>
Relabel packets to afs_bos_client the packet type.
</summary>
@@ -12786,7 +12832,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_bos_server_packets" lineno="4356">
+<interface name="corenet_send_afs_bos_server_packets" lineno="4256">
<summary>
Send afs_bos_server packets.
</summary>
@@ -12797,7 +12843,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4375">
+<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4275">
<summary>
Do not audit attempts to send afs_bos_server packets.
</summary>
@@ -12808,7 +12854,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_bos_server_packets" lineno="4394">
+<interface name="corenet_receive_afs_bos_server_packets" lineno="4294">
<summary>
Receive afs_bos_server packets.
</summary>
@@ -12819,7 +12865,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4413">
+<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4313">
<summary>
Do not audit attempts to receive afs_bos_server packets.
</summary>
@@ -12830,7 +12876,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4432">
+<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="4332">
<summary>
Send and receive afs_bos_server packets.
</summary>
@@ -12841,7 +12887,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4448">
+<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="4348">
<summary>
Do not audit attempts to send and receive afs_bos_server packets.
</summary>
@@ -12852,7 +12898,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4463">
+<interface name="corenet_relabelto_afs_bos_server_packets" lineno="4363">
<summary>
Relabel packets to afs_bos_server the packet type.
</summary>
@@ -12862,7 +12908,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4485">
+<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4385">
<summary>
Send and receive TCP traffic on the afs_fs port.
</summary>
@@ -12873,7 +12919,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_afs_fs_port" lineno="4504">
+<interface name="corenet_udp_send_afs_fs_port" lineno="4400">
<summary>
Send UDP traffic on the afs_fs port.
</summary>
@@ -12884,7 +12930,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4523">
+<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4415">
<summary>
Do not audit attempts to send UDP traffic on the afs_fs port.
</summary>
@@ -12895,7 +12941,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_afs_fs_port" lineno="4542">
+<interface name="corenet_udp_receive_afs_fs_port" lineno="4430">
<summary>
Receive UDP traffic on the afs_fs port.
</summary>
@@ -12906,7 +12952,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4561">
+<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4445">
<summary>
Do not audit attempts to receive UDP traffic on the afs_fs port.
</summary>
@@ -12917,7 +12963,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4580">
+<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4460">
<summary>
Send and receive UDP traffic on the afs_fs port.
</summary>
@@ -12928,7 +12974,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4597">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4476">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs_fs port.
@@ -12940,7 +12986,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_afs_fs_port" lineno="4613">
+<interface name="corenet_tcp_bind_afs_fs_port" lineno="4491">
<summary>
Bind TCP sockets to the afs_fs port.
</summary>
@@ -12951,7 +12997,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs_fs_port" lineno="4633">
+<interface name="corenet_udp_bind_afs_fs_port" lineno="4511">
<summary>
Bind UDP sockets to the afs_fs port.
</summary>
@@ -12962,7 +13008,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs_fs_port" lineno="4652">
+<interface name="corenet_tcp_connect_afs_fs_port" lineno="4530">
<summary>
Make a TCP connection to the afs_fs port.
</summary>
@@ -12972,7 +13018,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_fs_client_packets" lineno="4672">
+<interface name="corenet_send_afs_fs_client_packets" lineno="4550">
<summary>
Send afs_fs_client packets.
</summary>
@@ -12983,7 +13029,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4691">
+<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4569">
<summary>
Do not audit attempts to send afs_fs_client packets.
</summary>
@@ -12994,7 +13040,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_fs_client_packets" lineno="4710">
+<interface name="corenet_receive_afs_fs_client_packets" lineno="4588">
<summary>
Receive afs_fs_client packets.
</summary>
@@ -13005,7 +13051,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4729">
+<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4607">
<summary>
Do not audit attempts to receive afs_fs_client packets.
</summary>
@@ -13016,7 +13062,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4748">
+<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4626">
<summary>
Send and receive afs_fs_client packets.
</summary>
@@ -13027,7 +13073,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4764">
+<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4642">
<summary>
Do not audit attempts to send and receive afs_fs_client packets.
</summary>
@@ -13038,7 +13084,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4779">
+<interface name="corenet_relabelto_afs_fs_client_packets" lineno="4657">
<summary>
Relabel packets to afs_fs_client the packet type.
</summary>
@@ -13048,7 +13094,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_fs_server_packets" lineno="4799">
+<interface name="corenet_send_afs_fs_server_packets" lineno="4677">
<summary>
Send afs_fs_server packets.
</summary>
@@ -13059,7 +13105,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4818">
+<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4696">
<summary>
Do not audit attempts to send afs_fs_server packets.
</summary>
@@ -13070,7 +13116,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_fs_server_packets" lineno="4837">
+<interface name="corenet_receive_afs_fs_server_packets" lineno="4715">
<summary>
Receive afs_fs_server packets.
</summary>
@@ -13081,7 +13127,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4856">
+<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4734">
<summary>
Do not audit attempts to receive afs_fs_server packets.
</summary>
@@ -13092,7 +13138,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4875">
+<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4753">
<summary>
Send and receive afs_fs_server packets.
</summary>
@@ -13103,7 +13149,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4891">
+<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4769">
<summary>
Do not audit attempts to send and receive afs_fs_server packets.
</summary>
@@ -13114,7 +13160,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4906">
+<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4784">
<summary>
Relabel packets to afs_fs_server the packet type.
</summary>
@@ -13124,7 +13170,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4928">
+<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4806">
<summary>
Send and receive TCP traffic on the afs_ka port.
</summary>
@@ -13135,7 +13181,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_afs_ka_port" lineno="4947">
+<interface name="corenet_udp_send_afs_ka_port" lineno="4821">
<summary>
Send UDP traffic on the afs_ka port.
</summary>
@@ -13146,7 +13192,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4966">
+<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4836">
<summary>
Do not audit attempts to send UDP traffic on the afs_ka port.
</summary>
@@ -13157,7 +13203,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_afs_ka_port" lineno="4985">
+<interface name="corenet_udp_receive_afs_ka_port" lineno="4851">
<summary>
Receive UDP traffic on the afs_ka port.
</summary>
@@ -13168,7 +13214,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="5004">
+<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="4866">
<summary>
Do not audit attempts to receive UDP traffic on the afs_ka port.
</summary>
@@ -13179,7 +13225,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="5023">
+<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="4881">
<summary>
Send and receive UDP traffic on the afs_ka port.
</summary>
@@ -13190,7 +13236,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="5040">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="4897">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs_ka port.
@@ -13202,7 +13248,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_afs_ka_port" lineno="5056">
+<interface name="corenet_tcp_bind_afs_ka_port" lineno="4912">
<summary>
Bind TCP sockets to the afs_ka port.
</summary>
@@ -13213,7 +13259,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs_ka_port" lineno="5076">
+<interface name="corenet_udp_bind_afs_ka_port" lineno="4932">
<summary>
Bind UDP sockets to the afs_ka port.
</summary>
@@ -13224,7 +13270,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs_ka_port" lineno="5095">
+<interface name="corenet_tcp_connect_afs_ka_port" lineno="4951">
<summary>
Make a TCP connection to the afs_ka port.
</summary>
@@ -13234,7 +13280,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_ka_client_packets" lineno="5115">
+<interface name="corenet_send_afs_ka_client_packets" lineno="4971">
<summary>
Send afs_ka_client packets.
</summary>
@@ -13245,7 +13291,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="5134">
+<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="4990">
<summary>
Do not audit attempts to send afs_ka_client packets.
</summary>
@@ -13256,7 +13302,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_ka_client_packets" lineno="5153">
+<interface name="corenet_receive_afs_ka_client_packets" lineno="5009">
<summary>
Receive afs_ka_client packets.
</summary>
@@ -13267,7 +13313,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5172">
+<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5028">
<summary>
Do not audit attempts to receive afs_ka_client packets.
</summary>
@@ -13278,7 +13324,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5191">
+<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5047">
<summary>
Send and receive afs_ka_client packets.
</summary>
@@ -13289,7 +13335,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5207">
+<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5063">
<summary>
Do not audit attempts to send and receive afs_ka_client packets.
</summary>
@@ -13300,7 +13346,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5222">
+<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5078">
<summary>
Relabel packets to afs_ka_client the packet type.
</summary>
@@ -13310,7 +13356,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_ka_server_packets" lineno="5242">
+<interface name="corenet_send_afs_ka_server_packets" lineno="5098">
<summary>
Send afs_ka_server packets.
</summary>
@@ -13321,7 +13367,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5261">
+<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5117">
<summary>
Do not audit attempts to send afs_ka_server packets.
</summary>
@@ -13332,7 +13378,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_ka_server_packets" lineno="5280">
+<interface name="corenet_receive_afs_ka_server_packets" lineno="5136">
<summary>
Receive afs_ka_server packets.
</summary>
@@ -13343,7 +13389,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5299">
+<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5155">
<summary>
Do not audit attempts to receive afs_ka_server packets.
</summary>
@@ -13354,7 +13400,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5318">
+<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5174">
<summary>
Send and receive afs_ka_server packets.
</summary>
@@ -13365,7 +13411,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5334">
+<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5190">
<summary>
Do not audit attempts to send and receive afs_ka_server packets.
</summary>
@@ -13376,7 +13422,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_ka_server_packets" lineno="5349">
+<interface name="corenet_relabelto_afs_ka_server_packets" lineno="5205">
<summary>
Relabel packets to afs_ka_server the packet type.
</summary>
@@ -13386,7 +13432,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="5371">
+<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="5227">
<summary>
Send and receive TCP traffic on the afs_pt port.
</summary>
@@ -13397,7 +13443,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_afs_pt_port" lineno="5390">
+<interface name="corenet_udp_send_afs_pt_port" lineno="5242">
<summary>
Send UDP traffic on the afs_pt port.
</summary>
@@ -13408,7 +13454,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5409">
+<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5257">
<summary>
Do not audit attempts to send UDP traffic on the afs_pt port.
</summary>
@@ -13419,7 +13465,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_afs_pt_port" lineno="5428">
+<interface name="corenet_udp_receive_afs_pt_port" lineno="5272">
<summary>
Receive UDP traffic on the afs_pt port.
</summary>
@@ -13430,7 +13476,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5447">
+<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5287">
<summary>
Do not audit attempts to receive UDP traffic on the afs_pt port.
</summary>
@@ -13441,7 +13487,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5466">
+<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5302">
<summary>
Send and receive UDP traffic on the afs_pt port.
</summary>
@@ -13452,7 +13498,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5483">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5318">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs_pt port.
@@ -13464,7 +13510,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_afs_pt_port" lineno="5499">
+<interface name="corenet_tcp_bind_afs_pt_port" lineno="5333">
<summary>
Bind TCP sockets to the afs_pt port.
</summary>
@@ -13475,7 +13521,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs_pt_port" lineno="5519">
+<interface name="corenet_udp_bind_afs_pt_port" lineno="5353">
<summary>
Bind UDP sockets to the afs_pt port.
</summary>
@@ -13486,7 +13532,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs_pt_port" lineno="5538">
+<interface name="corenet_tcp_connect_afs_pt_port" lineno="5372">
<summary>
Make a TCP connection to the afs_pt port.
</summary>
@@ -13496,7 +13542,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_pt_client_packets" lineno="5558">
+<interface name="corenet_send_afs_pt_client_packets" lineno="5392">
<summary>
Send afs_pt_client packets.
</summary>
@@ -13507,7 +13553,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5577">
+<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5411">
<summary>
Do not audit attempts to send afs_pt_client packets.
</summary>
@@ -13518,7 +13564,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_pt_client_packets" lineno="5596">
+<interface name="corenet_receive_afs_pt_client_packets" lineno="5430">
<summary>
Receive afs_pt_client packets.
</summary>
@@ -13529,7 +13575,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5615">
+<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5449">
<summary>
Do not audit attempts to receive afs_pt_client packets.
</summary>
@@ -13540,7 +13586,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5634">
+<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5468">
<summary>
Send and receive afs_pt_client packets.
</summary>
@@ -13551,7 +13597,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5650">
+<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5484">
<summary>
Do not audit attempts to send and receive afs_pt_client packets.
</summary>
@@ -13562,7 +13608,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5665">
+<interface name="corenet_relabelto_afs_pt_client_packets" lineno="5499">
<summary>
Relabel packets to afs_pt_client the packet type.
</summary>
@@ -13572,7 +13618,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_pt_server_packets" lineno="5685">
+<interface name="corenet_send_afs_pt_server_packets" lineno="5519">
<summary>
Send afs_pt_server packets.
</summary>
@@ -13583,7 +13629,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5704">
+<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5538">
<summary>
Do not audit attempts to send afs_pt_server packets.
</summary>
@@ -13594,7 +13640,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_pt_server_packets" lineno="5723">
+<interface name="corenet_receive_afs_pt_server_packets" lineno="5557">
<summary>
Receive afs_pt_server packets.
</summary>
@@ -13605,7 +13651,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5742">
+<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5576">
<summary>
Do not audit attempts to receive afs_pt_server packets.
</summary>
@@ -13616,7 +13662,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5761">
+<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5595">
<summary>
Send and receive afs_pt_server packets.
</summary>
@@ -13627,7 +13673,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5777">
+<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5611">
<summary>
Do not audit attempts to send and receive afs_pt_server packets.
</summary>
@@ -13638,7 +13684,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5792">
+<interface name="corenet_relabelto_afs_pt_server_packets" lineno="5626">
<summary>
Relabel packets to afs_pt_server the packet type.
</summary>
@@ -13648,7 +13694,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5814">
+<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5648">
<summary>
Send and receive TCP traffic on the afs_vl port.
</summary>
@@ -13659,7 +13705,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_afs_vl_port" lineno="5833">
+<interface name="corenet_udp_send_afs_vl_port" lineno="5663">
<summary>
Send UDP traffic on the afs_vl port.
</summary>
@@ -13670,7 +13716,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5852">
+<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5678">
<summary>
Do not audit attempts to send UDP traffic on the afs_vl port.
</summary>
@@ -13681,7 +13727,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_afs_vl_port" lineno="5871">
+<interface name="corenet_udp_receive_afs_vl_port" lineno="5693">
<summary>
Receive UDP traffic on the afs_vl port.
</summary>
@@ -13692,7 +13738,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5890">
+<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5708">
<summary>
Do not audit attempts to receive UDP traffic on the afs_vl port.
</summary>
@@ -13703,7 +13749,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5909">
+<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5723">
<summary>
Send and receive UDP traffic on the afs_vl port.
</summary>
@@ -13714,7 +13760,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5926">
+<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5739">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs_vl port.
@@ -13726,7 +13772,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_afs_vl_port" lineno="5942">
+<interface name="corenet_tcp_bind_afs_vl_port" lineno="5754">
<summary>
Bind TCP sockets to the afs_vl port.
</summary>
@@ -13737,7 +13783,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs_vl_port" lineno="5962">
+<interface name="corenet_udp_bind_afs_vl_port" lineno="5774">
<summary>
Bind UDP sockets to the afs_vl port.
</summary>
@@ -13748,7 +13794,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs_vl_port" lineno="5981">
+<interface name="corenet_tcp_connect_afs_vl_port" lineno="5793">
<summary>
Make a TCP connection to the afs_vl port.
</summary>
@@ -13758,7 +13804,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_vl_client_packets" lineno="6001">
+<interface name="corenet_send_afs_vl_client_packets" lineno="5813">
<summary>
Send afs_vl_client packets.
</summary>
@@ -13769,7 +13815,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="6020">
+<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5832">
<summary>
Do not audit attempts to send afs_vl_client packets.
</summary>
@@ -13780,7 +13826,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_vl_client_packets" lineno="6039">
+<interface name="corenet_receive_afs_vl_client_packets" lineno="5851">
<summary>
Receive afs_vl_client packets.
</summary>
@@ -13791,7 +13837,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="6058">
+<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="5870">
<summary>
Do not audit attempts to receive afs_vl_client packets.
</summary>
@@ -13802,7 +13848,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="6077">
+<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="5889">
<summary>
Send and receive afs_vl_client packets.
</summary>
@@ -13813,7 +13859,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="6093">
+<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="5905">
<summary>
Do not audit attempts to send and receive afs_vl_client packets.
</summary>
@@ -13824,7 +13870,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_vl_client_packets" lineno="6108">
+<interface name="corenet_relabelto_afs_vl_client_packets" lineno="5920">
<summary>
Relabel packets to afs_vl_client the packet type.
</summary>
@@ -13834,7 +13880,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs_vl_server_packets" lineno="6128">
+<interface name="corenet_send_afs_vl_server_packets" lineno="5940">
<summary>
Send afs_vl_server packets.
</summary>
@@ -13845,7 +13891,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="6147">
+<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="5959">
<summary>
Do not audit attempts to send afs_vl_server packets.
</summary>
@@ -13856,7 +13902,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs_vl_server_packets" lineno="6166">
+<interface name="corenet_receive_afs_vl_server_packets" lineno="5978">
<summary>
Receive afs_vl_server packets.
</summary>
@@ -13867,7 +13913,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="6185">
+<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="5997">
<summary>
Do not audit attempts to receive afs_vl_server packets.
</summary>
@@ -13878,7 +13924,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6204">
+<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6016">
<summary>
Send and receive afs_vl_server packets.
</summary>
@@ -13889,7 +13935,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6220">
+<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6032">
<summary>
Do not audit attempts to send and receive afs_vl_server packets.
</summary>
@@ -13900,7 +13946,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6235">
+<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6047">
<summary>
Relabel packets to afs_vl_server the packet type.
</summary>
@@ -13910,7 +13956,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6257">
+<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6069">
<summary>
Send and receive TCP traffic on the afs3_callback port.
</summary>
@@ -13921,7 +13967,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_afs3_callback_port" lineno="6276">
+<interface name="corenet_udp_send_afs3_callback_port" lineno="6084">
<summary>
Send UDP traffic on the afs3_callback port.
</summary>
@@ -13932,7 +13978,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="6295">
+<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="6099">
<summary>
Do not audit attempts to send UDP traffic on the afs3_callback port.
</summary>
@@ -13943,7 +13989,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_afs3_callback_port" lineno="6314">
+<interface name="corenet_udp_receive_afs3_callback_port" lineno="6114">
<summary>
Receive UDP traffic on the afs3_callback port.
</summary>
@@ -13954,7 +14000,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="6333">
+<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="6129">
<summary>
Do not audit attempts to receive UDP traffic on the afs3_callback port.
</summary>
@@ -13965,7 +14011,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="6352">
+<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="6144">
<summary>
Send and receive UDP traffic on the afs3_callback port.
</summary>
@@ -13976,7 +14022,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="6369">
+<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="6160">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs3_callback port.
@@ -13988,7 +14034,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_afs3_callback_port" lineno="6385">
+<interface name="corenet_tcp_bind_afs3_callback_port" lineno="6175">
<summary>
Bind TCP sockets to the afs3_callback port.
</summary>
@@ -13999,7 +14045,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_afs3_callback_port" lineno="6405">
+<interface name="corenet_udp_bind_afs3_callback_port" lineno="6195">
<summary>
Bind UDP sockets to the afs3_callback port.
</summary>
@@ -14010,7 +14056,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_afs3_callback_port" lineno="6424">
+<interface name="corenet_tcp_connect_afs3_callback_port" lineno="6214">
<summary>
Make a TCP connection to the afs3_callback port.
</summary>
@@ -14020,7 +14066,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs3_callback_client_packets" lineno="6444">
+<interface name="corenet_send_afs3_callback_client_packets" lineno="6234">
<summary>
Send afs3_callback_client packets.
</summary>
@@ -14031,7 +14077,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="6463">
+<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="6253">
<summary>
Do not audit attempts to send afs3_callback_client packets.
</summary>
@@ -14042,7 +14088,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs3_callback_client_packets" lineno="6482">
+<interface name="corenet_receive_afs3_callback_client_packets" lineno="6272">
<summary>
Receive afs3_callback_client packets.
</summary>
@@ -14053,7 +14099,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="6501">
+<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="6291">
<summary>
Do not audit attempts to receive afs3_callback_client packets.
</summary>
@@ -14064,7 +14110,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="6520">
+<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="6310">
<summary>
Send and receive afs3_callback_client packets.
</summary>
@@ -14075,7 +14121,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="6536">
+<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="6326">
<summary>
Do not audit attempts to send and receive afs3_callback_client packets.
</summary>
@@ -14086,7 +14132,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="6551">
+<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="6341">
<summary>
Relabel packets to afs3_callback_client the packet type.
</summary>
@@ -14096,7 +14142,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_afs3_callback_server_packets" lineno="6571">
+<interface name="corenet_send_afs3_callback_server_packets" lineno="6361">
<summary>
Send afs3_callback_server packets.
</summary>
@@ -14107,7 +14153,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="6590">
+<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="6380">
<summary>
Do not audit attempts to send afs3_callback_server packets.
</summary>
@@ -14118,7 +14164,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_afs3_callback_server_packets" lineno="6609">
+<interface name="corenet_receive_afs3_callback_server_packets" lineno="6399">
<summary>
Receive afs3_callback_server packets.
</summary>
@@ -14129,7 +14175,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="6628">
+<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="6418">
<summary>
Do not audit attempts to receive afs3_callback_server packets.
</summary>
@@ -14140,7 +14186,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="6647">
+<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="6437">
<summary>
Send and receive afs3_callback_server packets.
</summary>
@@ -14151,7 +14197,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="6663">
+<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="6453">
<summary>
Do not audit attempts to send and receive afs3_callback_server packets.
</summary>
@@ -14162,7 +14208,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="6678">
+<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="6468">
<summary>
Relabel packets to afs3_callback_server the packet type.
</summary>
@@ -14172,7 +14218,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_agentx_port" lineno="6700">
+<interface name="corenet_tcp_sendrecv_agentx_port" lineno="6490">
<summary>
Send and receive TCP traffic on the agentx port.
</summary>
@@ -14183,7 +14229,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_agentx_port" lineno="6719">
+<interface name="corenet_udp_send_agentx_port" lineno="6505">
<summary>
Send UDP traffic on the agentx port.
</summary>
@@ -14194,7 +14240,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="6738">
+<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="6520">
<summary>
Do not audit attempts to send UDP traffic on the agentx port.
</summary>
@@ -14205,7 +14251,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_agentx_port" lineno="6757">
+<interface name="corenet_udp_receive_agentx_port" lineno="6535">
<summary>
Receive UDP traffic on the agentx port.
</summary>
@@ -14216,7 +14262,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="6776">
+<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="6550">
<summary>
Do not audit attempts to receive UDP traffic on the agentx port.
</summary>
@@ -14227,7 +14273,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_agentx_port" lineno="6795">
+<interface name="corenet_udp_sendrecv_agentx_port" lineno="6565">
<summary>
Send and receive UDP traffic on the agentx port.
</summary>
@@ -14238,7 +14284,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="6812">
+<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="6581">
<summary>
Do not audit attempts to send and receive
UDP traffic on the agentx port.
@@ -14250,7 +14296,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_agentx_port" lineno="6828">
+<interface name="corenet_tcp_bind_agentx_port" lineno="6596">
<summary>
Bind TCP sockets to the agentx port.
</summary>
@@ -14261,7 +14307,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_agentx_port" lineno="6848">
+<interface name="corenet_udp_bind_agentx_port" lineno="6616">
<summary>
Bind UDP sockets to the agentx port.
</summary>
@@ -14272,7 +14318,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_agentx_port" lineno="6867">
+<interface name="corenet_tcp_connect_agentx_port" lineno="6635">
<summary>
Make a TCP connection to the agentx port.
</summary>
@@ -14282,7 +14328,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_agentx_client_packets" lineno="6887">
+<interface name="corenet_send_agentx_client_packets" lineno="6655">
<summary>
Send agentx_client packets.
</summary>
@@ -14293,7 +14339,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6906">
+<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6674">
<summary>
Do not audit attempts to send agentx_client packets.
</summary>
@@ -14304,7 +14350,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_agentx_client_packets" lineno="6925">
+<interface name="corenet_receive_agentx_client_packets" lineno="6693">
<summary>
Receive agentx_client packets.
</summary>
@@ -14315,7 +14361,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6944">
+<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6712">
<summary>
Do not audit attempts to receive agentx_client packets.
</summary>
@@ -14326,7 +14372,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_agentx_client_packets" lineno="6963">
+<interface name="corenet_sendrecv_agentx_client_packets" lineno="6731">
<summary>
Send and receive agentx_client packets.
</summary>
@@ -14337,7 +14383,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6979">
+<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6747">
<summary>
Do not audit attempts to send and receive agentx_client packets.
</summary>
@@ -14348,7 +14394,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_agentx_client_packets" lineno="6994">
+<interface name="corenet_relabelto_agentx_client_packets" lineno="6762">
<summary>
Relabel packets to agentx_client the packet type.
</summary>
@@ -14358,7 +14404,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_agentx_server_packets" lineno="7014">
+<interface name="corenet_send_agentx_server_packets" lineno="6782">
<summary>
Send agentx_server packets.
</summary>
@@ -14369,7 +14415,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="7033">
+<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6801">
<summary>
Do not audit attempts to send agentx_server packets.
</summary>
@@ -14380,7 +14426,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_agentx_server_packets" lineno="7052">
+<interface name="corenet_receive_agentx_server_packets" lineno="6820">
<summary>
Receive agentx_server packets.
</summary>
@@ -14391,7 +14437,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="7071">
+<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6839">
<summary>
Do not audit attempts to receive agentx_server packets.
</summary>
@@ -14402,7 +14448,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_agentx_server_packets" lineno="7090">
+<interface name="corenet_sendrecv_agentx_server_packets" lineno="6858">
<summary>
Send and receive agentx_server packets.
</summary>
@@ -14413,7 +14459,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="7106">
+<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="6874">
<summary>
Do not audit attempts to send and receive agentx_server packets.
</summary>
@@ -14424,7 +14470,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_agentx_server_packets" lineno="7121">
+<interface name="corenet_relabelto_agentx_server_packets" lineno="6889">
<summary>
Relabel packets to agentx_server the packet type.
</summary>
@@ -14434,7 +14480,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_amanda_port" lineno="7143">
+<interface name="corenet_tcp_sendrecv_amanda_port" lineno="6911">
<summary>
Send and receive TCP traffic on the amanda port.
</summary>
@@ -14445,7 +14491,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_amanda_port" lineno="7162">
+<interface name="corenet_udp_send_amanda_port" lineno="6926">
<summary>
Send UDP traffic on the amanda port.
</summary>
@@ -14456,7 +14502,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="7181">
+<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="6941">
<summary>
Do not audit attempts to send UDP traffic on the amanda port.
</summary>
@@ -14467,7 +14513,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_amanda_port" lineno="7200">
+<interface name="corenet_udp_receive_amanda_port" lineno="6956">
<summary>
Receive UDP traffic on the amanda port.
</summary>
@@ -14478,7 +14524,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="7219">
+<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="6971">
<summary>
Do not audit attempts to receive UDP traffic on the amanda port.
</summary>
@@ -14489,7 +14535,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_amanda_port" lineno="7238">
+<interface name="corenet_udp_sendrecv_amanda_port" lineno="6986">
<summary>
Send and receive UDP traffic on the amanda port.
</summary>
@@ -14500,7 +14546,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="7255">
+<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="7002">
<summary>
Do not audit attempts to send and receive
UDP traffic on the amanda port.
@@ -14512,7 +14558,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_amanda_port" lineno="7271">
+<interface name="corenet_tcp_bind_amanda_port" lineno="7017">
<summary>
Bind TCP sockets to the amanda port.
</summary>
@@ -14523,7 +14569,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_amanda_port" lineno="7291">
+<interface name="corenet_udp_bind_amanda_port" lineno="7037">
<summary>
Bind UDP sockets to the amanda port.
</summary>
@@ -14534,7 +14580,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_amanda_port" lineno="7310">
+<interface name="corenet_tcp_connect_amanda_port" lineno="7056">
<summary>
Make a TCP connection to the amanda port.
</summary>
@@ -14544,7 +14590,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amanda_client_packets" lineno="7330">
+<interface name="corenet_send_amanda_client_packets" lineno="7076">
<summary>
Send amanda_client packets.
</summary>
@@ -14555,7 +14601,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="7349">
+<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="7095">
<summary>
Do not audit attempts to send amanda_client packets.
</summary>
@@ -14566,7 +14612,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amanda_client_packets" lineno="7368">
+<interface name="corenet_receive_amanda_client_packets" lineno="7114">
<summary>
Receive amanda_client packets.
</summary>
@@ -14577,7 +14623,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="7387">
+<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="7133">
<summary>
Do not audit attempts to receive amanda_client packets.
</summary>
@@ -14588,7 +14634,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amanda_client_packets" lineno="7406">
+<interface name="corenet_sendrecv_amanda_client_packets" lineno="7152">
<summary>
Send and receive amanda_client packets.
</summary>
@@ -14599,7 +14645,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="7422">
+<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="7168">
<summary>
Do not audit attempts to send and receive amanda_client packets.
</summary>
@@ -14610,7 +14656,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amanda_client_packets" lineno="7437">
+<interface name="corenet_relabelto_amanda_client_packets" lineno="7183">
<summary>
Relabel packets to amanda_client the packet type.
</summary>
@@ -14620,7 +14666,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amanda_server_packets" lineno="7457">
+<interface name="corenet_send_amanda_server_packets" lineno="7203">
<summary>
Send amanda_server packets.
</summary>
@@ -14631,7 +14677,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="7476">
+<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="7222">
<summary>
Do not audit attempts to send amanda_server packets.
</summary>
@@ -14642,7 +14688,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amanda_server_packets" lineno="7495">
+<interface name="corenet_receive_amanda_server_packets" lineno="7241">
<summary>
Receive amanda_server packets.
</summary>
@@ -14653,7 +14699,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="7514">
+<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="7260">
<summary>
Do not audit attempts to receive amanda_server packets.
</summary>
@@ -14664,7 +14710,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amanda_server_packets" lineno="7533">
+<interface name="corenet_sendrecv_amanda_server_packets" lineno="7279">
<summary>
Send and receive amanda_server packets.
</summary>
@@ -14675,7 +14721,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="7549">
+<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="7295">
<summary>
Do not audit attempts to send and receive amanda_server packets.
</summary>
@@ -14686,7 +14732,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amanda_server_packets" lineno="7564">
+<interface name="corenet_relabelto_amanda_server_packets" lineno="7310">
<summary>
Relabel packets to amanda_server the packet type.
</summary>
@@ -14696,7 +14742,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="7586">
+<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="7332">
<summary>
Send and receive TCP traffic on the amavisd_recv port.
</summary>
@@ -14707,7 +14753,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_amavisd_recv_port" lineno="7605">
+<interface name="corenet_udp_send_amavisd_recv_port" lineno="7347">
<summary>
Send UDP traffic on the amavisd_recv port.
</summary>
@@ -14718,7 +14764,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="7624">
+<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="7362">
<summary>
Do not audit attempts to send UDP traffic on the amavisd_recv port.
</summary>
@@ -14729,7 +14775,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_amavisd_recv_port" lineno="7643">
+<interface name="corenet_udp_receive_amavisd_recv_port" lineno="7377">
<summary>
Receive UDP traffic on the amavisd_recv port.
</summary>
@@ -14740,7 +14786,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="7662">
+<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="7392">
<summary>
Do not audit attempts to receive UDP traffic on the amavisd_recv port.
</summary>
@@ -14751,7 +14797,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="7681">
+<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="7407">
<summary>
Send and receive UDP traffic on the amavisd_recv port.
</summary>
@@ -14762,7 +14808,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="7698">
+<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="7423">
<summary>
Do not audit attempts to send and receive
UDP traffic on the amavisd_recv port.
@@ -14774,7 +14820,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="7714">
+<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="7438">
<summary>
Bind TCP sockets to the amavisd_recv port.
</summary>
@@ -14785,7 +14831,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_amavisd_recv_port" lineno="7734">
+<interface name="corenet_udp_bind_amavisd_recv_port" lineno="7458">
<summary>
Bind UDP sockets to the amavisd_recv port.
</summary>
@@ -14796,7 +14842,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="7753">
+<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="7477">
<summary>
Make a TCP connection to the amavisd_recv port.
</summary>
@@ -14806,7 +14852,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amavisd_recv_client_packets" lineno="7773">
+<interface name="corenet_send_amavisd_recv_client_packets" lineno="7497">
<summary>
Send amavisd_recv_client packets.
</summary>
@@ -14817,7 +14863,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="7792">
+<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="7516">
<summary>
Do not audit attempts to send amavisd_recv_client packets.
</summary>
@@ -14828,7 +14874,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amavisd_recv_client_packets" lineno="7811">
+<interface name="corenet_receive_amavisd_recv_client_packets" lineno="7535">
<summary>
Receive amavisd_recv_client packets.
</summary>
@@ -14839,7 +14885,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="7830">
+<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="7554">
<summary>
Do not audit attempts to receive amavisd_recv_client packets.
</summary>
@@ -14850,7 +14896,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7849">
+<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7573">
<summary>
Send and receive amavisd_recv_client packets.
</summary>
@@ -14861,7 +14907,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7865">
+<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7589">
<summary>
Do not audit attempts to send and receive amavisd_recv_client packets.
</summary>
@@ -14872,7 +14918,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7880">
+<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7604">
<summary>
Relabel packets to amavisd_recv_client the packet type.
</summary>
@@ -14882,7 +14928,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amavisd_recv_server_packets" lineno="7900">
+<interface name="corenet_send_amavisd_recv_server_packets" lineno="7624">
<summary>
Send amavisd_recv_server packets.
</summary>
@@ -14893,7 +14939,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7919">
+<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7643">
<summary>
Do not audit attempts to send amavisd_recv_server packets.
</summary>
@@ -14904,7 +14950,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amavisd_recv_server_packets" lineno="7938">
+<interface name="corenet_receive_amavisd_recv_server_packets" lineno="7662">
<summary>
Receive amavisd_recv_server packets.
</summary>
@@ -14915,7 +14961,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7957">
+<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7681">
<summary>
Do not audit attempts to receive amavisd_recv_server packets.
</summary>
@@ -14926,7 +14972,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7976">
+<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7700">
<summary>
Send and receive amavisd_recv_server packets.
</summary>
@@ -14937,7 +14983,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7992">
+<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7716">
<summary>
Do not audit attempts to send and receive amavisd_recv_server packets.
</summary>
@@ -14948,7 +14994,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="8007">
+<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="7731">
<summary>
Relabel packets to amavisd_recv_server the packet type.
</summary>
@@ -14958,7 +15004,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="8029">
+<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="7753">
<summary>
Send and receive TCP traffic on the amavisd_send port.
</summary>
@@ -14969,7 +15015,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_amavisd_send_port" lineno="8048">
+<interface name="corenet_udp_send_amavisd_send_port" lineno="7768">
<summary>
Send UDP traffic on the amavisd_send port.
</summary>
@@ -14980,7 +15026,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="8067">
+<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="7783">
<summary>
Do not audit attempts to send UDP traffic on the amavisd_send port.
</summary>
@@ -14991,7 +15037,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_amavisd_send_port" lineno="8086">
+<interface name="corenet_udp_receive_amavisd_send_port" lineno="7798">
<summary>
Receive UDP traffic on the amavisd_send port.
</summary>
@@ -15002,7 +15048,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="8105">
+<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="7813">
<summary>
Do not audit attempts to receive UDP traffic on the amavisd_send port.
</summary>
@@ -15013,7 +15059,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="8124">
+<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="7828">
<summary>
Send and receive UDP traffic on the amavisd_send port.
</summary>
@@ -15024,7 +15070,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="8141">
+<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="7844">
<summary>
Do not audit attempts to send and receive
UDP traffic on the amavisd_send port.
@@ -15036,7 +15082,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_amavisd_send_port" lineno="8157">
+<interface name="corenet_tcp_bind_amavisd_send_port" lineno="7859">
<summary>
Bind TCP sockets to the amavisd_send port.
</summary>
@@ -15047,7 +15093,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_amavisd_send_port" lineno="8177">
+<interface name="corenet_udp_bind_amavisd_send_port" lineno="7879">
<summary>
Bind UDP sockets to the amavisd_send port.
</summary>
@@ -15058,7 +15104,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_amavisd_send_port" lineno="8196">
+<interface name="corenet_tcp_connect_amavisd_send_port" lineno="7898">
<summary>
Make a TCP connection to the amavisd_send port.
</summary>
@@ -15068,7 +15114,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amavisd_send_client_packets" lineno="8216">
+<interface name="corenet_send_amavisd_send_client_packets" lineno="7918">
<summary>
Send amavisd_send_client packets.
</summary>
@@ -15079,7 +15125,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="8235">
+<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="7937">
<summary>
Do not audit attempts to send amavisd_send_client packets.
</summary>
@@ -15090,7 +15136,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amavisd_send_client_packets" lineno="8254">
+<interface name="corenet_receive_amavisd_send_client_packets" lineno="7956">
<summary>
Receive amavisd_send_client packets.
</summary>
@@ -15101,7 +15147,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="8273">
+<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="7975">
<summary>
Do not audit attempts to receive amavisd_send_client packets.
</summary>
@@ -15112,7 +15158,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="8292">
+<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="7994">
<summary>
Send and receive amavisd_send_client packets.
</summary>
@@ -15123,7 +15169,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="8308">
+<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="8010">
<summary>
Do not audit attempts to send and receive amavisd_send_client packets.
</summary>
@@ -15134,7 +15180,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="8323">
+<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="8025">
<summary>
Relabel packets to amavisd_send_client the packet type.
</summary>
@@ -15144,7 +15190,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amavisd_send_server_packets" lineno="8343">
+<interface name="corenet_send_amavisd_send_server_packets" lineno="8045">
<summary>
Send amavisd_send_server packets.
</summary>
@@ -15155,7 +15201,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="8362">
+<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="8064">
<summary>
Do not audit attempts to send amavisd_send_server packets.
</summary>
@@ -15166,7 +15212,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amavisd_send_server_packets" lineno="8381">
+<interface name="corenet_receive_amavisd_send_server_packets" lineno="8083">
<summary>
Receive amavisd_send_server packets.
</summary>
@@ -15177,7 +15223,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="8400">
+<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="8102">
<summary>
Do not audit attempts to receive amavisd_send_server packets.
</summary>
@@ -15188,7 +15234,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="8419">
+<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="8121">
<summary>
Send and receive amavisd_send_server packets.
</summary>
@@ -15199,7 +15245,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="8435">
+<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="8137">
<summary>
Do not audit attempts to send and receive amavisd_send_server packets.
</summary>
@@ -15210,7 +15256,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="8450">
+<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="8152">
<summary>
Relabel packets to amavisd_send_server the packet type.
</summary>
@@ -15220,7 +15266,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_amqp_port" lineno="8472">
+<interface name="corenet_tcp_sendrecv_amqp_port" lineno="8174">
<summary>
Send and receive TCP traffic on the amqp port.
</summary>
@@ -15231,7 +15277,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_amqp_port" lineno="8491">
+<interface name="corenet_udp_send_amqp_port" lineno="8189">
<summary>
Send UDP traffic on the amqp port.
</summary>
@@ -15242,7 +15288,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="8510">
+<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="8204">
<summary>
Do not audit attempts to send UDP traffic on the amqp port.
</summary>
@@ -15253,7 +15299,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_amqp_port" lineno="8529">
+<interface name="corenet_udp_receive_amqp_port" lineno="8219">
<summary>
Receive UDP traffic on the amqp port.
</summary>
@@ -15264,7 +15310,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="8548">
+<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="8234">
<summary>
Do not audit attempts to receive UDP traffic on the amqp port.
</summary>
@@ -15275,7 +15321,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_amqp_port" lineno="8567">
+<interface name="corenet_udp_sendrecv_amqp_port" lineno="8249">
<summary>
Send and receive UDP traffic on the amqp port.
</summary>
@@ -15286,7 +15332,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="8584">
+<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="8265">
<summary>
Do not audit attempts to send and receive
UDP traffic on the amqp port.
@@ -15298,7 +15344,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_amqp_port" lineno="8600">
+<interface name="corenet_tcp_bind_amqp_port" lineno="8280">
<summary>
Bind TCP sockets to the amqp port.
</summary>
@@ -15309,7 +15355,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_amqp_port" lineno="8620">
+<interface name="corenet_udp_bind_amqp_port" lineno="8300">
<summary>
Bind UDP sockets to the amqp port.
</summary>
@@ -15320,7 +15366,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_amqp_port" lineno="8639">
+<interface name="corenet_tcp_connect_amqp_port" lineno="8319">
<summary>
Make a TCP connection to the amqp port.
</summary>
@@ -15330,7 +15376,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amqp_client_packets" lineno="8659">
+<interface name="corenet_send_amqp_client_packets" lineno="8339">
<summary>
Send amqp_client packets.
</summary>
@@ -15341,7 +15387,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="8678">
+<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="8358">
<summary>
Do not audit attempts to send amqp_client packets.
</summary>
@@ -15352,7 +15398,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amqp_client_packets" lineno="8697">
+<interface name="corenet_receive_amqp_client_packets" lineno="8377">
<summary>
Receive amqp_client packets.
</summary>
@@ -15363,7 +15409,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="8716">
+<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="8396">
<summary>
Do not audit attempts to receive amqp_client packets.
</summary>
@@ -15374,7 +15420,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amqp_client_packets" lineno="8735">
+<interface name="corenet_sendrecv_amqp_client_packets" lineno="8415">
<summary>
Send and receive amqp_client packets.
</summary>
@@ -15385,7 +15431,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="8751">
+<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="8431">
<summary>
Do not audit attempts to send and receive amqp_client packets.
</summary>
@@ -15396,7 +15442,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amqp_client_packets" lineno="8766">
+<interface name="corenet_relabelto_amqp_client_packets" lineno="8446">
<summary>
Relabel packets to amqp_client the packet type.
</summary>
@@ -15406,7 +15452,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_amqp_server_packets" lineno="8786">
+<interface name="corenet_send_amqp_server_packets" lineno="8466">
<summary>
Send amqp_server packets.
</summary>
@@ -15417,7 +15463,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="8805">
+<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="8485">
<summary>
Do not audit attempts to send amqp_server packets.
</summary>
@@ -15428,7 +15474,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_amqp_server_packets" lineno="8824">
+<interface name="corenet_receive_amqp_server_packets" lineno="8504">
<summary>
Receive amqp_server packets.
</summary>
@@ -15439,7 +15485,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8843">
+<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8523">
<summary>
Do not audit attempts to receive amqp_server packets.
</summary>
@@ -15450,7 +15496,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_amqp_server_packets" lineno="8862">
+<interface name="corenet_sendrecv_amqp_server_packets" lineno="8542">
<summary>
Send and receive amqp_server packets.
</summary>
@@ -15461,7 +15507,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8878">
+<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8558">
<summary>
Do not audit attempts to send and receive amqp_server packets.
</summary>
@@ -15472,7 +15518,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_amqp_server_packets" lineno="8893">
+<interface name="corenet_relabelto_amqp_server_packets" lineno="8573">
<summary>
Relabel packets to amqp_server the packet type.
</summary>
@@ -15482,7 +15528,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_aol_port" lineno="8915">
+<interface name="corenet_tcp_sendrecv_aol_port" lineno="8595">
<summary>
Send and receive TCP traffic on the aol port.
</summary>
@@ -15493,7 +15539,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_aol_port" lineno="8934">
+<interface name="corenet_udp_send_aol_port" lineno="8610">
<summary>
Send UDP traffic on the aol port.
</summary>
@@ -15504,7 +15550,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_aol_port" lineno="8953">
+<interface name="corenet_dontaudit_udp_send_aol_port" lineno="8625">
<summary>
Do not audit attempts to send UDP traffic on the aol port.
</summary>
@@ -15515,7 +15561,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_aol_port" lineno="8972">
+<interface name="corenet_udp_receive_aol_port" lineno="8640">
<summary>
Receive UDP traffic on the aol port.
</summary>
@@ -15526,7 +15572,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8991">
+<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8655">
<summary>
Do not audit attempts to receive UDP traffic on the aol port.
</summary>
@@ -15537,7 +15583,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_aol_port" lineno="9010">
+<interface name="corenet_udp_sendrecv_aol_port" lineno="8670">
<summary>
Send and receive UDP traffic on the aol port.
</summary>
@@ -15548,7 +15594,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="9027">
+<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="8686">
<summary>
Do not audit attempts to send and receive
UDP traffic on the aol port.
@@ -15560,7 +15606,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_aol_port" lineno="9043">
+<interface name="corenet_tcp_bind_aol_port" lineno="8701">
<summary>
Bind TCP sockets to the aol port.
</summary>
@@ -15571,7 +15617,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_aol_port" lineno="9063">
+<interface name="corenet_udp_bind_aol_port" lineno="8721">
<summary>
Bind UDP sockets to the aol port.
</summary>
@@ -15582,7 +15628,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_aol_port" lineno="9082">
+<interface name="corenet_tcp_connect_aol_port" lineno="8740">
<summary>
Make a TCP connection to the aol port.
</summary>
@@ -15592,7 +15638,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_aol_client_packets" lineno="9102">
+<interface name="corenet_send_aol_client_packets" lineno="8760">
<summary>
Send aol_client packets.
</summary>
@@ -15603,7 +15649,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_aol_client_packets" lineno="9121">
+<interface name="corenet_dontaudit_send_aol_client_packets" lineno="8779">
<summary>
Do not audit attempts to send aol_client packets.
</summary>
@@ -15614,7 +15660,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_aol_client_packets" lineno="9140">
+<interface name="corenet_receive_aol_client_packets" lineno="8798">
<summary>
Receive aol_client packets.
</summary>
@@ -15625,7 +15671,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="9159">
+<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="8817">
<summary>
Do not audit attempts to receive aol_client packets.
</summary>
@@ -15636,7 +15682,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_aol_client_packets" lineno="9178">
+<interface name="corenet_sendrecv_aol_client_packets" lineno="8836">
<summary>
Send and receive aol_client packets.
</summary>
@@ -15647,7 +15693,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="9194">
+<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="8852">
<summary>
Do not audit attempts to send and receive aol_client packets.
</summary>
@@ -15658,7 +15704,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_aol_client_packets" lineno="9209">
+<interface name="corenet_relabelto_aol_client_packets" lineno="8867">
<summary>
Relabel packets to aol_client the packet type.
</summary>
@@ -15668,7 +15714,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_aol_server_packets" lineno="9229">
+<interface name="corenet_send_aol_server_packets" lineno="8887">
<summary>
Send aol_server packets.
</summary>
@@ -15679,7 +15725,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_aol_server_packets" lineno="9248">
+<interface name="corenet_dontaudit_send_aol_server_packets" lineno="8906">
<summary>
Do not audit attempts to send aol_server packets.
</summary>
@@ -15690,7 +15736,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_aol_server_packets" lineno="9267">
+<interface name="corenet_receive_aol_server_packets" lineno="8925">
<summary>
Receive aol_server packets.
</summary>
@@ -15701,7 +15747,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="9286">
+<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="8944">
<summary>
Do not audit attempts to receive aol_server packets.
</summary>
@@ -15712,7 +15758,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_aol_server_packets" lineno="9305">
+<interface name="corenet_sendrecv_aol_server_packets" lineno="8963">
<summary>
Send and receive aol_server packets.
</summary>
@@ -15723,7 +15769,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="9321">
+<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="8979">
<summary>
Do not audit attempts to send and receive aol_server packets.
</summary>
@@ -15734,7 +15780,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_aol_server_packets" lineno="9336">
+<interface name="corenet_relabelto_aol_server_packets" lineno="8994">
<summary>
Relabel packets to aol_server the packet type.
</summary>
@@ -15744,7 +15790,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="9358">
+<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="9016">
<summary>
Send and receive TCP traffic on the apcupsd port.
</summary>
@@ -15755,7 +15801,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_apcupsd_port" lineno="9377">
+<interface name="corenet_udp_send_apcupsd_port" lineno="9031">
<summary>
Send UDP traffic on the apcupsd port.
</summary>
@@ -15766,7 +15812,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9396">
+<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9046">
<summary>
Do not audit attempts to send UDP traffic on the apcupsd port.
</summary>
@@ -15777,7 +15823,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_apcupsd_port" lineno="9415">
+<interface name="corenet_udp_receive_apcupsd_port" lineno="9061">
<summary>
Receive UDP traffic on the apcupsd port.
</summary>
@@ -15788,7 +15834,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9434">
+<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9076">
<summary>
Do not audit attempts to receive UDP traffic on the apcupsd port.
</summary>
@@ -15799,7 +15845,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9453">
+<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9091">
<summary>
Send and receive UDP traffic on the apcupsd port.
</summary>
@@ -15810,7 +15856,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9470">
+<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9107">
<summary>
Do not audit attempts to send and receive
UDP traffic on the apcupsd port.
@@ -15822,7 +15868,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_apcupsd_port" lineno="9486">
+<interface name="corenet_tcp_bind_apcupsd_port" lineno="9122">
<summary>
Bind TCP sockets to the apcupsd port.
</summary>
@@ -15833,7 +15879,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_apcupsd_port" lineno="9506">
+<interface name="corenet_udp_bind_apcupsd_port" lineno="9142">
<summary>
Bind UDP sockets to the apcupsd port.
</summary>
@@ -15844,7 +15890,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_apcupsd_port" lineno="9525">
+<interface name="corenet_tcp_connect_apcupsd_port" lineno="9161">
<summary>
Make a TCP connection to the apcupsd port.
</summary>
@@ -15854,7 +15900,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_apcupsd_client_packets" lineno="9545">
+<interface name="corenet_send_apcupsd_client_packets" lineno="9181">
<summary>
Send apcupsd_client packets.
</summary>
@@ -15865,7 +15911,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9564">
+<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9200">
<summary>
Do not audit attempts to send apcupsd_client packets.
</summary>
@@ -15876,7 +15922,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_apcupsd_client_packets" lineno="9583">
+<interface name="corenet_receive_apcupsd_client_packets" lineno="9219">
<summary>
Receive apcupsd_client packets.
</summary>
@@ -15887,7 +15933,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9602">
+<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9238">
<summary>
Do not audit attempts to receive apcupsd_client packets.
</summary>
@@ -15898,7 +15944,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9621">
+<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9257">
<summary>
Send and receive apcupsd_client packets.
</summary>
@@ -15909,7 +15955,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9637">
+<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9273">
<summary>
Do not audit attempts to send and receive apcupsd_client packets.
</summary>
@@ -15920,7 +15966,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_apcupsd_client_packets" lineno="9652">
+<interface name="corenet_relabelto_apcupsd_client_packets" lineno="9288">
<summary>
Relabel packets to apcupsd_client the packet type.
</summary>
@@ -15930,7 +15976,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_apcupsd_server_packets" lineno="9672">
+<interface name="corenet_send_apcupsd_server_packets" lineno="9308">
<summary>
Send apcupsd_server packets.
</summary>
@@ -15941,7 +15987,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9691">
+<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9327">
<summary>
Do not audit attempts to send apcupsd_server packets.
</summary>
@@ -15952,7 +15998,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_apcupsd_server_packets" lineno="9710">
+<interface name="corenet_receive_apcupsd_server_packets" lineno="9346">
<summary>
Receive apcupsd_server packets.
</summary>
@@ -15963,7 +16009,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9729">
+<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9365">
<summary>
Do not audit attempts to receive apcupsd_server packets.
</summary>
@@ -15974,7 +16020,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9748">
+<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9384">
<summary>
Send and receive apcupsd_server packets.
</summary>
@@ -15985,7 +16031,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9764">
+<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9400">
<summary>
Do not audit attempts to send and receive apcupsd_server packets.
</summary>
@@ -15996,7 +16042,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_apcupsd_server_packets" lineno="9779">
+<interface name="corenet_relabelto_apcupsd_server_packets" lineno="9415">
<summary>
Relabel packets to apcupsd_server the packet type.
</summary>
@@ -16006,7 +16052,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9801">
+<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9437">
<summary>
Send and receive TCP traffic on the apertus_ldp port.
</summary>
@@ -16017,7 +16063,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_apertus_ldp_port" lineno="9820">
+<interface name="corenet_udp_send_apertus_ldp_port" lineno="9452">
<summary>
Send UDP traffic on the apertus_ldp port.
</summary>
@@ -16028,7 +16074,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9839">
+<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9467">
<summary>
Do not audit attempts to send UDP traffic on the apertus_ldp port.
</summary>
@@ -16039,7 +16085,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_apertus_ldp_port" lineno="9858">
+<interface name="corenet_udp_receive_apertus_ldp_port" lineno="9482">
<summary>
Receive UDP traffic on the apertus_ldp port.
</summary>
@@ -16050,7 +16096,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9877">
+<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9497">
<summary>
Do not audit attempts to receive UDP traffic on the apertus_ldp port.
</summary>
@@ -16061,7 +16107,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9896">
+<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9512">
<summary>
Send and receive UDP traffic on the apertus_ldp port.
</summary>
@@ -16072,7 +16118,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9913">
+<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9528">
<summary>
Do not audit attempts to send and receive
UDP traffic on the apertus_ldp port.
@@ -16084,7 +16130,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9929">
+<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9543">
<summary>
Bind TCP sockets to the apertus_ldp port.
</summary>
@@ -16095,7 +16141,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_apertus_ldp_port" lineno="9949">
+<interface name="corenet_udp_bind_apertus_ldp_port" lineno="9563">
<summary>
Bind UDP sockets to the apertus_ldp port.
</summary>
@@ -16106,7 +16152,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9968">
+<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9582">
<summary>
Make a TCP connection to the apertus_ldp port.
</summary>
@@ -16116,7 +16162,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_apertus_ldp_client_packets" lineno="9988">
+<interface name="corenet_send_apertus_ldp_client_packets" lineno="9602">
<summary>
Send apertus_ldp_client packets.
</summary>
@@ -16127,7 +16173,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="10007">
+<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="9621">
<summary>
Do not audit attempts to send apertus_ldp_client packets.
</summary>
@@ -16138,7 +16184,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_apertus_ldp_client_packets" lineno="10026">
+<interface name="corenet_receive_apertus_ldp_client_packets" lineno="9640">
<summary>
Receive apertus_ldp_client packets.
</summary>
@@ -16149,7 +16195,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="10045">
+<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="9659">
<summary>
Do not audit attempts to receive apertus_ldp_client packets.
</summary>
@@ -16160,7 +16206,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="10064">
+<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="9678">
<summary>
Send and receive apertus_ldp_client packets.
</summary>
@@ -16171,7 +16217,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="10080">
+<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="9694">
<summary>
Do not audit attempts to send and receive apertus_ldp_client packets.
</summary>
@@ -16182,7 +16228,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="10095">
+<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="9709">
<summary>
Relabel packets to apertus_ldp_client the packet type.
</summary>
@@ -16192,7 +16238,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_apertus_ldp_server_packets" lineno="10115">
+<interface name="corenet_send_apertus_ldp_server_packets" lineno="9729">
<summary>
Send apertus_ldp_server packets.
</summary>
@@ -16203,7 +16249,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="10134">
+<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="9748">
<summary>
Do not audit attempts to send apertus_ldp_server packets.
</summary>
@@ -16214,7 +16260,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_apertus_ldp_server_packets" lineno="10153">
+<interface name="corenet_receive_apertus_ldp_server_packets" lineno="9767">
<summary>
Receive apertus_ldp_server packets.
</summary>
@@ -16225,7 +16271,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="10172">
+<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="9786">
<summary>
Do not audit attempts to receive apertus_ldp_server packets.
</summary>
@@ -16236,7 +16282,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="10191">
+<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="9805">
<summary>
Send and receive apertus_ldp_server packets.
</summary>
@@ -16247,7 +16293,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="10207">
+<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="9821">
<summary>
Do not audit attempts to send and receive apertus_ldp_server packets.
</summary>
@@ -16258,7 +16304,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="10222">
+<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="9836">
<summary>
Relabel packets to apertus_ldp_server the packet type.
</summary>
@@ -16268,7 +16314,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_armtechdaemon_port" lineno="10244">
+<interface name="corenet_tcp_sendrecv_armtechdaemon_port" lineno="9858">
<summary>
Send and receive TCP traffic on the armtechdaemon port.
</summary>
@@ -16279,7 +16325,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_armtechdaemon_port" lineno="10263">
+<interface name="corenet_udp_send_armtechdaemon_port" lineno="9873">
<summary>
Send UDP traffic on the armtechdaemon port.
</summary>
@@ -16290,7 +16336,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_armtechdaemon_port" lineno="10282">
+<interface name="corenet_dontaudit_udp_send_armtechdaemon_port" lineno="9888">
<summary>
Do not audit attempts to send UDP traffic on the armtechdaemon port.
</summary>
@@ -16301,7 +16347,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_armtechdaemon_port" lineno="10301">
+<interface name="corenet_udp_receive_armtechdaemon_port" lineno="9903">
<summary>
Receive UDP traffic on the armtechdaemon port.
</summary>
@@ -16312,7 +16358,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_armtechdaemon_port" lineno="10320">
+<interface name="corenet_dontaudit_udp_receive_armtechdaemon_port" lineno="9918">
<summary>
Do not audit attempts to receive UDP traffic on the armtechdaemon port.
</summary>
@@ -16323,7 +16369,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_armtechdaemon_port" lineno="10339">
+<interface name="corenet_udp_sendrecv_armtechdaemon_port" lineno="9933">
<summary>
Send and receive UDP traffic on the armtechdaemon port.
</summary>
@@ -16334,7 +16380,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_armtechdaemon_port" lineno="10356">
+<interface name="corenet_dontaudit_udp_sendrecv_armtechdaemon_port" lineno="9949">
<summary>
Do not audit attempts to send and receive
UDP traffic on the armtechdaemon port.
@@ -16346,7 +16392,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="10372">
+<interface name="corenet_tcp_bind_armtechdaemon_port" lineno="9964">
<summary>
Bind TCP sockets to the armtechdaemon port.
</summary>
@@ -16357,7 +16403,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_armtechdaemon_port" lineno="10392">
+<interface name="corenet_udp_bind_armtechdaemon_port" lineno="9984">
<summary>
Bind UDP sockets to the armtechdaemon port.
</summary>
@@ -16368,7 +16414,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="10411">
+<interface name="corenet_tcp_connect_armtechdaemon_port" lineno="10003">
<summary>
Make a TCP connection to the armtechdaemon port.
</summary>
@@ -16378,7 +16424,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_armtechdaemon_client_packets" lineno="10431">
+<interface name="corenet_send_armtechdaemon_client_packets" lineno="10023">
<summary>
Send armtechdaemon_client packets.
</summary>
@@ -16389,7 +16435,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="10450">
+<interface name="corenet_dontaudit_send_armtechdaemon_client_packets" lineno="10042">
<summary>
Do not audit attempts to send armtechdaemon_client packets.
</summary>
@@ -16400,7 +16446,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_armtechdaemon_client_packets" lineno="10469">
+<interface name="corenet_receive_armtechdaemon_client_packets" lineno="10061">
<summary>
Receive armtechdaemon_client packets.
</summary>
@@ -16411,7 +16457,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="10488">
+<interface name="corenet_dontaudit_receive_armtechdaemon_client_packets" lineno="10080">
<summary>
Do not audit attempts to receive armtechdaemon_client packets.
</summary>
@@ -16422,7 +16468,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="10507">
+<interface name="corenet_sendrecv_armtechdaemon_client_packets" lineno="10099">
<summary>
Send and receive armtechdaemon_client packets.
</summary>
@@ -16433,7 +16479,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="10523">
+<interface name="corenet_dontaudit_sendrecv_armtechdaemon_client_packets" lineno="10115">
<summary>
Do not audit attempts to send and receive armtechdaemon_client packets.
</summary>
@@ -16444,7 +16490,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="10538">
+<interface name="corenet_relabelto_armtechdaemon_client_packets" lineno="10130">
<summary>
Relabel packets to armtechdaemon_client the packet type.
</summary>
@@ -16454,7 +16500,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_armtechdaemon_server_packets" lineno="10558">
+<interface name="corenet_send_armtechdaemon_server_packets" lineno="10150">
<summary>
Send armtechdaemon_server packets.
</summary>
@@ -16465,7 +16511,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="10577">
+<interface name="corenet_dontaudit_send_armtechdaemon_server_packets" lineno="10169">
<summary>
Do not audit attempts to send armtechdaemon_server packets.
</summary>
@@ -16476,7 +16522,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_armtechdaemon_server_packets" lineno="10596">
+<interface name="corenet_receive_armtechdaemon_server_packets" lineno="10188">
<summary>
Receive armtechdaemon_server packets.
</summary>
@@ -16487,7 +16533,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="10615">
+<interface name="corenet_dontaudit_receive_armtechdaemon_server_packets" lineno="10207">
<summary>
Do not audit attempts to receive armtechdaemon_server packets.
</summary>
@@ -16498,7 +16544,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="10634">
+<interface name="corenet_sendrecv_armtechdaemon_server_packets" lineno="10226">
<summary>
Send and receive armtechdaemon_server packets.
</summary>
@@ -16509,7 +16555,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="10650">
+<interface name="corenet_dontaudit_sendrecv_armtechdaemon_server_packets" lineno="10242">
<summary>
Do not audit attempts to send and receive armtechdaemon_server packets.
</summary>
@@ -16520,7 +16566,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="10665">
+<interface name="corenet_relabelto_armtechdaemon_server_packets" lineno="10257">
<summary>
Relabel packets to armtechdaemon_server the packet type.
</summary>
@@ -16530,7 +16576,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="10687">
+<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="10279">
<summary>
Send and receive TCP traffic on the asterisk port.
</summary>
@@ -16541,7 +16587,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_asterisk_port" lineno="10706">
+<interface name="corenet_udp_send_asterisk_port" lineno="10294">
<summary>
Send UDP traffic on the asterisk port.
</summary>
@@ -16552,7 +16598,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="10725">
+<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="10309">
<summary>
Do not audit attempts to send UDP traffic on the asterisk port.
</summary>
@@ -16563,7 +16609,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_asterisk_port" lineno="10744">
+<interface name="corenet_udp_receive_asterisk_port" lineno="10324">
<summary>
Receive UDP traffic on the asterisk port.
</summary>
@@ -16574,7 +16620,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="10763">
+<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="10339">
<summary>
Do not audit attempts to receive UDP traffic on the asterisk port.
</summary>
@@ -16585,7 +16631,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_asterisk_port" lineno="10782">
+<interface name="corenet_udp_sendrecv_asterisk_port" lineno="10354">
<summary>
Send and receive UDP traffic on the asterisk port.
</summary>
@@ -16596,7 +16642,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="10799">
+<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="10370">
<summary>
Do not audit attempts to send and receive
UDP traffic on the asterisk port.
@@ -16608,7 +16654,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_asterisk_port" lineno="10815">
+<interface name="corenet_tcp_bind_asterisk_port" lineno="10385">
<summary>
Bind TCP sockets to the asterisk port.
</summary>
@@ -16619,7 +16665,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_asterisk_port" lineno="10835">
+<interface name="corenet_udp_bind_asterisk_port" lineno="10405">
<summary>
Bind UDP sockets to the asterisk port.
</summary>
@@ -16630,7 +16676,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_asterisk_port" lineno="10854">
+<interface name="corenet_tcp_connect_asterisk_port" lineno="10424">
<summary>
Make a TCP connection to the asterisk port.
</summary>
@@ -16640,7 +16686,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_asterisk_client_packets" lineno="10874">
+<interface name="corenet_send_asterisk_client_packets" lineno="10444">
<summary>
Send asterisk_client packets.
</summary>
@@ -16651,7 +16697,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="10893">
+<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="10463">
<summary>
Do not audit attempts to send asterisk_client packets.
</summary>
@@ -16662,7 +16708,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_asterisk_client_packets" lineno="10912">
+<interface name="corenet_receive_asterisk_client_packets" lineno="10482">
<summary>
Receive asterisk_client packets.
</summary>
@@ -16673,7 +16719,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="10931">
+<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="10501">
<summary>
Do not audit attempts to receive asterisk_client packets.
</summary>
@@ -16684,7 +16730,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_asterisk_client_packets" lineno="10950">
+<interface name="corenet_sendrecv_asterisk_client_packets" lineno="10520">
<summary>
Send and receive asterisk_client packets.
</summary>
@@ -16695,7 +16741,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="10966">
+<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="10536">
<summary>
Do not audit attempts to send and receive asterisk_client packets.
</summary>
@@ -16706,7 +16752,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_asterisk_client_packets" lineno="10981">
+<interface name="corenet_relabelto_asterisk_client_packets" lineno="10551">
<summary>
Relabel packets to asterisk_client the packet type.
</summary>
@@ -16716,7 +16762,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_asterisk_server_packets" lineno="11001">
+<interface name="corenet_send_asterisk_server_packets" lineno="10571">
<summary>
Send asterisk_server packets.
</summary>
@@ -16727,7 +16773,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="11020">
+<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="10590">
<summary>
Do not audit attempts to send asterisk_server packets.
</summary>
@@ -16738,7 +16784,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_asterisk_server_packets" lineno="11039">
+<interface name="corenet_receive_asterisk_server_packets" lineno="10609">
<summary>
Receive asterisk_server packets.
</summary>
@@ -16749,7 +16795,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="11058">
+<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="10628">
<summary>
Do not audit attempts to receive asterisk_server packets.
</summary>
@@ -16760,7 +16806,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_asterisk_server_packets" lineno="11077">
+<interface name="corenet_sendrecv_asterisk_server_packets" lineno="10647">
<summary>
Send and receive asterisk_server packets.
</summary>
@@ -16771,7 +16817,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="11093">
+<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="10663">
<summary>
Do not audit attempts to send and receive asterisk_server packets.
</summary>
@@ -16782,7 +16828,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_asterisk_server_packets" lineno="11108">
+<interface name="corenet_relabelto_asterisk_server_packets" lineno="10678">
<summary>
Relabel packets to asterisk_server the packet type.
</summary>
@@ -16792,7 +16838,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_audit_port" lineno="11130">
+<interface name="corenet_tcp_sendrecv_audit_port" lineno="10700">
<summary>
Send and receive TCP traffic on the audit port.
</summary>
@@ -16803,7 +16849,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_audit_port" lineno="11149">
+<interface name="corenet_udp_send_audit_port" lineno="10715">
<summary>
Send UDP traffic on the audit port.
</summary>
@@ -16814,7 +16860,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_audit_port" lineno="11168">
+<interface name="corenet_dontaudit_udp_send_audit_port" lineno="10730">
<summary>
Do not audit attempts to send UDP traffic on the audit port.
</summary>
@@ -16825,7 +16871,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_audit_port" lineno="11187">
+<interface name="corenet_udp_receive_audit_port" lineno="10745">
<summary>
Receive UDP traffic on the audit port.
</summary>
@@ -16836,7 +16882,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="11206">
+<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="10760">
<summary>
Do not audit attempts to receive UDP traffic on the audit port.
</summary>
@@ -16847,7 +16893,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_audit_port" lineno="11225">
+<interface name="corenet_udp_sendrecv_audit_port" lineno="10775">
<summary>
Send and receive UDP traffic on the audit port.
</summary>
@@ -16858,7 +16904,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="11242">
+<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="10791">
<summary>
Do not audit attempts to send and receive
UDP traffic on the audit port.
@@ -16870,7 +16916,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_audit_port" lineno="11258">
+<interface name="corenet_tcp_bind_audit_port" lineno="10806">
<summary>
Bind TCP sockets to the audit port.
</summary>
@@ -16881,7 +16927,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_audit_port" lineno="11278">
+<interface name="corenet_udp_bind_audit_port" lineno="10826">
<summary>
Bind UDP sockets to the audit port.
</summary>
@@ -16892,7 +16938,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_audit_port" lineno="11297">
+<interface name="corenet_tcp_connect_audit_port" lineno="10845">
<summary>
Make a TCP connection to the audit port.
</summary>
@@ -16902,7 +16948,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_audit_client_packets" lineno="11317">
+<interface name="corenet_send_audit_client_packets" lineno="10865">
<summary>
Send audit_client packets.
</summary>
@@ -16913,7 +16959,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_audit_client_packets" lineno="11336">
+<interface name="corenet_dontaudit_send_audit_client_packets" lineno="10884">
<summary>
Do not audit attempts to send audit_client packets.
</summary>
@@ -16924,7 +16970,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_audit_client_packets" lineno="11355">
+<interface name="corenet_receive_audit_client_packets" lineno="10903">
<summary>
Receive audit_client packets.
</summary>
@@ -16935,7 +16981,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="11374">
+<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="10922">
<summary>
Do not audit attempts to receive audit_client packets.
</summary>
@@ -16946,7 +16992,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_audit_client_packets" lineno="11393">
+<interface name="corenet_sendrecv_audit_client_packets" lineno="10941">
<summary>
Send and receive audit_client packets.
</summary>
@@ -16957,7 +17003,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="11409">
+<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="10957">
<summary>
Do not audit attempts to send and receive audit_client packets.
</summary>
@@ -16968,7 +17014,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_audit_client_packets" lineno="11424">
+<interface name="corenet_relabelto_audit_client_packets" lineno="10972">
<summary>
Relabel packets to audit_client the packet type.
</summary>
@@ -16978,7 +17024,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_audit_server_packets" lineno="11444">
+<interface name="corenet_send_audit_server_packets" lineno="10992">
<summary>
Send audit_server packets.
</summary>
@@ -16989,7 +17035,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_audit_server_packets" lineno="11463">
+<interface name="corenet_dontaudit_send_audit_server_packets" lineno="11011">
<summary>
Do not audit attempts to send audit_server packets.
</summary>
@@ -17000,7 +17046,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_audit_server_packets" lineno="11482">
+<interface name="corenet_receive_audit_server_packets" lineno="11030">
<summary>
Receive audit_server packets.
</summary>
@@ -17011,7 +17057,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="11501">
+<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="11049">
<summary>
Do not audit attempts to receive audit_server packets.
</summary>
@@ -17022,7 +17068,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_audit_server_packets" lineno="11520">
+<interface name="corenet_sendrecv_audit_server_packets" lineno="11068">
<summary>
Send and receive audit_server packets.
</summary>
@@ -17033,7 +17079,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="11536">
+<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="11084">
<summary>
Do not audit attempts to send and receive audit_server packets.
</summary>
@@ -17044,7 +17090,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_audit_server_packets" lineno="11551">
+<interface name="corenet_relabelto_audit_server_packets" lineno="11099">
<summary>
Relabel packets to audit_server the packet type.
</summary>
@@ -17054,7 +17100,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_auth_port" lineno="11573">
+<interface name="corenet_tcp_sendrecv_auth_port" lineno="11121">
<summary>
Send and receive TCP traffic on the auth port.
</summary>
@@ -17065,7 +17111,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_auth_port" lineno="11592">
+<interface name="corenet_udp_send_auth_port" lineno="11136">
<summary>
Send UDP traffic on the auth port.
</summary>
@@ -17076,7 +17122,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_auth_port" lineno="11611">
+<interface name="corenet_dontaudit_udp_send_auth_port" lineno="11151">
<summary>
Do not audit attempts to send UDP traffic on the auth port.
</summary>
@@ -17087,7 +17133,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_auth_port" lineno="11630">
+<interface name="corenet_udp_receive_auth_port" lineno="11166">
<summary>
Receive UDP traffic on the auth port.
</summary>
@@ -17098,7 +17144,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="11649">
+<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="11181">
<summary>
Do not audit attempts to receive UDP traffic on the auth port.
</summary>
@@ -17109,7 +17155,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_auth_port" lineno="11668">
+<interface name="corenet_udp_sendrecv_auth_port" lineno="11196">
<summary>
Send and receive UDP traffic on the auth port.
</summary>
@@ -17120,7 +17166,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="11685">
+<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="11212">
<summary>
Do not audit attempts to send and receive
UDP traffic on the auth port.
@@ -17132,7 +17178,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_auth_port" lineno="11701">
+<interface name="corenet_tcp_bind_auth_port" lineno="11227">
<summary>
Bind TCP sockets to the auth port.
</summary>
@@ -17143,7 +17189,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_auth_port" lineno="11721">
+<interface name="corenet_udp_bind_auth_port" lineno="11247">
<summary>
Bind UDP sockets to the auth port.
</summary>
@@ -17154,7 +17200,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_auth_port" lineno="11740">
+<interface name="corenet_tcp_connect_auth_port" lineno="11266">
<summary>
Make a TCP connection to the auth port.
</summary>
@@ -17164,7 +17210,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_auth_client_packets" lineno="11760">
+<interface name="corenet_send_auth_client_packets" lineno="11286">
<summary>
Send auth_client packets.
</summary>
@@ -17175,7 +17221,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_auth_client_packets" lineno="11779">
+<interface name="corenet_dontaudit_send_auth_client_packets" lineno="11305">
<summary>
Do not audit attempts to send auth_client packets.
</summary>
@@ -17186,7 +17232,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_auth_client_packets" lineno="11798">
+<interface name="corenet_receive_auth_client_packets" lineno="11324">
<summary>
Receive auth_client packets.
</summary>
@@ -17197,7 +17243,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="11817">
+<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="11343">
<summary>
Do not audit attempts to receive auth_client packets.
</summary>
@@ -17208,7 +17254,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_auth_client_packets" lineno="11836">
+<interface name="corenet_sendrecv_auth_client_packets" lineno="11362">
<summary>
Send and receive auth_client packets.
</summary>
@@ -17219,7 +17265,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11852">
+<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11378">
<summary>
Do not audit attempts to send and receive auth_client packets.
</summary>
@@ -17230,7 +17276,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_auth_client_packets" lineno="11867">
+<interface name="corenet_relabelto_auth_client_packets" lineno="11393">
<summary>
Relabel packets to auth_client the packet type.
</summary>
@@ -17240,7 +17286,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_auth_server_packets" lineno="11887">
+<interface name="corenet_send_auth_server_packets" lineno="11413">
<summary>
Send auth_server packets.
</summary>
@@ -17251,7 +17297,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_auth_server_packets" lineno="11906">
+<interface name="corenet_dontaudit_send_auth_server_packets" lineno="11432">
<summary>
Do not audit attempts to send auth_server packets.
</summary>
@@ -17262,7 +17308,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_auth_server_packets" lineno="11925">
+<interface name="corenet_receive_auth_server_packets" lineno="11451">
<summary>
Receive auth_server packets.
</summary>
@@ -17273,7 +17319,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="11944">
+<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="11470">
<summary>
Do not audit attempts to receive auth_server packets.
</summary>
@@ -17284,7 +17330,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_auth_server_packets" lineno="11963">
+<interface name="corenet_sendrecv_auth_server_packets" lineno="11489">
<summary>
Send and receive auth_server packets.
</summary>
@@ -17295,7 +17341,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="11979">
+<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="11505">
<summary>
Do not audit attempts to send and receive auth_server packets.
</summary>
@@ -17306,7 +17352,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_auth_server_packets" lineno="11994">
+<interface name="corenet_relabelto_auth_server_packets" lineno="11520">
<summary>
Relabel packets to auth_server the packet type.
</summary>
@@ -17316,7 +17362,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_bgp_port" lineno="12016">
+<interface name="corenet_tcp_sendrecv_bgp_port" lineno="11542">
<summary>
Send and receive TCP traffic on the bgp port.
</summary>
@@ -17327,7 +17373,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_bgp_port" lineno="12035">
+<interface name="corenet_udp_send_bgp_port" lineno="11557">
<summary>
Send UDP traffic on the bgp port.
</summary>
@@ -17338,7 +17384,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="12054">
+<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="11572">
<summary>
Do not audit attempts to send UDP traffic on the bgp port.
</summary>
@@ -17349,7 +17395,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_bgp_port" lineno="12073">
+<interface name="corenet_udp_receive_bgp_port" lineno="11587">
<summary>
Receive UDP traffic on the bgp port.
</summary>
@@ -17360,7 +17406,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="12092">
+<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="11602">
<summary>
Do not audit attempts to receive UDP traffic on the bgp port.
</summary>
@@ -17371,7 +17417,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_bgp_port" lineno="12111">
+<interface name="corenet_udp_sendrecv_bgp_port" lineno="11617">
<summary>
Send and receive UDP traffic on the bgp port.
</summary>
@@ -17382,7 +17428,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="12128">
+<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="11633">
<summary>
Do not audit attempts to send and receive
UDP traffic on the bgp port.
@@ -17394,7 +17440,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_bgp_port" lineno="12144">
+<interface name="corenet_tcp_bind_bgp_port" lineno="11648">
<summary>
Bind TCP sockets to the bgp port.
</summary>
@@ -17405,7 +17451,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_bgp_port" lineno="12164">
+<interface name="corenet_udp_bind_bgp_port" lineno="11668">
<summary>
Bind UDP sockets to the bgp port.
</summary>
@@ -17416,7 +17462,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_bgp_port" lineno="12183">
+<interface name="corenet_tcp_connect_bgp_port" lineno="11687">
<summary>
Make a TCP connection to the bgp port.
</summary>
@@ -17426,7 +17472,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_bgp_client_packets" lineno="12203">
+<interface name="corenet_send_bgp_client_packets" lineno="11707">
<summary>
Send bgp_client packets.
</summary>
@@ -17437,7 +17483,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="12222">
+<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="11726">
<summary>
Do not audit attempts to send bgp_client packets.
</summary>
@@ -17448,7 +17494,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_bgp_client_packets" lineno="12241">
+<interface name="corenet_receive_bgp_client_packets" lineno="11745">
<summary>
Receive bgp_client packets.
</summary>
@@ -17459,7 +17505,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="12260">
+<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="11764">
<summary>
Do not audit attempts to receive bgp_client packets.
</summary>
@@ -17470,7 +17516,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_bgp_client_packets" lineno="12279">
+<interface name="corenet_sendrecv_bgp_client_packets" lineno="11783">
<summary>
Send and receive bgp_client packets.
</summary>
@@ -17481,7 +17527,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="12295">
+<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="11799">
<summary>
Do not audit attempts to send and receive bgp_client packets.
</summary>
@@ -17492,7 +17538,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_bgp_client_packets" lineno="12310">
+<interface name="corenet_relabelto_bgp_client_packets" lineno="11814">
<summary>
Relabel packets to bgp_client the packet type.
</summary>
@@ -17502,7 +17548,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_bgp_server_packets" lineno="12330">
+<interface name="corenet_send_bgp_server_packets" lineno="11834">
<summary>
Send bgp_server packets.
</summary>
@@ -17513,7 +17559,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="12349">
+<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="11853">
<summary>
Do not audit attempts to send bgp_server packets.
</summary>
@@ -17524,7 +17570,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_bgp_server_packets" lineno="12368">
+<interface name="corenet_receive_bgp_server_packets" lineno="11872">
<summary>
Receive bgp_server packets.
</summary>
@@ -17535,7 +17581,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="12387">
+<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="11891">
<summary>
Do not audit attempts to receive bgp_server packets.
</summary>
@@ -17546,7 +17592,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_bgp_server_packets" lineno="12406">
+<interface name="corenet_sendrecv_bgp_server_packets" lineno="11910">
<summary>
Send and receive bgp_server packets.
</summary>
@@ -17557,7 +17603,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="12422">
+<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="11926">
<summary>
Do not audit attempts to send and receive bgp_server packets.
</summary>
@@ -17568,7 +17614,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_bgp_server_packets" lineno="12437">
+<interface name="corenet_relabelto_bgp_server_packets" lineno="11941">
<summary>
Relabel packets to bgp_server the packet type.
</summary>
@@ -17578,7 +17624,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_bitcoin_port" lineno="12459">
+<interface name="corenet_tcp_sendrecv_bitcoin_port" lineno="11963">
<summary>
Send and receive TCP traffic on the bitcoin port.
</summary>
@@ -17589,7 +17635,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_bitcoin_port" lineno="12478">
+<interface name="corenet_udp_send_bitcoin_port" lineno="11978">
<summary>
Send UDP traffic on the bitcoin port.
</summary>
@@ -17600,7 +17646,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_bitcoin_port" lineno="12497">
+<interface name="corenet_dontaudit_udp_send_bitcoin_port" lineno="11993">
<summary>
Do not audit attempts to send UDP traffic on the bitcoin port.
</summary>
@@ -17611,7 +17657,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_bitcoin_port" lineno="12516">
+<interface name="corenet_udp_receive_bitcoin_port" lineno="12008">
<summary>
Receive UDP traffic on the bitcoin port.
</summary>
@@ -17622,7 +17668,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_bitcoin_port" lineno="12535">
+<interface name="corenet_dontaudit_udp_receive_bitcoin_port" lineno="12023">
<summary>
Do not audit attempts to receive UDP traffic on the bitcoin port.
</summary>
@@ -17633,7 +17679,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_bitcoin_port" lineno="12554">
+<interface name="corenet_udp_sendrecv_bitcoin_port" lineno="12038">
<summary>
Send and receive UDP traffic on the bitcoin port.
</summary>
@@ -17644,7 +17690,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_bitcoin_port" lineno="12571">
+<interface name="corenet_dontaudit_udp_sendrecv_bitcoin_port" lineno="12054">
<summary>
Do not audit attempts to send and receive
UDP traffic on the bitcoin port.
@@ -17656,7 +17702,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_bitcoin_port" lineno="12587">
+<interface name="corenet_tcp_bind_bitcoin_port" lineno="12069">
<summary>
Bind TCP sockets to the bitcoin port.
</summary>
@@ -17667,7 +17713,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_bitcoin_port" lineno="12607">
+<interface name="corenet_udp_bind_bitcoin_port" lineno="12089">
<summary>
Bind UDP sockets to the bitcoin port.
</summary>
@@ -17678,7 +17724,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_bitcoin_port" lineno="12626">
+<interface name="corenet_tcp_connect_bitcoin_port" lineno="12108">
<summary>
Make a TCP connection to the bitcoin port.
</summary>
@@ -17688,7 +17734,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_bitcoin_client_packets" lineno="12646">
+<interface name="corenet_send_bitcoin_client_packets" lineno="12128">
<summary>
Send bitcoin_client packets.
</summary>
@@ -17699,7 +17745,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="12665">
+<interface name="corenet_dontaudit_send_bitcoin_client_packets" lineno="12147">
<summary>
Do not audit attempts to send bitcoin_client packets.
</summary>
@@ -17710,7 +17756,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_bitcoin_client_packets" lineno="12684">
+<interface name="corenet_receive_bitcoin_client_packets" lineno="12166">
<summary>
Receive bitcoin_client packets.
</summary>
@@ -17721,7 +17767,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="12703">
+<interface name="corenet_dontaudit_receive_bitcoin_client_packets" lineno="12185">
<summary>
Do not audit attempts to receive bitcoin_client packets.
</summary>
@@ -17732,7 +17778,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="12722">
+<interface name="corenet_sendrecv_bitcoin_client_packets" lineno="12204">
<summary>
Send and receive bitcoin_client packets.
</summary>
@@ -17743,7 +17789,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="12738">
+<interface name="corenet_dontaudit_sendrecv_bitcoin_client_packets" lineno="12220">
<summary>
Do not audit attempts to send and receive bitcoin_client packets.
</summary>
@@ -17754,7 +17800,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_bitcoin_client_packets" lineno="12753">
+<interface name="corenet_relabelto_bitcoin_client_packets" lineno="12235">
<summary>
Relabel packets to bitcoin_client the packet type.
</summary>
@@ -17764,7 +17810,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_bitcoin_server_packets" lineno="12773">
+<interface name="corenet_send_bitcoin_server_packets" lineno="12255">
<summary>
Send bitcoin_server packets.
</summary>
@@ -17775,7 +17821,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="12792">
+<interface name="corenet_dontaudit_send_bitcoin_server_packets" lineno="12274">
<summary>
Do not audit attempts to send bitcoin_server packets.
</summary>
@@ -17786,7 +17832,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_bitcoin_server_packets" lineno="12811">
+<interface name="corenet_receive_bitcoin_server_packets" lineno="12293">
<summary>
Receive bitcoin_server packets.
</summary>
@@ -17797,7 +17843,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="12830">
+<interface name="corenet_dontaudit_receive_bitcoin_server_packets" lineno="12312">
<summary>
Do not audit attempts to receive bitcoin_server packets.
</summary>
@@ -17808,7 +17854,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="12849">
+<interface name="corenet_sendrecv_bitcoin_server_packets" lineno="12331">
<summary>
Send and receive bitcoin_server packets.
</summary>
@@ -17819,7 +17865,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="12865">
+<interface name="corenet_dontaudit_sendrecv_bitcoin_server_packets" lineno="12347">
<summary>
Do not audit attempts to send and receive bitcoin_server packets.
</summary>
@@ -17830,7 +17876,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_bitcoin_server_packets" lineno="12880">
+<interface name="corenet_relabelto_bitcoin_server_packets" lineno="12362">
<summary>
Relabel packets to bitcoin_server the packet type.
</summary>
@@ -17840,7 +17886,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_boinc_port" lineno="12902">
+<interface name="corenet_tcp_sendrecv_boinc_port" lineno="12384">
<summary>
Send and receive TCP traffic on the boinc port.
</summary>
@@ -17851,7 +17897,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_boinc_port" lineno="12921">
+<interface name="corenet_udp_send_boinc_port" lineno="12399">
<summary>
Send UDP traffic on the boinc port.
</summary>
@@ -17862,7 +17908,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12940">
+<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12414">
<summary>
Do not audit attempts to send UDP traffic on the boinc port.
</summary>
@@ -17873,7 +17919,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_boinc_port" lineno="12959">
+<interface name="corenet_udp_receive_boinc_port" lineno="12429">
<summary>
Receive UDP traffic on the boinc port.
</summary>
@@ -17884,7 +17930,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="12978">
+<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="12444">
<summary>
Do not audit attempts to receive UDP traffic on the boinc port.
</summary>
@@ -17895,7 +17941,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_boinc_port" lineno="12997">
+<interface name="corenet_udp_sendrecv_boinc_port" lineno="12459">
<summary>
Send and receive UDP traffic on the boinc port.
</summary>
@@ -17906,7 +17952,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="13014">
+<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="12475">
<summary>
Do not audit attempts to send and receive
UDP traffic on the boinc port.
@@ -17918,7 +17964,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_boinc_port" lineno="13030">
+<interface name="corenet_tcp_bind_boinc_port" lineno="12490">
<summary>
Bind TCP sockets to the boinc port.
</summary>
@@ -17929,7 +17975,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_boinc_port" lineno="13050">
+<interface name="corenet_udp_bind_boinc_port" lineno="12510">
<summary>
Bind UDP sockets to the boinc port.
</summary>
@@ -17940,7 +17986,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_boinc_port" lineno="13069">
+<interface name="corenet_tcp_connect_boinc_port" lineno="12529">
<summary>
Make a TCP connection to the boinc port.
</summary>
@@ -17950,7 +17996,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_boinc_client_packets" lineno="13089">
+<interface name="corenet_send_boinc_client_packets" lineno="12549">
<summary>
Send boinc_client packets.
</summary>
@@ -17961,7 +18007,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="13108">
+<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="12568">
<summary>
Do not audit attempts to send boinc_client packets.
</summary>
@@ -17972,7 +18018,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_boinc_client_packets" lineno="13127">
+<interface name="corenet_receive_boinc_client_packets" lineno="12587">
<summary>
Receive boinc_client packets.
</summary>
@@ -17983,7 +18029,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="13146">
+<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="12606">
<summary>
Do not audit attempts to receive boinc_client packets.
</summary>
@@ -17994,7 +18040,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_boinc_client_packets" lineno="13165">
+<interface name="corenet_sendrecv_boinc_client_packets" lineno="12625">
<summary>
Send and receive boinc_client packets.
</summary>
@@ -18005,7 +18051,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="13181">
+<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="12641">
<summary>
Do not audit attempts to send and receive boinc_client packets.
</summary>
@@ -18016,7 +18062,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_boinc_client_packets" lineno="13196">
+<interface name="corenet_relabelto_boinc_client_packets" lineno="12656">
<summary>
Relabel packets to boinc_client the packet type.
</summary>
@@ -18026,7 +18072,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_boinc_server_packets" lineno="13216">
+<interface name="corenet_send_boinc_server_packets" lineno="12676">
<summary>
Send boinc_server packets.
</summary>
@@ -18037,7 +18083,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="13235">
+<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="12695">
<summary>
Do not audit attempts to send boinc_server packets.
</summary>
@@ -18048,7 +18094,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_boinc_server_packets" lineno="13254">
+<interface name="corenet_receive_boinc_server_packets" lineno="12714">
<summary>
Receive boinc_server packets.
</summary>
@@ -18059,7 +18105,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="13273">
+<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="12733">
<summary>
Do not audit attempts to receive boinc_server packets.
</summary>
@@ -18070,7 +18116,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_boinc_server_packets" lineno="13292">
+<interface name="corenet_sendrecv_boinc_server_packets" lineno="12752">
<summary>
Send and receive boinc_server packets.
</summary>
@@ -18081,7 +18127,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="13308">
+<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="12768">
<summary>
Do not audit attempts to send and receive boinc_server packets.
</summary>
@@ -18092,7 +18138,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_boinc_server_packets" lineno="13323">
+<interface name="corenet_relabelto_boinc_server_packets" lineno="12783">
<summary>
Relabel packets to boinc_server the packet type.
</summary>
@@ -18102,7 +18148,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="13345">
+<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="12805">
<summary>
Send and receive TCP traffic on the boinc_client port.
</summary>
@@ -18113,7 +18159,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_boinc_client_port" lineno="13364">
+<interface name="corenet_udp_send_boinc_client_port" lineno="12820">
<summary>
Send UDP traffic on the boinc_client port.
</summary>
@@ -18124,7 +18170,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="13383">
+<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="12835">
<summary>
Do not audit attempts to send UDP traffic on the boinc_client port.
</summary>
@@ -18135,7 +18181,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_boinc_client_port" lineno="13402">
+<interface name="corenet_udp_receive_boinc_client_port" lineno="12850">
<summary>
Receive UDP traffic on the boinc_client port.
</summary>
@@ -18146,7 +18192,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="13421">
+<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="12865">
<summary>
Do not audit attempts to receive UDP traffic on the boinc_client port.
</summary>
@@ -18157,7 +18203,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="13440">
+<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="12880">
<summary>
Send and receive UDP traffic on the boinc_client port.
</summary>
@@ -18168,7 +18214,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="13457">
+<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="12896">
<summary>
Do not audit attempts to send and receive
UDP traffic on the boinc_client port.
@@ -18180,7 +18226,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_boinc_client_port" lineno="13473">
+<interface name="corenet_tcp_bind_boinc_client_port" lineno="12911">
<summary>
Bind TCP sockets to the boinc_client port.
</summary>
@@ -18191,7 +18237,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_boinc_client_port" lineno="13493">
+<interface name="corenet_udp_bind_boinc_client_port" lineno="12931">
<summary>
Bind UDP sockets to the boinc_client port.
</summary>
@@ -18202,7 +18248,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_boinc_client_port" lineno="13512">
+<interface name="corenet_tcp_connect_boinc_client_port" lineno="12950">
<summary>
Make a TCP connection to the boinc_client port.
</summary>
@@ -18212,7 +18258,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_boinc_client_client_packets" lineno="13532">
+<interface name="corenet_send_boinc_client_client_packets" lineno="12970">
<summary>
Send boinc_client_client packets.
</summary>
@@ -18223,7 +18269,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="13551">
+<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="12989">
<summary>
Do not audit attempts to send boinc_client_client packets.
</summary>
@@ -18234,7 +18280,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_boinc_client_client_packets" lineno="13570">
+<interface name="corenet_receive_boinc_client_client_packets" lineno="13008">
<summary>
Receive boinc_client_client packets.
</summary>
@@ -18245,7 +18291,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="13589">
+<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="13027">
<summary>
Do not audit attempts to receive boinc_client_client packets.
</summary>
@@ -18256,7 +18302,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="13608">
+<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="13046">
<summary>
Send and receive boinc_client_client packets.
</summary>
@@ -18267,7 +18313,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="13624">
+<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="13062">
<summary>
Do not audit attempts to send and receive boinc_client_client packets.
</summary>
@@ -18278,7 +18324,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_boinc_client_client_packets" lineno="13639">
+<interface name="corenet_relabelto_boinc_client_client_packets" lineno="13077">
<summary>
Relabel packets to boinc_client_client the packet type.
</summary>
@@ -18288,7 +18334,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_boinc_client_server_packets" lineno="13659">
+<interface name="corenet_send_boinc_client_server_packets" lineno="13097">
<summary>
Send boinc_client_server packets.
</summary>
@@ -18299,7 +18345,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="13678">
+<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="13116">
<summary>
Do not audit attempts to send boinc_client_server packets.
</summary>
@@ -18310,7 +18356,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_boinc_client_server_packets" lineno="13697">
+<interface name="corenet_receive_boinc_client_server_packets" lineno="13135">
<summary>
Receive boinc_client_server packets.
</summary>
@@ -18321,7 +18367,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="13716">
+<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="13154">
<summary>
Do not audit attempts to receive boinc_client_server packets.
</summary>
@@ -18332,7 +18378,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="13735">
+<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="13173">
<summary>
Send and receive boinc_client_server packets.
</summary>
@@ -18343,7 +18389,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="13751">
+<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="13189">
<summary>
Do not audit attempts to send and receive boinc_client_server packets.
</summary>
@@ -18354,7 +18400,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_boinc_client_server_packets" lineno="13766">
+<interface name="corenet_relabelto_boinc_client_server_packets" lineno="13204">
<summary>
Relabel packets to boinc_client_server the packet type.
</summary>
@@ -18364,7 +18410,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_biff_port" lineno="13788">
+<interface name="corenet_tcp_sendrecv_biff_port" lineno="13226">
<summary>
Send and receive TCP traffic on the biff port.
</summary>
@@ -18375,7 +18421,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_biff_port" lineno="13807">
+<interface name="corenet_udp_send_biff_port" lineno="13241">
<summary>
Send UDP traffic on the biff port.
</summary>
@@ -18386,7 +18432,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_biff_port" lineno="13826">
+<interface name="corenet_dontaudit_udp_send_biff_port" lineno="13256">
<summary>
Do not audit attempts to send UDP traffic on the biff port.
</summary>
@@ -18397,7 +18443,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_biff_port" lineno="13845">
+<interface name="corenet_udp_receive_biff_port" lineno="13271">
<summary>
Receive UDP traffic on the biff port.
</summary>
@@ -18408,7 +18454,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="13864">
+<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="13286">
<summary>
Do not audit attempts to receive UDP traffic on the biff port.
</summary>
@@ -18419,7 +18465,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_biff_port" lineno="13883">
+<interface name="corenet_udp_sendrecv_biff_port" lineno="13301">
<summary>
Send and receive UDP traffic on the biff port.
</summary>
@@ -18430,7 +18476,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="13900">
+<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="13317">
<summary>
Do not audit attempts to send and receive
UDP traffic on the biff port.
@@ -18442,7 +18488,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_biff_port" lineno="13916">
+<interface name="corenet_tcp_bind_biff_port" lineno="13332">
<summary>
Bind TCP sockets to the biff port.
</summary>
@@ -18453,7 +18499,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_biff_port" lineno="13936">
+<interface name="corenet_udp_bind_biff_port" lineno="13352">
<summary>
Bind UDP sockets to the biff port.
</summary>
@@ -18464,7 +18510,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_biff_port" lineno="13955">
+<interface name="corenet_tcp_connect_biff_port" lineno="13371">
<summary>
Make a TCP connection to the biff port.
</summary>
@@ -18474,7 +18520,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_biff_client_packets" lineno="13975">
+<interface name="corenet_send_biff_client_packets" lineno="13391">
<summary>
Send biff_client packets.
</summary>
@@ -18485,7 +18531,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_biff_client_packets" lineno="13994">
+<interface name="corenet_dontaudit_send_biff_client_packets" lineno="13410">
<summary>
Do not audit attempts to send biff_client packets.
</summary>
@@ -18496,7 +18542,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_biff_client_packets" lineno="14013">
+<interface name="corenet_receive_biff_client_packets" lineno="13429">
<summary>
Receive biff_client packets.
</summary>
@@ -18507,7 +18553,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="14032">
+<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="13448">
<summary>
Do not audit attempts to receive biff_client packets.
</summary>
@@ -18518,7 +18564,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_biff_client_packets" lineno="14051">
+<interface name="corenet_sendrecv_biff_client_packets" lineno="13467">
<summary>
Send and receive biff_client packets.
</summary>
@@ -18529,7 +18575,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="14067">
+<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="13483">
<summary>
Do not audit attempts to send and receive biff_client packets.
</summary>
@@ -18540,7 +18586,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_biff_client_packets" lineno="14082">
+<interface name="corenet_relabelto_biff_client_packets" lineno="13498">
<summary>
Relabel packets to biff_client the packet type.
</summary>
@@ -18550,7 +18596,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_biff_server_packets" lineno="14102">
+<interface name="corenet_send_biff_server_packets" lineno="13518">
<summary>
Send biff_server packets.
</summary>
@@ -18561,7 +18607,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_biff_server_packets" lineno="14121">
+<interface name="corenet_dontaudit_send_biff_server_packets" lineno="13537">
<summary>
Do not audit attempts to send biff_server packets.
</summary>
@@ -18572,7 +18618,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_biff_server_packets" lineno="14140">
+<interface name="corenet_receive_biff_server_packets" lineno="13556">
<summary>
Receive biff_server packets.
</summary>
@@ -18583,7 +18629,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="14159">
+<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="13575">
<summary>
Do not audit attempts to receive biff_server packets.
</summary>
@@ -18594,7 +18640,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_biff_server_packets" lineno="14178">
+<interface name="corenet_sendrecv_biff_server_packets" lineno="13594">
<summary>
Send and receive biff_server packets.
</summary>
@@ -18605,7 +18651,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="14194">
+<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="13610">
<summary>
Do not audit attempts to send and receive biff_server packets.
</summary>
@@ -18616,7 +18662,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_biff_server_packets" lineno="14209">
+<interface name="corenet_relabelto_biff_server_packets" lineno="13625">
<summary>
Relabel packets to biff_server the packet type.
</summary>
@@ -18626,7 +18672,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="14231">
+<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="13647">
<summary>
Send and receive TCP traffic on the certmaster port.
</summary>
@@ -18637,7 +18683,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_certmaster_port" lineno="14250">
+<interface name="corenet_udp_send_certmaster_port" lineno="13662">
<summary>
Send UDP traffic on the certmaster port.
</summary>
@@ -18648,7 +18694,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="14269">
+<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="13677">
<summary>
Do not audit attempts to send UDP traffic on the certmaster port.
</summary>
@@ -18659,7 +18705,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_certmaster_port" lineno="14288">
+<interface name="corenet_udp_receive_certmaster_port" lineno="13692">
<summary>
Receive UDP traffic on the certmaster port.
</summary>
@@ -18670,7 +18716,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="14307">
+<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="13707">
<summary>
Do not audit attempts to receive UDP traffic on the certmaster port.
</summary>
@@ -18681,7 +18727,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_certmaster_port" lineno="14326">
+<interface name="corenet_udp_sendrecv_certmaster_port" lineno="13722">
<summary>
Send and receive UDP traffic on the certmaster port.
</summary>
@@ -18692,7 +18738,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="14343">
+<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="13738">
<summary>
Do not audit attempts to send and receive
UDP traffic on the certmaster port.
@@ -18704,7 +18750,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_certmaster_port" lineno="14359">
+<interface name="corenet_tcp_bind_certmaster_port" lineno="13753">
<summary>
Bind TCP sockets to the certmaster port.
</summary>
@@ -18715,7 +18761,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_certmaster_port" lineno="14379">
+<interface name="corenet_udp_bind_certmaster_port" lineno="13773">
<summary>
Bind UDP sockets to the certmaster port.
</summary>
@@ -18726,7 +18772,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_certmaster_port" lineno="14398">
+<interface name="corenet_tcp_connect_certmaster_port" lineno="13792">
<summary>
Make a TCP connection to the certmaster port.
</summary>
@@ -18736,7 +18782,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_certmaster_client_packets" lineno="14418">
+<interface name="corenet_send_certmaster_client_packets" lineno="13812">
<summary>
Send certmaster_client packets.
</summary>
@@ -18747,7 +18793,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="14437">
+<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="13831">
<summary>
Do not audit attempts to send certmaster_client packets.
</summary>
@@ -18758,7 +18804,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_certmaster_client_packets" lineno="14456">
+<interface name="corenet_receive_certmaster_client_packets" lineno="13850">
<summary>
Receive certmaster_client packets.
</summary>
@@ -18769,7 +18815,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="14475">
+<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="13869">
<summary>
Do not audit attempts to receive certmaster_client packets.
</summary>
@@ -18780,7 +18826,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_certmaster_client_packets" lineno="14494">
+<interface name="corenet_sendrecv_certmaster_client_packets" lineno="13888">
<summary>
Send and receive certmaster_client packets.
</summary>
@@ -18791,7 +18837,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="14510">
+<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="13904">
<summary>
Do not audit attempts to send and receive certmaster_client packets.
</summary>
@@ -18802,7 +18848,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_certmaster_client_packets" lineno="14525">
+<interface name="corenet_relabelto_certmaster_client_packets" lineno="13919">
<summary>
Relabel packets to certmaster_client the packet type.
</summary>
@@ -18812,7 +18858,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_certmaster_server_packets" lineno="14545">
+<interface name="corenet_send_certmaster_server_packets" lineno="13939">
<summary>
Send certmaster_server packets.
</summary>
@@ -18823,7 +18869,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="14564">
+<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="13958">
<summary>
Do not audit attempts to send certmaster_server packets.
</summary>
@@ -18834,7 +18880,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_certmaster_server_packets" lineno="14583">
+<interface name="corenet_receive_certmaster_server_packets" lineno="13977">
<summary>
Receive certmaster_server packets.
</summary>
@@ -18845,7 +18891,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="14602">
+<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="13996">
<summary>
Do not audit attempts to receive certmaster_server packets.
</summary>
@@ -18856,7 +18902,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_certmaster_server_packets" lineno="14621">
+<interface name="corenet_sendrecv_certmaster_server_packets" lineno="14015">
<summary>
Send and receive certmaster_server packets.
</summary>
@@ -18867,7 +18913,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="14637">
+<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="14031">
<summary>
Do not audit attempts to send and receive certmaster_server packets.
</summary>
@@ -18878,7 +18924,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_certmaster_server_packets" lineno="14652">
+<interface name="corenet_relabelto_certmaster_server_packets" lineno="14046">
<summary>
Relabel packets to certmaster_server the packet type.
</summary>
@@ -18888,7 +18934,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="14674">
+<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="14068">
<summary>
Send and receive TCP traffic on the chronyd port.
</summary>
@@ -18899,7 +18945,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_chronyd_port" lineno="14693">
+<interface name="corenet_udp_send_chronyd_port" lineno="14083">
<summary>
Send UDP traffic on the chronyd port.
</summary>
@@ -18910,7 +18956,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="14712">
+<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="14098">
<summary>
Do not audit attempts to send UDP traffic on the chronyd port.
</summary>
@@ -18921,7 +18967,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_chronyd_port" lineno="14731">
+<interface name="corenet_udp_receive_chronyd_port" lineno="14113">
<summary>
Receive UDP traffic on the chronyd port.
</summary>
@@ -18932,7 +18978,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="14750">
+<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="14128">
<summary>
Do not audit attempts to receive UDP traffic on the chronyd port.
</summary>
@@ -18943,7 +18989,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_chronyd_port" lineno="14769">
+<interface name="corenet_udp_sendrecv_chronyd_port" lineno="14143">
<summary>
Send and receive UDP traffic on the chronyd port.
</summary>
@@ -18954,7 +19000,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="14786">
+<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="14159">
<summary>
Do not audit attempts to send and receive
UDP traffic on the chronyd port.
@@ -18966,7 +19012,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_chronyd_port" lineno="14802">
+<interface name="corenet_tcp_bind_chronyd_port" lineno="14174">
<summary>
Bind TCP sockets to the chronyd port.
</summary>
@@ -18977,7 +19023,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_chronyd_port" lineno="14822">
+<interface name="corenet_udp_bind_chronyd_port" lineno="14194">
<summary>
Bind UDP sockets to the chronyd port.
</summary>
@@ -18988,7 +19034,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_chronyd_port" lineno="14841">
+<interface name="corenet_tcp_connect_chronyd_port" lineno="14213">
<summary>
Make a TCP connection to the chronyd port.
</summary>
@@ -18998,7 +19044,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_chronyd_client_packets" lineno="14861">
+<interface name="corenet_send_chronyd_client_packets" lineno="14233">
<summary>
Send chronyd_client packets.
</summary>
@@ -19009,7 +19055,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14880">
+<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14252">
<summary>
Do not audit attempts to send chronyd_client packets.
</summary>
@@ -19020,7 +19066,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_chronyd_client_packets" lineno="14899">
+<interface name="corenet_receive_chronyd_client_packets" lineno="14271">
<summary>
Receive chronyd_client packets.
</summary>
@@ -19031,7 +19077,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14918">
+<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14290">
<summary>
Do not audit attempts to receive chronyd_client packets.
</summary>
@@ -19042,7 +19088,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_chronyd_client_packets" lineno="14937">
+<interface name="corenet_sendrecv_chronyd_client_packets" lineno="14309">
<summary>
Send and receive chronyd_client packets.
</summary>
@@ -19053,7 +19099,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14953">
+<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14325">
<summary>
Do not audit attempts to send and receive chronyd_client packets.
</summary>
@@ -19064,7 +19110,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_chronyd_client_packets" lineno="14968">
+<interface name="corenet_relabelto_chronyd_client_packets" lineno="14340">
<summary>
Relabel packets to chronyd_client the packet type.
</summary>
@@ -19074,7 +19120,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_chronyd_server_packets" lineno="14988">
+<interface name="corenet_send_chronyd_server_packets" lineno="14360">
<summary>
Send chronyd_server packets.
</summary>
@@ -19085,7 +19131,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="15007">
+<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="14379">
<summary>
Do not audit attempts to send chronyd_server packets.
</summary>
@@ -19096,7 +19142,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_chronyd_server_packets" lineno="15026">
+<interface name="corenet_receive_chronyd_server_packets" lineno="14398">
<summary>
Receive chronyd_server packets.
</summary>
@@ -19107,7 +19153,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="15045">
+<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="14417">
<summary>
Do not audit attempts to receive chronyd_server packets.
</summary>
@@ -19118,7 +19164,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_chronyd_server_packets" lineno="15064">
+<interface name="corenet_sendrecv_chronyd_server_packets" lineno="14436">
<summary>
Send and receive chronyd_server packets.
</summary>
@@ -19129,7 +19175,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="15080">
+<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="14452">
<summary>
Do not audit attempts to send and receive chronyd_server packets.
</summary>
@@ -19140,7 +19186,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_chronyd_server_packets" lineno="15095">
+<interface name="corenet_relabelto_chronyd_server_packets" lineno="14467">
<summary>
Relabel packets to chronyd_server the packet type.
</summary>
@@ -19150,7 +19196,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_clamd_port" lineno="15117">
+<interface name="corenet_tcp_sendrecv_clamd_port" lineno="14489">
<summary>
Send and receive TCP traffic on the clamd port.
</summary>
@@ -19161,7 +19207,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_clamd_port" lineno="15136">
+<interface name="corenet_udp_send_clamd_port" lineno="14504">
<summary>
Send UDP traffic on the clamd port.
</summary>
@@ -19172,7 +19218,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="15155">
+<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="14519">
<summary>
Do not audit attempts to send UDP traffic on the clamd port.
</summary>
@@ -19183,7 +19229,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_clamd_port" lineno="15174">
+<interface name="corenet_udp_receive_clamd_port" lineno="14534">
<summary>
Receive UDP traffic on the clamd port.
</summary>
@@ -19194,7 +19240,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="15193">
+<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="14549">
<summary>
Do not audit attempts to receive UDP traffic on the clamd port.
</summary>
@@ -19205,7 +19251,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_clamd_port" lineno="15212">
+<interface name="corenet_udp_sendrecv_clamd_port" lineno="14564">
<summary>
Send and receive UDP traffic on the clamd port.
</summary>
@@ -19216,7 +19262,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="15229">
+<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="14580">
<summary>
Do not audit attempts to send and receive
UDP traffic on the clamd port.
@@ -19228,7 +19274,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_clamd_port" lineno="15245">
+<interface name="corenet_tcp_bind_clamd_port" lineno="14595">
<summary>
Bind TCP sockets to the clamd port.
</summary>
@@ -19239,7 +19285,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_clamd_port" lineno="15265">
+<interface name="corenet_udp_bind_clamd_port" lineno="14615">
<summary>
Bind UDP sockets to the clamd port.
</summary>
@@ -19250,7 +19296,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_clamd_port" lineno="15284">
+<interface name="corenet_tcp_connect_clamd_port" lineno="14634">
<summary>
Make a TCP connection to the clamd port.
</summary>
@@ -19260,7 +19306,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_clamd_client_packets" lineno="15304">
+<interface name="corenet_send_clamd_client_packets" lineno="14654">
<summary>
Send clamd_client packets.
</summary>
@@ -19271,7 +19317,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="15323">
+<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="14673">
<summary>
Do not audit attempts to send clamd_client packets.
</summary>
@@ -19282,7 +19328,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_clamd_client_packets" lineno="15342">
+<interface name="corenet_receive_clamd_client_packets" lineno="14692">
<summary>
Receive clamd_client packets.
</summary>
@@ -19293,7 +19339,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="15361">
+<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="14711">
<summary>
Do not audit attempts to receive clamd_client packets.
</summary>
@@ -19304,7 +19350,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_clamd_client_packets" lineno="15380">
+<interface name="corenet_sendrecv_clamd_client_packets" lineno="14730">
<summary>
Send and receive clamd_client packets.
</summary>
@@ -19315,7 +19361,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="15396">
+<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="14746">
<summary>
Do not audit attempts to send and receive clamd_client packets.
</summary>
@@ -19326,7 +19372,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_clamd_client_packets" lineno="15411">
+<interface name="corenet_relabelto_clamd_client_packets" lineno="14761">
<summary>
Relabel packets to clamd_client the packet type.
</summary>
@@ -19336,7 +19382,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_clamd_server_packets" lineno="15431">
+<interface name="corenet_send_clamd_server_packets" lineno="14781">
<summary>
Send clamd_server packets.
</summary>
@@ -19347,7 +19393,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="15450">
+<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="14800">
<summary>
Do not audit attempts to send clamd_server packets.
</summary>
@@ -19358,7 +19404,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_clamd_server_packets" lineno="15469">
+<interface name="corenet_receive_clamd_server_packets" lineno="14819">
<summary>
Receive clamd_server packets.
</summary>
@@ -19369,7 +19415,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="15488">
+<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="14838">
<summary>
Do not audit attempts to receive clamd_server packets.
</summary>
@@ -19380,7 +19426,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_clamd_server_packets" lineno="15507">
+<interface name="corenet_sendrecv_clamd_server_packets" lineno="14857">
<summary>
Send and receive clamd_server packets.
</summary>
@@ -19391,7 +19437,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="15523">
+<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="14873">
<summary>
Do not audit attempts to send and receive clamd_server packets.
</summary>
@@ -19402,7 +19448,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_clamd_server_packets" lineno="15538">
+<interface name="corenet_relabelto_clamd_server_packets" lineno="14888">
<summary>
Relabel packets to clamd_server the packet type.
</summary>
@@ -19412,7 +19458,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="15560">
+<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="14910">
<summary>
Send and receive TCP traffic on the clockspeed port.
</summary>
@@ -19423,7 +19469,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_clockspeed_port" lineno="15579">
+<interface name="corenet_udp_send_clockspeed_port" lineno="14925">
<summary>
Send UDP traffic on the clockspeed port.
</summary>
@@ -19434,7 +19480,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="15598">
+<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="14940">
<summary>
Do not audit attempts to send UDP traffic on the clockspeed port.
</summary>
@@ -19445,7 +19491,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_clockspeed_port" lineno="15617">
+<interface name="corenet_udp_receive_clockspeed_port" lineno="14955">
<summary>
Receive UDP traffic on the clockspeed port.
</summary>
@@ -19456,7 +19502,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="15636">
+<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="14970">
<summary>
Do not audit attempts to receive UDP traffic on the clockspeed port.
</summary>
@@ -19467,7 +19513,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="15655">
+<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="14985">
<summary>
Send and receive UDP traffic on the clockspeed port.
</summary>
@@ -19478,7 +19524,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="15672">
+<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="15001">
<summary>
Do not audit attempts to send and receive
UDP traffic on the clockspeed port.
@@ -19490,7 +19536,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_clockspeed_port" lineno="15688">
+<interface name="corenet_tcp_bind_clockspeed_port" lineno="15016">
<summary>
Bind TCP sockets to the clockspeed port.
</summary>
@@ -19501,7 +19547,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_clockspeed_port" lineno="15708">
+<interface name="corenet_udp_bind_clockspeed_port" lineno="15036">
<summary>
Bind UDP sockets to the clockspeed port.
</summary>
@@ -19512,7 +19558,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_clockspeed_port" lineno="15727">
+<interface name="corenet_tcp_connect_clockspeed_port" lineno="15055">
<summary>
Make a TCP connection to the clockspeed port.
</summary>
@@ -19522,7 +19568,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_clockspeed_client_packets" lineno="15747">
+<interface name="corenet_send_clockspeed_client_packets" lineno="15075">
<summary>
Send clockspeed_client packets.
</summary>
@@ -19533,7 +19579,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="15766">
+<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="15094">
<summary>
Do not audit attempts to send clockspeed_client packets.
</summary>
@@ -19544,7 +19590,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_clockspeed_client_packets" lineno="15785">
+<interface name="corenet_receive_clockspeed_client_packets" lineno="15113">
<summary>
Receive clockspeed_client packets.
</summary>
@@ -19555,7 +19601,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="15804">
+<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="15132">
<summary>
Do not audit attempts to receive clockspeed_client packets.
</summary>
@@ -19566,7 +19612,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="15823">
+<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="15151">
<summary>
Send and receive clockspeed_client packets.
</summary>
@@ -19577,7 +19623,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15839">
+<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15167">
<summary>
Do not audit attempts to send and receive clockspeed_client packets.
</summary>
@@ -19588,7 +19634,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_clockspeed_client_packets" lineno="15854">
+<interface name="corenet_relabelto_clockspeed_client_packets" lineno="15182">
<summary>
Relabel packets to clockspeed_client the packet type.
</summary>
@@ -19598,7 +19644,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_clockspeed_server_packets" lineno="15874">
+<interface name="corenet_send_clockspeed_server_packets" lineno="15202">
<summary>
Send clockspeed_server packets.
</summary>
@@ -19609,7 +19655,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15893">
+<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15221">
<summary>
Do not audit attempts to send clockspeed_server packets.
</summary>
@@ -19620,7 +19666,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_clockspeed_server_packets" lineno="15912">
+<interface name="corenet_receive_clockspeed_server_packets" lineno="15240">
<summary>
Receive clockspeed_server packets.
</summary>
@@ -19631,7 +19677,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15931">
+<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15259">
<summary>
Do not audit attempts to receive clockspeed_server packets.
</summary>
@@ -19642,7 +19688,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15950">
+<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15278">
<summary>
Send and receive clockspeed_server packets.
</summary>
@@ -19653,7 +19699,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15966">
+<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15294">
<summary>
Do not audit attempts to send and receive clockspeed_server packets.
</summary>
@@ -19664,7 +19710,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_clockspeed_server_packets" lineno="15981">
+<interface name="corenet_relabelto_clockspeed_server_packets" lineno="15309">
<summary>
Relabel packets to clockspeed_server the packet type.
</summary>
@@ -19674,7 +19720,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cluster_port" lineno="16003">
+<interface name="corenet_tcp_sendrecv_cluster_port" lineno="15331">
<summary>
Send and receive TCP traffic on the cluster port.
</summary>
@@ -19685,7 +19731,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_cluster_port" lineno="16022">
+<interface name="corenet_udp_send_cluster_port" lineno="15346">
<summary>
Send UDP traffic on the cluster port.
</summary>
@@ -19696,7 +19742,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="16041">
+<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="15361">
<summary>
Do not audit attempts to send UDP traffic on the cluster port.
</summary>
@@ -19707,7 +19753,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_cluster_port" lineno="16060">
+<interface name="corenet_udp_receive_cluster_port" lineno="15376">
<summary>
Receive UDP traffic on the cluster port.
</summary>
@@ -19718,7 +19764,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="16079">
+<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="15391">
<summary>
Do not audit attempts to receive UDP traffic on the cluster port.
</summary>
@@ -19729,7 +19775,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_cluster_port" lineno="16098">
+<interface name="corenet_udp_sendrecv_cluster_port" lineno="15406">
<summary>
Send and receive UDP traffic on the cluster port.
</summary>
@@ -19740,7 +19786,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="16115">
+<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="15422">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cluster port.
@@ -19752,7 +19798,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_cluster_port" lineno="16131">
+<interface name="corenet_tcp_bind_cluster_port" lineno="15437">
<summary>
Bind TCP sockets to the cluster port.
</summary>
@@ -19763,7 +19809,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cluster_port" lineno="16151">
+<interface name="corenet_udp_bind_cluster_port" lineno="15457">
<summary>
Bind UDP sockets to the cluster port.
</summary>
@@ -19774,7 +19820,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cluster_port" lineno="16170">
+<interface name="corenet_tcp_connect_cluster_port" lineno="15476">
<summary>
Make a TCP connection to the cluster port.
</summary>
@@ -19784,7 +19830,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cluster_client_packets" lineno="16190">
+<interface name="corenet_send_cluster_client_packets" lineno="15496">
<summary>
Send cluster_client packets.
</summary>
@@ -19795,7 +19841,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="16209">
+<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="15515">
<summary>
Do not audit attempts to send cluster_client packets.
</summary>
@@ -19806,7 +19852,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cluster_client_packets" lineno="16228">
+<interface name="corenet_receive_cluster_client_packets" lineno="15534">
<summary>
Receive cluster_client packets.
</summary>
@@ -19817,7 +19863,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="16247">
+<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="15553">
<summary>
Do not audit attempts to receive cluster_client packets.
</summary>
@@ -19828,7 +19874,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cluster_client_packets" lineno="16266">
+<interface name="corenet_sendrecv_cluster_client_packets" lineno="15572">
<summary>
Send and receive cluster_client packets.
</summary>
@@ -19839,7 +19885,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="16282">
+<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="15588">
<summary>
Do not audit attempts to send and receive cluster_client packets.
</summary>
@@ -19850,7 +19896,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cluster_client_packets" lineno="16297">
+<interface name="corenet_relabelto_cluster_client_packets" lineno="15603">
<summary>
Relabel packets to cluster_client the packet type.
</summary>
@@ -19860,7 +19906,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cluster_server_packets" lineno="16317">
+<interface name="corenet_send_cluster_server_packets" lineno="15623">
<summary>
Send cluster_server packets.
</summary>
@@ -19871,7 +19917,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="16336">
+<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="15642">
<summary>
Do not audit attempts to send cluster_server packets.
</summary>
@@ -19882,7 +19928,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cluster_server_packets" lineno="16355">
+<interface name="corenet_receive_cluster_server_packets" lineno="15661">
<summary>
Receive cluster_server packets.
</summary>
@@ -19893,7 +19939,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="16374">
+<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="15680">
<summary>
Do not audit attempts to receive cluster_server packets.
</summary>
@@ -19904,7 +19950,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cluster_server_packets" lineno="16393">
+<interface name="corenet_sendrecv_cluster_server_packets" lineno="15699">
<summary>
Send and receive cluster_server packets.
</summary>
@@ -19915,7 +19961,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="16409">
+<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="15715">
<summary>
Do not audit attempts to send and receive cluster_server packets.
</summary>
@@ -19926,7 +19972,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cluster_server_packets" lineno="16424">
+<interface name="corenet_relabelto_cluster_server_packets" lineno="15730">
<summary>
Relabel packets to cluster_server the packet type.
</summary>
@@ -19936,7 +19982,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cma_port" lineno="16446">
+<interface name="corenet_tcp_sendrecv_cma_port" lineno="15752">
<summary>
Send and receive TCP traffic on the cma port.
</summary>
@@ -19947,7 +19993,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_cma_port" lineno="16465">
+<interface name="corenet_udp_send_cma_port" lineno="15767">
<summary>
Send UDP traffic on the cma port.
</summary>
@@ -19958,7 +20004,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_cma_port" lineno="16484">
+<interface name="corenet_dontaudit_udp_send_cma_port" lineno="15782">
<summary>
Do not audit attempts to send UDP traffic on the cma port.
</summary>
@@ -19969,7 +20015,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_cma_port" lineno="16503">
+<interface name="corenet_udp_receive_cma_port" lineno="15797">
<summary>
Receive UDP traffic on the cma port.
</summary>
@@ -19980,7 +20026,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="16522">
+<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="15812">
<summary>
Do not audit attempts to receive UDP traffic on the cma port.
</summary>
@@ -19991,7 +20037,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_cma_port" lineno="16541">
+<interface name="corenet_udp_sendrecv_cma_port" lineno="15827">
<summary>
Send and receive UDP traffic on the cma port.
</summary>
@@ -20002,7 +20048,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="16558">
+<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="15843">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cma port.
@@ -20014,7 +20060,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_cma_port" lineno="16574">
+<interface name="corenet_tcp_bind_cma_port" lineno="15858">
<summary>
Bind TCP sockets to the cma port.
</summary>
@@ -20025,7 +20071,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cma_port" lineno="16594">
+<interface name="corenet_udp_bind_cma_port" lineno="15878">
<summary>
Bind UDP sockets to the cma port.
</summary>
@@ -20036,7 +20082,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cma_port" lineno="16613">
+<interface name="corenet_tcp_connect_cma_port" lineno="15897">
<summary>
Make a TCP connection to the cma port.
</summary>
@@ -20046,7 +20092,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cma_client_packets" lineno="16633">
+<interface name="corenet_send_cma_client_packets" lineno="15917">
<summary>
Send cma_client packets.
</summary>
@@ -20057,7 +20103,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cma_client_packets" lineno="16652">
+<interface name="corenet_dontaudit_send_cma_client_packets" lineno="15936">
<summary>
Do not audit attempts to send cma_client packets.
</summary>
@@ -20068,7 +20114,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cma_client_packets" lineno="16671">
+<interface name="corenet_receive_cma_client_packets" lineno="15955">
<summary>
Receive cma_client packets.
</summary>
@@ -20079,7 +20125,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="16690">
+<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="15974">
<summary>
Do not audit attempts to receive cma_client packets.
</summary>
@@ -20090,7 +20136,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cma_client_packets" lineno="16709">
+<interface name="corenet_sendrecv_cma_client_packets" lineno="15993">
<summary>
Send and receive cma_client packets.
</summary>
@@ -20101,7 +20147,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="16725">
+<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="16009">
<summary>
Do not audit attempts to send and receive cma_client packets.
</summary>
@@ -20112,7 +20158,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cma_client_packets" lineno="16740">
+<interface name="corenet_relabelto_cma_client_packets" lineno="16024">
<summary>
Relabel packets to cma_client the packet type.
</summary>
@@ -20122,7 +20168,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cma_server_packets" lineno="16760">
+<interface name="corenet_send_cma_server_packets" lineno="16044">
<summary>
Send cma_server packets.
</summary>
@@ -20133,7 +20179,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cma_server_packets" lineno="16779">
+<interface name="corenet_dontaudit_send_cma_server_packets" lineno="16063">
<summary>
Do not audit attempts to send cma_server packets.
</summary>
@@ -20144,7 +20190,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cma_server_packets" lineno="16798">
+<interface name="corenet_receive_cma_server_packets" lineno="16082">
<summary>
Receive cma_server packets.
</summary>
@@ -20155,7 +20201,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="16817">
+<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="16101">
<summary>
Do not audit attempts to receive cma_server packets.
</summary>
@@ -20166,7 +20212,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cma_server_packets" lineno="16836">
+<interface name="corenet_sendrecv_cma_server_packets" lineno="16120">
<summary>
Send and receive cma_server packets.
</summary>
@@ -20177,7 +20223,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16852">
+<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16136">
<summary>
Do not audit attempts to send and receive cma_server packets.
</summary>
@@ -20188,7 +20234,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cma_server_packets" lineno="16867">
+<interface name="corenet_relabelto_cma_server_packets" lineno="16151">
<summary>
Relabel packets to cma_server the packet type.
</summary>
@@ -20198,7 +20244,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16889">
+<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16173">
<summary>
Send and receive TCP traffic on the cobbler port.
</summary>
@@ -20209,7 +20255,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_cobbler_port" lineno="16908">
+<interface name="corenet_udp_send_cobbler_port" lineno="16188">
<summary>
Send UDP traffic on the cobbler port.
</summary>
@@ -20220,7 +20266,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16927">
+<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16203">
<summary>
Do not audit attempts to send UDP traffic on the cobbler port.
</summary>
@@ -20231,7 +20277,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_cobbler_port" lineno="16946">
+<interface name="corenet_udp_receive_cobbler_port" lineno="16218">
<summary>
Receive UDP traffic on the cobbler port.
</summary>
@@ -20242,7 +20288,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16965">
+<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16233">
<summary>
Do not audit attempts to receive UDP traffic on the cobbler port.
</summary>
@@ -20253,7 +20299,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_cobbler_port" lineno="16984">
+<interface name="corenet_udp_sendrecv_cobbler_port" lineno="16248">
<summary>
Send and receive UDP traffic on the cobbler port.
</summary>
@@ -20264,7 +20310,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="17001">
+<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="16264">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cobbler port.
@@ -20276,7 +20322,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_cobbler_port" lineno="17017">
+<interface name="corenet_tcp_bind_cobbler_port" lineno="16279">
<summary>
Bind TCP sockets to the cobbler port.
</summary>
@@ -20287,7 +20333,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cobbler_port" lineno="17037">
+<interface name="corenet_udp_bind_cobbler_port" lineno="16299">
<summary>
Bind UDP sockets to the cobbler port.
</summary>
@@ -20298,7 +20344,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cobbler_port" lineno="17056">
+<interface name="corenet_tcp_connect_cobbler_port" lineno="16318">
<summary>
Make a TCP connection to the cobbler port.
</summary>
@@ -20308,7 +20354,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cobbler_client_packets" lineno="17076">
+<interface name="corenet_send_cobbler_client_packets" lineno="16338">
<summary>
Send cobbler_client packets.
</summary>
@@ -20319,7 +20365,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="17095">
+<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="16357">
<summary>
Do not audit attempts to send cobbler_client packets.
</summary>
@@ -20330,7 +20376,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cobbler_client_packets" lineno="17114">
+<interface name="corenet_receive_cobbler_client_packets" lineno="16376">
<summary>
Receive cobbler_client packets.
</summary>
@@ -20341,7 +20387,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="17133">
+<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="16395">
<summary>
Do not audit attempts to receive cobbler_client packets.
</summary>
@@ -20352,7 +20398,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cobbler_client_packets" lineno="17152">
+<interface name="corenet_sendrecv_cobbler_client_packets" lineno="16414">
<summary>
Send and receive cobbler_client packets.
</summary>
@@ -20363,7 +20409,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="17168">
+<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="16430">
<summary>
Do not audit attempts to send and receive cobbler_client packets.
</summary>
@@ -20374,7 +20420,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cobbler_client_packets" lineno="17183">
+<interface name="corenet_relabelto_cobbler_client_packets" lineno="16445">
<summary>
Relabel packets to cobbler_client the packet type.
</summary>
@@ -20384,7 +20430,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cobbler_server_packets" lineno="17203">
+<interface name="corenet_send_cobbler_server_packets" lineno="16465">
<summary>
Send cobbler_server packets.
</summary>
@@ -20395,7 +20441,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="17222">
+<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="16484">
<summary>
Do not audit attempts to send cobbler_server packets.
</summary>
@@ -20406,7 +20452,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cobbler_server_packets" lineno="17241">
+<interface name="corenet_receive_cobbler_server_packets" lineno="16503">
<summary>
Receive cobbler_server packets.
</summary>
@@ -20417,7 +20463,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="17260">
+<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="16522">
<summary>
Do not audit attempts to receive cobbler_server packets.
</summary>
@@ -20428,7 +20474,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cobbler_server_packets" lineno="17279">
+<interface name="corenet_sendrecv_cobbler_server_packets" lineno="16541">
<summary>
Send and receive cobbler_server packets.
</summary>
@@ -20439,7 +20485,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="17295">
+<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="16557">
<summary>
Do not audit attempts to send and receive cobbler_server packets.
</summary>
@@ -20450,7 +20496,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cobbler_server_packets" lineno="17310">
+<interface name="corenet_relabelto_cobbler_server_packets" lineno="16572">
<summary>
Relabel packets to cobbler_server the packet type.
</summary>
@@ -20460,7 +20506,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="17332">
+<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="16594">
<summary>
Send and receive TCP traffic on the commplex_link port.
</summary>
@@ -20471,7 +20517,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_commplex_link_port" lineno="17351">
+<interface name="corenet_udp_send_commplex_link_port" lineno="16609">
<summary>
Send UDP traffic on the commplex_link port.
</summary>
@@ -20482,7 +20528,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="17370">
+<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="16624">
<summary>
Do not audit attempts to send UDP traffic on the commplex_link port.
</summary>
@@ -20493,7 +20539,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_commplex_link_port" lineno="17389">
+<interface name="corenet_udp_receive_commplex_link_port" lineno="16639">
<summary>
Receive UDP traffic on the commplex_link port.
</summary>
@@ -20504,7 +20550,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="17408">
+<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="16654">
<summary>
Do not audit attempts to receive UDP traffic on the commplex_link port.
</summary>
@@ -20515,7 +20561,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="17427">
+<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="16669">
<summary>
Send and receive UDP traffic on the commplex_link port.
</summary>
@@ -20526,7 +20572,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="17444">
+<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="16685">
<summary>
Do not audit attempts to send and receive
UDP traffic on the commplex_link port.
@@ -20538,7 +20584,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_commplex_link_port" lineno="17460">
+<interface name="corenet_tcp_bind_commplex_link_port" lineno="16700">
<summary>
Bind TCP sockets to the commplex_link port.
</summary>
@@ -20549,7 +20595,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_commplex_link_port" lineno="17480">
+<interface name="corenet_udp_bind_commplex_link_port" lineno="16720">
<summary>
Bind UDP sockets to the commplex_link port.
</summary>
@@ -20560,7 +20606,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_commplex_link_port" lineno="17499">
+<interface name="corenet_tcp_connect_commplex_link_port" lineno="16739">
<summary>
Make a TCP connection to the commplex_link port.
</summary>
@@ -20570,7 +20616,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_commplex_link_client_packets" lineno="17519">
+<interface name="corenet_send_commplex_link_client_packets" lineno="16759">
<summary>
Send commplex_link_client packets.
</summary>
@@ -20581,7 +20627,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="17538">
+<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="16778">
<summary>
Do not audit attempts to send commplex_link_client packets.
</summary>
@@ -20592,7 +20638,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_commplex_link_client_packets" lineno="17557">
+<interface name="corenet_receive_commplex_link_client_packets" lineno="16797">
<summary>
Receive commplex_link_client packets.
</summary>
@@ -20603,7 +20649,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="17576">
+<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="16816">
<summary>
Do not audit attempts to receive commplex_link_client packets.
</summary>
@@ -20614,7 +20660,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="17595">
+<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="16835">
<summary>
Send and receive commplex_link_client packets.
</summary>
@@ -20625,7 +20671,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="17611">
+<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="16851">
<summary>
Do not audit attempts to send and receive commplex_link_client packets.
</summary>
@@ -20636,7 +20682,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_commplex_link_client_packets" lineno="17626">
+<interface name="corenet_relabelto_commplex_link_client_packets" lineno="16866">
<summary>
Relabel packets to commplex_link_client the packet type.
</summary>
@@ -20646,7 +20692,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_commplex_link_server_packets" lineno="17646">
+<interface name="corenet_send_commplex_link_server_packets" lineno="16886">
<summary>
Send commplex_link_server packets.
</summary>
@@ -20657,7 +20703,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="17665">
+<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="16905">
<summary>
Do not audit attempts to send commplex_link_server packets.
</summary>
@@ -20668,7 +20714,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_commplex_link_server_packets" lineno="17684">
+<interface name="corenet_receive_commplex_link_server_packets" lineno="16924">
<summary>
Receive commplex_link_server packets.
</summary>
@@ -20679,7 +20725,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="17703">
+<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="16943">
<summary>
Do not audit attempts to receive commplex_link_server packets.
</summary>
@@ -20690,7 +20736,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="17722">
+<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="16962">
<summary>
Send and receive commplex_link_server packets.
</summary>
@@ -20701,7 +20747,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="17738">
+<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="16978">
<summary>
Do not audit attempts to send and receive commplex_link_server packets.
</summary>
@@ -20712,7 +20758,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_commplex_link_server_packets" lineno="17753">
+<interface name="corenet_relabelto_commplex_link_server_packets" lineno="16993">
<summary>
Relabel packets to commplex_link_server the packet type.
</summary>
@@ -20722,7 +20768,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="17775">
+<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="17015">
<summary>
Send and receive TCP traffic on the commplex_main port.
</summary>
@@ -20733,7 +20779,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_commplex_main_port" lineno="17794">
+<interface name="corenet_udp_send_commplex_main_port" lineno="17030">
<summary>
Send UDP traffic on the commplex_main port.
</summary>
@@ -20744,7 +20790,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="17813">
+<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="17045">
<summary>
Do not audit attempts to send UDP traffic on the commplex_main port.
</summary>
@@ -20755,7 +20801,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_commplex_main_port" lineno="17832">
+<interface name="corenet_udp_receive_commplex_main_port" lineno="17060">
<summary>
Receive UDP traffic on the commplex_main port.
</summary>
@@ -20766,7 +20812,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="17851">
+<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="17075">
<summary>
Do not audit attempts to receive UDP traffic on the commplex_main port.
</summary>
@@ -20777,7 +20823,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="17870">
+<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="17090">
<summary>
Send and receive UDP traffic on the commplex_main port.
</summary>
@@ -20788,7 +20834,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="17887">
+<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="17106">
<summary>
Do not audit attempts to send and receive
UDP traffic on the commplex_main port.
@@ -20800,7 +20846,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_commplex_main_port" lineno="17903">
+<interface name="corenet_tcp_bind_commplex_main_port" lineno="17121">
<summary>
Bind TCP sockets to the commplex_main port.
</summary>
@@ -20811,7 +20857,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_commplex_main_port" lineno="17923">
+<interface name="corenet_udp_bind_commplex_main_port" lineno="17141">
<summary>
Bind UDP sockets to the commplex_main port.
</summary>
@@ -20822,7 +20868,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_commplex_main_port" lineno="17942">
+<interface name="corenet_tcp_connect_commplex_main_port" lineno="17160">
<summary>
Make a TCP connection to the commplex_main port.
</summary>
@@ -20832,7 +20878,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_commplex_main_client_packets" lineno="17962">
+<interface name="corenet_send_commplex_main_client_packets" lineno="17180">
<summary>
Send commplex_main_client packets.
</summary>
@@ -20843,7 +20889,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="17981">
+<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="17199">
<summary>
Do not audit attempts to send commplex_main_client packets.
</summary>
@@ -20854,7 +20900,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_commplex_main_client_packets" lineno="18000">
+<interface name="corenet_receive_commplex_main_client_packets" lineno="17218">
<summary>
Receive commplex_main_client packets.
</summary>
@@ -20865,7 +20911,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="18019">
+<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="17237">
<summary>
Do not audit attempts to receive commplex_main_client packets.
</summary>
@@ -20876,7 +20922,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="18038">
+<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="17256">
<summary>
Send and receive commplex_main_client packets.
</summary>
@@ -20887,7 +20933,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="18054">
+<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="17272">
<summary>
Do not audit attempts to send and receive commplex_main_client packets.
</summary>
@@ -20898,7 +20944,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_commplex_main_client_packets" lineno="18069">
+<interface name="corenet_relabelto_commplex_main_client_packets" lineno="17287">
<summary>
Relabel packets to commplex_main_client the packet type.
</summary>
@@ -20908,7 +20954,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_commplex_main_server_packets" lineno="18089">
+<interface name="corenet_send_commplex_main_server_packets" lineno="17307">
<summary>
Send commplex_main_server packets.
</summary>
@@ -20919,7 +20965,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="18108">
+<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="17326">
<summary>
Do not audit attempts to send commplex_main_server packets.
</summary>
@@ -20930,7 +20976,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_commplex_main_server_packets" lineno="18127">
+<interface name="corenet_receive_commplex_main_server_packets" lineno="17345">
<summary>
Receive commplex_main_server packets.
</summary>
@@ -20941,7 +20987,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="18146">
+<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="17364">
<summary>
Do not audit attempts to receive commplex_main_server packets.
</summary>
@@ -20952,7 +20998,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="18165">
+<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="17383">
<summary>
Send and receive commplex_main_server packets.
</summary>
@@ -20963,7 +21009,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="18181">
+<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="17399">
<summary>
Do not audit attempts to send and receive commplex_main_server packets.
</summary>
@@ -20974,7 +21020,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_commplex_main_server_packets" lineno="18196">
+<interface name="corenet_relabelto_commplex_main_server_packets" lineno="17414">
<summary>
Relabel packets to commplex_main_server the packet type.
</summary>
@@ -20984,7 +21030,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_comsat_port" lineno="18218">
+<interface name="corenet_tcp_sendrecv_comsat_port" lineno="17436">
<summary>
Send and receive TCP traffic on the comsat port.
</summary>
@@ -20995,7 +21041,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_comsat_port" lineno="18237">
+<interface name="corenet_udp_send_comsat_port" lineno="17451">
<summary>
Send UDP traffic on the comsat port.
</summary>
@@ -21006,7 +21052,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="18256">
+<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="17466">
<summary>
Do not audit attempts to send UDP traffic on the comsat port.
</summary>
@@ -21017,7 +21063,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_comsat_port" lineno="18275">
+<interface name="corenet_udp_receive_comsat_port" lineno="17481">
<summary>
Receive UDP traffic on the comsat port.
</summary>
@@ -21028,7 +21074,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="18294">
+<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="17496">
<summary>
Do not audit attempts to receive UDP traffic on the comsat port.
</summary>
@@ -21039,7 +21085,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_comsat_port" lineno="18313">
+<interface name="corenet_udp_sendrecv_comsat_port" lineno="17511">
<summary>
Send and receive UDP traffic on the comsat port.
</summary>
@@ -21050,7 +21096,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="18330">
+<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="17527">
<summary>
Do not audit attempts to send and receive
UDP traffic on the comsat port.
@@ -21062,7 +21108,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_comsat_port" lineno="18346">
+<interface name="corenet_tcp_bind_comsat_port" lineno="17542">
<summary>
Bind TCP sockets to the comsat port.
</summary>
@@ -21073,7 +21119,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_comsat_port" lineno="18366">
+<interface name="corenet_udp_bind_comsat_port" lineno="17562">
<summary>
Bind UDP sockets to the comsat port.
</summary>
@@ -21084,7 +21130,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_comsat_port" lineno="18385">
+<interface name="corenet_tcp_connect_comsat_port" lineno="17581">
<summary>
Make a TCP connection to the comsat port.
</summary>
@@ -21094,7 +21140,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_comsat_client_packets" lineno="18405">
+<interface name="corenet_send_comsat_client_packets" lineno="17601">
<summary>
Send comsat_client packets.
</summary>
@@ -21105,7 +21151,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="18424">
+<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="17620">
<summary>
Do not audit attempts to send comsat_client packets.
</summary>
@@ -21116,7 +21162,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_comsat_client_packets" lineno="18443">
+<interface name="corenet_receive_comsat_client_packets" lineno="17639">
<summary>
Receive comsat_client packets.
</summary>
@@ -21127,7 +21173,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="18462">
+<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="17658">
<summary>
Do not audit attempts to receive comsat_client packets.
</summary>
@@ -21138,7 +21184,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_comsat_client_packets" lineno="18481">
+<interface name="corenet_sendrecv_comsat_client_packets" lineno="17677">
<summary>
Send and receive comsat_client packets.
</summary>
@@ -21149,7 +21195,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="18497">
+<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="17693">
<summary>
Do not audit attempts to send and receive comsat_client packets.
</summary>
@@ -21160,7 +21206,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_comsat_client_packets" lineno="18512">
+<interface name="corenet_relabelto_comsat_client_packets" lineno="17708">
<summary>
Relabel packets to comsat_client the packet type.
</summary>
@@ -21170,7 +21216,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_comsat_server_packets" lineno="18532">
+<interface name="corenet_send_comsat_server_packets" lineno="17728">
<summary>
Send comsat_server packets.
</summary>
@@ -21181,7 +21227,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="18551">
+<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="17747">
<summary>
Do not audit attempts to send comsat_server packets.
</summary>
@@ -21192,7 +21238,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_comsat_server_packets" lineno="18570">
+<interface name="corenet_receive_comsat_server_packets" lineno="17766">
<summary>
Receive comsat_server packets.
</summary>
@@ -21203,7 +21249,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="18589">
+<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="17785">
<summary>
Do not audit attempts to receive comsat_server packets.
</summary>
@@ -21214,7 +21260,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_comsat_server_packets" lineno="18608">
+<interface name="corenet_sendrecv_comsat_server_packets" lineno="17804">
<summary>
Send and receive comsat_server packets.
</summary>
@@ -21225,7 +21271,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="18624">
+<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="17820">
<summary>
Do not audit attempts to send and receive comsat_server packets.
</summary>
@@ -21236,7 +21282,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_comsat_server_packets" lineno="18639">
+<interface name="corenet_relabelto_comsat_server_packets" lineno="17835">
<summary>
Relabel packets to comsat_server the packet type.
</summary>
@@ -21246,7 +21292,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_condor_port" lineno="18661">
+<interface name="corenet_tcp_sendrecv_condor_port" lineno="17857">
<summary>
Send and receive TCP traffic on the condor port.
</summary>
@@ -21257,7 +21303,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_condor_port" lineno="18680">
+<interface name="corenet_udp_send_condor_port" lineno="17872">
<summary>
Send UDP traffic on the condor port.
</summary>
@@ -21268,7 +21314,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_condor_port" lineno="18699">
+<interface name="corenet_dontaudit_udp_send_condor_port" lineno="17887">
<summary>
Do not audit attempts to send UDP traffic on the condor port.
</summary>
@@ -21279,7 +21325,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_condor_port" lineno="18718">
+<interface name="corenet_udp_receive_condor_port" lineno="17902">
<summary>
Receive UDP traffic on the condor port.
</summary>
@@ -21290,7 +21336,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="18737">
+<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="17917">
<summary>
Do not audit attempts to receive UDP traffic on the condor port.
</summary>
@@ -21301,7 +21347,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_condor_port" lineno="18756">
+<interface name="corenet_udp_sendrecv_condor_port" lineno="17932">
<summary>
Send and receive UDP traffic on the condor port.
</summary>
@@ -21312,7 +21358,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="18773">
+<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="17948">
<summary>
Do not audit attempts to send and receive
UDP traffic on the condor port.
@@ -21324,7 +21370,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_condor_port" lineno="18789">
+<interface name="corenet_tcp_bind_condor_port" lineno="17963">
<summary>
Bind TCP sockets to the condor port.
</summary>
@@ -21335,7 +21381,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_condor_port" lineno="18809">
+<interface name="corenet_udp_bind_condor_port" lineno="17983">
<summary>
Bind UDP sockets to the condor port.
</summary>
@@ -21346,7 +21392,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_condor_port" lineno="18828">
+<interface name="corenet_tcp_connect_condor_port" lineno="18002">
<summary>
Make a TCP connection to the condor port.
</summary>
@@ -21356,7 +21402,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_condor_client_packets" lineno="18848">
+<interface name="corenet_send_condor_client_packets" lineno="18022">
<summary>
Send condor_client packets.
</summary>
@@ -21367,7 +21413,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_condor_client_packets" lineno="18867">
+<interface name="corenet_dontaudit_send_condor_client_packets" lineno="18041">
<summary>
Do not audit attempts to send condor_client packets.
</summary>
@@ -21378,7 +21424,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_condor_client_packets" lineno="18886">
+<interface name="corenet_receive_condor_client_packets" lineno="18060">
<summary>
Receive condor_client packets.
</summary>
@@ -21389,7 +21435,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="18905">
+<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="18079">
<summary>
Do not audit attempts to receive condor_client packets.
</summary>
@@ -21400,7 +21446,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_condor_client_packets" lineno="18924">
+<interface name="corenet_sendrecv_condor_client_packets" lineno="18098">
<summary>
Send and receive condor_client packets.
</summary>
@@ -21411,7 +21457,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="18940">
+<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="18114">
<summary>
Do not audit attempts to send and receive condor_client packets.
</summary>
@@ -21422,7 +21468,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_condor_client_packets" lineno="18955">
+<interface name="corenet_relabelto_condor_client_packets" lineno="18129">
<summary>
Relabel packets to condor_client the packet type.
</summary>
@@ -21432,7 +21478,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_condor_server_packets" lineno="18975">
+<interface name="corenet_send_condor_server_packets" lineno="18149">
<summary>
Send condor_server packets.
</summary>
@@ -21443,7 +21489,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_condor_server_packets" lineno="18994">
+<interface name="corenet_dontaudit_send_condor_server_packets" lineno="18168">
<summary>
Do not audit attempts to send condor_server packets.
</summary>
@@ -21454,7 +21500,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_condor_server_packets" lineno="19013">
+<interface name="corenet_receive_condor_server_packets" lineno="18187">
<summary>
Receive condor_server packets.
</summary>
@@ -21465,7 +21511,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="19032">
+<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="18206">
<summary>
Do not audit attempts to receive condor_server packets.
</summary>
@@ -21476,7 +21522,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_condor_server_packets" lineno="19051">
+<interface name="corenet_sendrecv_condor_server_packets" lineno="18225">
<summary>
Send and receive condor_server packets.
</summary>
@@ -21487,7 +21533,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="19067">
+<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="18241">
<summary>
Do not audit attempts to send and receive condor_server packets.
</summary>
@@ -21498,7 +21544,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_condor_server_packets" lineno="19082">
+<interface name="corenet_relabelto_condor_server_packets" lineno="18256">
<summary>
Relabel packets to condor_server the packet type.
</summary>
@@ -21508,7 +21554,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="19104">
+<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="18278">
<summary>
Send and receive TCP traffic on the couchdb port.
</summary>
@@ -21519,7 +21565,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_couchdb_port" lineno="19123">
+<interface name="corenet_udp_send_couchdb_port" lineno="18293">
<summary>
Send UDP traffic on the couchdb port.
</summary>
@@ -21530,7 +21576,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="19142">
+<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="18308">
<summary>
Do not audit attempts to send UDP traffic on the couchdb port.
</summary>
@@ -21541,7 +21587,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_couchdb_port" lineno="19161">
+<interface name="corenet_udp_receive_couchdb_port" lineno="18323">
<summary>
Receive UDP traffic on the couchdb port.
</summary>
@@ -21552,7 +21598,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="19180">
+<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="18338">
<summary>
Do not audit attempts to receive UDP traffic on the couchdb port.
</summary>
@@ -21563,7 +21609,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_couchdb_port" lineno="19199">
+<interface name="corenet_udp_sendrecv_couchdb_port" lineno="18353">
<summary>
Send and receive UDP traffic on the couchdb port.
</summary>
@@ -21574,7 +21620,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="19216">
+<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="18369">
<summary>
Do not audit attempts to send and receive
UDP traffic on the couchdb port.
@@ -21586,7 +21632,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_couchdb_port" lineno="19232">
+<interface name="corenet_tcp_bind_couchdb_port" lineno="18384">
<summary>
Bind TCP sockets to the couchdb port.
</summary>
@@ -21597,7 +21643,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_couchdb_port" lineno="19252">
+<interface name="corenet_udp_bind_couchdb_port" lineno="18404">
<summary>
Bind UDP sockets to the couchdb port.
</summary>
@@ -21608,7 +21654,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_couchdb_port" lineno="19271">
+<interface name="corenet_tcp_connect_couchdb_port" lineno="18423">
<summary>
Make a TCP connection to the couchdb port.
</summary>
@@ -21618,7 +21664,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_couchdb_client_packets" lineno="19291">
+<interface name="corenet_send_couchdb_client_packets" lineno="18443">
<summary>
Send couchdb_client packets.
</summary>
@@ -21629,7 +21675,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="19310">
+<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="18462">
<summary>
Do not audit attempts to send couchdb_client packets.
</summary>
@@ -21640,7 +21686,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_couchdb_client_packets" lineno="19329">
+<interface name="corenet_receive_couchdb_client_packets" lineno="18481">
<summary>
Receive couchdb_client packets.
</summary>
@@ -21651,7 +21697,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="19348">
+<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="18500">
<summary>
Do not audit attempts to receive couchdb_client packets.
</summary>
@@ -21662,7 +21708,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_couchdb_client_packets" lineno="19367">
+<interface name="corenet_sendrecv_couchdb_client_packets" lineno="18519">
<summary>
Send and receive couchdb_client packets.
</summary>
@@ -21673,7 +21719,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="19383">
+<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="18535">
<summary>
Do not audit attempts to send and receive couchdb_client packets.
</summary>
@@ -21684,7 +21730,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_couchdb_client_packets" lineno="19398">
+<interface name="corenet_relabelto_couchdb_client_packets" lineno="18550">
<summary>
Relabel packets to couchdb_client the packet type.
</summary>
@@ -21694,7 +21740,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_couchdb_server_packets" lineno="19418">
+<interface name="corenet_send_couchdb_server_packets" lineno="18570">
<summary>
Send couchdb_server packets.
</summary>
@@ -21705,7 +21751,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="19437">
+<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="18589">
<summary>
Do not audit attempts to send couchdb_server packets.
</summary>
@@ -21716,7 +21762,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_couchdb_server_packets" lineno="19456">
+<interface name="corenet_receive_couchdb_server_packets" lineno="18608">
<summary>
Receive couchdb_server packets.
</summary>
@@ -21727,7 +21773,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="19475">
+<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="18627">
<summary>
Do not audit attempts to receive couchdb_server packets.
</summary>
@@ -21738,7 +21784,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_couchdb_server_packets" lineno="19494">
+<interface name="corenet_sendrecv_couchdb_server_packets" lineno="18646">
<summary>
Send and receive couchdb_server packets.
</summary>
@@ -21749,7 +21795,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="19510">
+<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="18662">
<summary>
Do not audit attempts to send and receive couchdb_server packets.
</summary>
@@ -21760,7 +21806,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_couchdb_server_packets" lineno="19525">
+<interface name="corenet_relabelto_couchdb_server_packets" lineno="18677">
<summary>
Relabel packets to couchdb_server the packet type.
</summary>
@@ -21770,7 +21816,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cslistener_port" lineno="19547">
+<interface name="corenet_tcp_sendrecv_cslistener_port" lineno="18699">
<summary>
Send and receive TCP traffic on the cslistener port.
</summary>
@@ -21781,7 +21827,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_cslistener_port" lineno="19566">
+<interface name="corenet_udp_send_cslistener_port" lineno="18714">
<summary>
Send UDP traffic on the cslistener port.
</summary>
@@ -21792,7 +21838,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_cslistener_port" lineno="19585">
+<interface name="corenet_dontaudit_udp_send_cslistener_port" lineno="18729">
<summary>
Do not audit attempts to send UDP traffic on the cslistener port.
</summary>
@@ -21803,7 +21849,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_cslistener_port" lineno="19604">
+<interface name="corenet_udp_receive_cslistener_port" lineno="18744">
<summary>
Receive UDP traffic on the cslistener port.
</summary>
@@ -21814,7 +21860,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_cslistener_port" lineno="19623">
+<interface name="corenet_dontaudit_udp_receive_cslistener_port" lineno="18759">
<summary>
Do not audit attempts to receive UDP traffic on the cslistener port.
</summary>
@@ -21825,7 +21871,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_cslistener_port" lineno="19642">
+<interface name="corenet_udp_sendrecv_cslistener_port" lineno="18774">
<summary>
Send and receive UDP traffic on the cslistener port.
</summary>
@@ -21836,7 +21882,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cslistener_port" lineno="19659">
+<interface name="corenet_dontaudit_udp_sendrecv_cslistener_port" lineno="18790">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cslistener port.
@@ -21848,7 +21894,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_cslistener_port" lineno="19675">
+<interface name="corenet_tcp_bind_cslistener_port" lineno="18805">
<summary>
Bind TCP sockets to the cslistener port.
</summary>
@@ -21859,7 +21905,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cslistener_port" lineno="19695">
+<interface name="corenet_udp_bind_cslistener_port" lineno="18825">
<summary>
Bind UDP sockets to the cslistener port.
</summary>
@@ -21870,7 +21916,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cslistener_port" lineno="19714">
+<interface name="corenet_tcp_connect_cslistener_port" lineno="18844">
<summary>
Make a TCP connection to the cslistener port.
</summary>
@@ -21880,7 +21926,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cslistener_client_packets" lineno="19734">
+<interface name="corenet_send_cslistener_client_packets" lineno="18864">
<summary>
Send cslistener_client packets.
</summary>
@@ -21891,7 +21937,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="19753">
+<interface name="corenet_dontaudit_send_cslistener_client_packets" lineno="18883">
<summary>
Do not audit attempts to send cslistener_client packets.
</summary>
@@ -21902,7 +21948,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cslistener_client_packets" lineno="19772">
+<interface name="corenet_receive_cslistener_client_packets" lineno="18902">
<summary>
Receive cslistener_client packets.
</summary>
@@ -21913,7 +21959,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="19791">
+<interface name="corenet_dontaudit_receive_cslistener_client_packets" lineno="18921">
<summary>
Do not audit attempts to receive cslistener_client packets.
</summary>
@@ -21924,7 +21970,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cslistener_client_packets" lineno="19810">
+<interface name="corenet_sendrecv_cslistener_client_packets" lineno="18940">
<summary>
Send and receive cslistener_client packets.
</summary>
@@ -21935,7 +21981,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="19826">
+<interface name="corenet_dontaudit_sendrecv_cslistener_client_packets" lineno="18956">
<summary>
Do not audit attempts to send and receive cslistener_client packets.
</summary>
@@ -21946,7 +21992,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cslistener_client_packets" lineno="19841">
+<interface name="corenet_relabelto_cslistener_client_packets" lineno="18971">
<summary>
Relabel packets to cslistener_client the packet type.
</summary>
@@ -21956,7 +22002,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cslistener_server_packets" lineno="19861">
+<interface name="corenet_send_cslistener_server_packets" lineno="18991">
<summary>
Send cslistener_server packets.
</summary>
@@ -21967,7 +22013,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="19880">
+<interface name="corenet_dontaudit_send_cslistener_server_packets" lineno="19010">
<summary>
Do not audit attempts to send cslistener_server packets.
</summary>
@@ -21978,7 +22024,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cslistener_server_packets" lineno="19899">
+<interface name="corenet_receive_cslistener_server_packets" lineno="19029">
<summary>
Receive cslistener_server packets.
</summary>
@@ -21989,7 +22035,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="19918">
+<interface name="corenet_dontaudit_receive_cslistener_server_packets" lineno="19048">
<summary>
Do not audit attempts to receive cslistener_server packets.
</summary>
@@ -22000,7 +22046,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cslistener_server_packets" lineno="19937">
+<interface name="corenet_sendrecv_cslistener_server_packets" lineno="19067">
<summary>
Send and receive cslistener_server packets.
</summary>
@@ -22011,7 +22057,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="19953">
+<interface name="corenet_dontaudit_sendrecv_cslistener_server_packets" lineno="19083">
<summary>
Do not audit attempts to send and receive cslistener_server packets.
</summary>
@@ -22022,7 +22068,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cslistener_server_packets" lineno="19968">
+<interface name="corenet_relabelto_cslistener_server_packets" lineno="19098">
<summary>
Relabel packets to cslistener_server the packet type.
</summary>
@@ -22032,7 +22078,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="19990">
+<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="19120">
<summary>
Send and receive TCP traffic on the ctdb port.
</summary>
@@ -22043,7 +22089,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ctdb_port" lineno="20009">
+<interface name="corenet_udp_send_ctdb_port" lineno="19135">
<summary>
Send UDP traffic on the ctdb port.
</summary>
@@ -22054,7 +22100,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="20028">
+<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="19150">
<summary>
Do not audit attempts to send UDP traffic on the ctdb port.
</summary>
@@ -22065,7 +22111,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ctdb_port" lineno="20047">
+<interface name="corenet_udp_receive_ctdb_port" lineno="19165">
<summary>
Receive UDP traffic on the ctdb port.
</summary>
@@ -22076,7 +22122,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="20066">
+<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="19180">
<summary>
Do not audit attempts to receive UDP traffic on the ctdb port.
</summary>
@@ -22087,7 +22133,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ctdb_port" lineno="20085">
+<interface name="corenet_udp_sendrecv_ctdb_port" lineno="19195">
<summary>
Send and receive UDP traffic on the ctdb port.
</summary>
@@ -22098,7 +22144,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="20102">
+<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="19211">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ctdb port.
@@ -22110,7 +22156,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ctdb_port" lineno="20118">
+<interface name="corenet_tcp_bind_ctdb_port" lineno="19226">
<summary>
Bind TCP sockets to the ctdb port.
</summary>
@@ -22121,7 +22167,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ctdb_port" lineno="20138">
+<interface name="corenet_udp_bind_ctdb_port" lineno="19246">
<summary>
Bind UDP sockets to the ctdb port.
</summary>
@@ -22132,7 +22178,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ctdb_port" lineno="20157">
+<interface name="corenet_tcp_connect_ctdb_port" lineno="19265">
<summary>
Make a TCP connection to the ctdb port.
</summary>
@@ -22142,7 +22188,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ctdb_client_packets" lineno="20177">
+<interface name="corenet_send_ctdb_client_packets" lineno="19285">
<summary>
Send ctdb_client packets.
</summary>
@@ -22153,7 +22199,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="20196">
+<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="19304">
<summary>
Do not audit attempts to send ctdb_client packets.
</summary>
@@ -22164,7 +22210,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ctdb_client_packets" lineno="20215">
+<interface name="corenet_receive_ctdb_client_packets" lineno="19323">
<summary>
Receive ctdb_client packets.
</summary>
@@ -22175,7 +22221,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="20234">
+<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="19342">
<summary>
Do not audit attempts to receive ctdb_client packets.
</summary>
@@ -22186,7 +22232,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ctdb_client_packets" lineno="20253">
+<interface name="corenet_sendrecv_ctdb_client_packets" lineno="19361">
<summary>
Send and receive ctdb_client packets.
</summary>
@@ -22197,7 +22243,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="20269">
+<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="19377">
<summary>
Do not audit attempts to send and receive ctdb_client packets.
</summary>
@@ -22208,7 +22254,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ctdb_client_packets" lineno="20284">
+<interface name="corenet_relabelto_ctdb_client_packets" lineno="19392">
<summary>
Relabel packets to ctdb_client the packet type.
</summary>
@@ -22218,7 +22264,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ctdb_server_packets" lineno="20304">
+<interface name="corenet_send_ctdb_server_packets" lineno="19412">
<summary>
Send ctdb_server packets.
</summary>
@@ -22229,7 +22275,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="20323">
+<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="19431">
<summary>
Do not audit attempts to send ctdb_server packets.
</summary>
@@ -22240,7 +22286,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ctdb_server_packets" lineno="20342">
+<interface name="corenet_receive_ctdb_server_packets" lineno="19450">
<summary>
Receive ctdb_server packets.
</summary>
@@ -22251,7 +22297,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="20361">
+<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="19469">
<summary>
Do not audit attempts to receive ctdb_server packets.
</summary>
@@ -22262,7 +22308,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ctdb_server_packets" lineno="20380">
+<interface name="corenet_sendrecv_ctdb_server_packets" lineno="19488">
<summary>
Send and receive ctdb_server packets.
</summary>
@@ -22273,7 +22319,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="20396">
+<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="19504">
<summary>
Do not audit attempts to send and receive ctdb_server packets.
</summary>
@@ -22284,7 +22330,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ctdb_server_packets" lineno="20411">
+<interface name="corenet_relabelto_ctdb_server_packets" lineno="19519">
<summary>
Relabel packets to ctdb_server the packet type.
</summary>
@@ -22294,7 +22340,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cvs_port" lineno="20433">
+<interface name="corenet_tcp_sendrecv_cvs_port" lineno="19541">
<summary>
Send and receive TCP traffic on the cvs port.
</summary>
@@ -22305,7 +22351,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_cvs_port" lineno="20452">
+<interface name="corenet_udp_send_cvs_port" lineno="19556">
<summary>
Send UDP traffic on the cvs port.
</summary>
@@ -22316,7 +22362,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="20471">
+<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="19571">
<summary>
Do not audit attempts to send UDP traffic on the cvs port.
</summary>
@@ -22327,7 +22373,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_cvs_port" lineno="20490">
+<interface name="corenet_udp_receive_cvs_port" lineno="19586">
<summary>
Receive UDP traffic on the cvs port.
</summary>
@@ -22338,7 +22384,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="20509">
+<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="19601">
<summary>
Do not audit attempts to receive UDP traffic on the cvs port.
</summary>
@@ -22349,7 +22395,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_cvs_port" lineno="20528">
+<interface name="corenet_udp_sendrecv_cvs_port" lineno="19616">
<summary>
Send and receive UDP traffic on the cvs port.
</summary>
@@ -22360,7 +22406,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="20545">
+<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="19632">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cvs port.
@@ -22372,7 +22418,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_cvs_port" lineno="20561">
+<interface name="corenet_tcp_bind_cvs_port" lineno="19647">
<summary>
Bind TCP sockets to the cvs port.
</summary>
@@ -22383,7 +22429,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cvs_port" lineno="20581">
+<interface name="corenet_udp_bind_cvs_port" lineno="19667">
<summary>
Bind UDP sockets to the cvs port.
</summary>
@@ -22394,7 +22440,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cvs_port" lineno="20600">
+<interface name="corenet_tcp_connect_cvs_port" lineno="19686">
<summary>
Make a TCP connection to the cvs port.
</summary>
@@ -22404,7 +22450,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cvs_client_packets" lineno="20620">
+<interface name="corenet_send_cvs_client_packets" lineno="19706">
<summary>
Send cvs_client packets.
</summary>
@@ -22415,7 +22461,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="20639">
+<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="19725">
<summary>
Do not audit attempts to send cvs_client packets.
</summary>
@@ -22426,7 +22472,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cvs_client_packets" lineno="20658">
+<interface name="corenet_receive_cvs_client_packets" lineno="19744">
<summary>
Receive cvs_client packets.
</summary>
@@ -22437,7 +22483,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="20677">
+<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="19763">
<summary>
Do not audit attempts to receive cvs_client packets.
</summary>
@@ -22448,7 +22494,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cvs_client_packets" lineno="20696">
+<interface name="corenet_sendrecv_cvs_client_packets" lineno="19782">
<summary>
Send and receive cvs_client packets.
</summary>
@@ -22459,7 +22505,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="20712">
+<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="19798">
<summary>
Do not audit attempts to send and receive cvs_client packets.
</summary>
@@ -22470,7 +22516,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cvs_client_packets" lineno="20727">
+<interface name="corenet_relabelto_cvs_client_packets" lineno="19813">
<summary>
Relabel packets to cvs_client the packet type.
</summary>
@@ -22480,7 +22526,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cvs_server_packets" lineno="20747">
+<interface name="corenet_send_cvs_server_packets" lineno="19833">
<summary>
Send cvs_server packets.
</summary>
@@ -22491,7 +22537,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="20766">
+<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="19852">
<summary>
Do not audit attempts to send cvs_server packets.
</summary>
@@ -22502,7 +22548,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cvs_server_packets" lineno="20785">
+<interface name="corenet_receive_cvs_server_packets" lineno="19871">
<summary>
Receive cvs_server packets.
</summary>
@@ -22513,7 +22559,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="20804">
+<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="19890">
<summary>
Do not audit attempts to receive cvs_server packets.
</summary>
@@ -22524,7 +22570,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cvs_server_packets" lineno="20823">
+<interface name="corenet_sendrecv_cvs_server_packets" lineno="19909">
<summary>
Send and receive cvs_server packets.
</summary>
@@ -22535,7 +22581,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="20839">
+<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="19925">
<summary>
Do not audit attempts to send and receive cvs_server packets.
</summary>
@@ -22546,7 +22592,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cvs_server_packets" lineno="20854">
+<interface name="corenet_relabelto_cvs_server_packets" lineno="19940">
<summary>
Relabel packets to cvs_server the packet type.
</summary>
@@ -22556,7 +22602,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="20876">
+<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="19962">
<summary>
Send and receive TCP traffic on the cyphesis port.
</summary>
@@ -22567,7 +22613,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_cyphesis_port" lineno="20895">
+<interface name="corenet_udp_send_cyphesis_port" lineno="19977">
<summary>
Send UDP traffic on the cyphesis port.
</summary>
@@ -22578,7 +22624,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="20914">
+<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="19992">
<summary>
Do not audit attempts to send UDP traffic on the cyphesis port.
</summary>
@@ -22589,7 +22635,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_cyphesis_port" lineno="20933">
+<interface name="corenet_udp_receive_cyphesis_port" lineno="20007">
<summary>
Receive UDP traffic on the cyphesis port.
</summary>
@@ -22600,7 +22646,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="20952">
+<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="20022">
<summary>
Do not audit attempts to receive UDP traffic on the cyphesis port.
</summary>
@@ -22611,7 +22657,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="20971">
+<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="20037">
<summary>
Send and receive UDP traffic on the cyphesis port.
</summary>
@@ -22622,7 +22668,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="20988">
+<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="20053">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cyphesis port.
@@ -22634,7 +22680,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_cyphesis_port" lineno="21004">
+<interface name="corenet_tcp_bind_cyphesis_port" lineno="20068">
<summary>
Bind TCP sockets to the cyphesis port.
</summary>
@@ -22645,7 +22691,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_cyphesis_port" lineno="21024">
+<interface name="corenet_udp_bind_cyphesis_port" lineno="20088">
<summary>
Bind UDP sockets to the cyphesis port.
</summary>
@@ -22656,7 +22702,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_cyphesis_port" lineno="21043">
+<interface name="corenet_tcp_connect_cyphesis_port" lineno="20107">
<summary>
Make a TCP connection to the cyphesis port.
</summary>
@@ -22666,7 +22712,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cyphesis_client_packets" lineno="21063">
+<interface name="corenet_send_cyphesis_client_packets" lineno="20127">
<summary>
Send cyphesis_client packets.
</summary>
@@ -22677,7 +22723,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="21082">
+<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="20146">
<summary>
Do not audit attempts to send cyphesis_client packets.
</summary>
@@ -22688,7 +22734,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cyphesis_client_packets" lineno="21101">
+<interface name="corenet_receive_cyphesis_client_packets" lineno="20165">
<summary>
Receive cyphesis_client packets.
</summary>
@@ -22699,7 +22745,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="21120">
+<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="20184">
<summary>
Do not audit attempts to receive cyphesis_client packets.
</summary>
@@ -22710,7 +22756,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="21139">
+<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="20203">
<summary>
Send and receive cyphesis_client packets.
</summary>
@@ -22721,7 +22767,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="21155">
+<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="20219">
<summary>
Do not audit attempts to send and receive cyphesis_client packets.
</summary>
@@ -22732,7 +22778,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cyphesis_client_packets" lineno="21170">
+<interface name="corenet_relabelto_cyphesis_client_packets" lineno="20234">
<summary>
Relabel packets to cyphesis_client the packet type.
</summary>
@@ -22742,7 +22788,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_cyphesis_server_packets" lineno="21190">
+<interface name="corenet_send_cyphesis_server_packets" lineno="20254">
<summary>
Send cyphesis_server packets.
</summary>
@@ -22753,7 +22799,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="21209">
+<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="20273">
<summary>
Do not audit attempts to send cyphesis_server packets.
</summary>
@@ -22764,7 +22810,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_cyphesis_server_packets" lineno="21228">
+<interface name="corenet_receive_cyphesis_server_packets" lineno="20292">
<summary>
Receive cyphesis_server packets.
</summary>
@@ -22775,7 +22821,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="21247">
+<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="20311">
<summary>
Do not audit attempts to receive cyphesis_server packets.
</summary>
@@ -22786,7 +22832,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="21266">
+<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="20330">
<summary>
Send and receive cyphesis_server packets.
</summary>
@@ -22797,7 +22843,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="21282">
+<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="20346">
<summary>
Do not audit attempts to send and receive cyphesis_server packets.
</summary>
@@ -22808,7 +22854,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_cyphesis_server_packets" lineno="21297">
+<interface name="corenet_relabelto_cyphesis_server_packets" lineno="20361">
<summary>
Relabel packets to cyphesis_server the packet type.
</summary>
@@ -22818,7 +22864,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_daap_port" lineno="21319">
+<interface name="corenet_tcp_sendrecv_daap_port" lineno="20383">
<summary>
Send and receive TCP traffic on the daap port.
</summary>
@@ -22829,7 +22875,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_daap_port" lineno="21338">
+<interface name="corenet_udp_send_daap_port" lineno="20398">
<summary>
Send UDP traffic on the daap port.
</summary>
@@ -22840,7 +22886,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_daap_port" lineno="21357">
+<interface name="corenet_dontaudit_udp_send_daap_port" lineno="20413">
<summary>
Do not audit attempts to send UDP traffic on the daap port.
</summary>
@@ -22851,7 +22897,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_daap_port" lineno="21376">
+<interface name="corenet_udp_receive_daap_port" lineno="20428">
<summary>
Receive UDP traffic on the daap port.
</summary>
@@ -22862,7 +22908,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="21395">
+<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="20443">
<summary>
Do not audit attempts to receive UDP traffic on the daap port.
</summary>
@@ -22873,7 +22919,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_daap_port" lineno="21414">
+<interface name="corenet_udp_sendrecv_daap_port" lineno="20458">
<summary>
Send and receive UDP traffic on the daap port.
</summary>
@@ -22884,7 +22930,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="21431">
+<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="20474">
<summary>
Do not audit attempts to send and receive
UDP traffic on the daap port.
@@ -22896,7 +22942,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_daap_port" lineno="21447">
+<interface name="corenet_tcp_bind_daap_port" lineno="20489">
<summary>
Bind TCP sockets to the daap port.
</summary>
@@ -22907,7 +22953,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_daap_port" lineno="21467">
+<interface name="corenet_udp_bind_daap_port" lineno="20509">
<summary>
Bind UDP sockets to the daap port.
</summary>
@@ -22918,7 +22964,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_daap_port" lineno="21486">
+<interface name="corenet_tcp_connect_daap_port" lineno="20528">
<summary>
Make a TCP connection to the daap port.
</summary>
@@ -22928,7 +22974,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_daap_client_packets" lineno="21506">
+<interface name="corenet_send_daap_client_packets" lineno="20548">
<summary>
Send daap_client packets.
</summary>
@@ -22939,7 +22985,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_daap_client_packets" lineno="21525">
+<interface name="corenet_dontaudit_send_daap_client_packets" lineno="20567">
<summary>
Do not audit attempts to send daap_client packets.
</summary>
@@ -22950,7 +22996,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_daap_client_packets" lineno="21544">
+<interface name="corenet_receive_daap_client_packets" lineno="20586">
<summary>
Receive daap_client packets.
</summary>
@@ -22961,7 +23007,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="21563">
+<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="20605">
<summary>
Do not audit attempts to receive daap_client packets.
</summary>
@@ -22972,7 +23018,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_daap_client_packets" lineno="21582">
+<interface name="corenet_sendrecv_daap_client_packets" lineno="20624">
<summary>
Send and receive daap_client packets.
</summary>
@@ -22983,7 +23029,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="21598">
+<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="20640">
<summary>
Do not audit attempts to send and receive daap_client packets.
</summary>
@@ -22994,7 +23040,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_daap_client_packets" lineno="21613">
+<interface name="corenet_relabelto_daap_client_packets" lineno="20655">
<summary>
Relabel packets to daap_client the packet type.
</summary>
@@ -23004,7 +23050,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_daap_server_packets" lineno="21633">
+<interface name="corenet_send_daap_server_packets" lineno="20675">
<summary>
Send daap_server packets.
</summary>
@@ -23015,7 +23061,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_daap_server_packets" lineno="21652">
+<interface name="corenet_dontaudit_send_daap_server_packets" lineno="20694">
<summary>
Do not audit attempts to send daap_server packets.
</summary>
@@ -23026,7 +23072,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_daap_server_packets" lineno="21671">
+<interface name="corenet_receive_daap_server_packets" lineno="20713">
<summary>
Receive daap_server packets.
</summary>
@@ -23037,7 +23083,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="21690">
+<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="20732">
<summary>
Do not audit attempts to receive daap_server packets.
</summary>
@@ -23048,7 +23094,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_daap_server_packets" lineno="21709">
+<interface name="corenet_sendrecv_daap_server_packets" lineno="20751">
<summary>
Send and receive daap_server packets.
</summary>
@@ -23059,7 +23105,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="21725">
+<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="20767">
<summary>
Do not audit attempts to send and receive daap_server packets.
</summary>
@@ -23070,7 +23116,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_daap_server_packets" lineno="21740">
+<interface name="corenet_relabelto_daap_server_packets" lineno="20782">
<summary>
Relabel packets to daap_server the packet type.
</summary>
@@ -23080,7 +23126,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="21762">
+<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="20804">
<summary>
Send and receive TCP traffic on the dbskkd port.
</summary>
@@ -23091,7 +23137,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dbskkd_port" lineno="21781">
+<interface name="corenet_udp_send_dbskkd_port" lineno="20819">
<summary>
Send UDP traffic on the dbskkd port.
</summary>
@@ -23102,7 +23148,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="21800">
+<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="20834">
<summary>
Do not audit attempts to send UDP traffic on the dbskkd port.
</summary>
@@ -23113,7 +23159,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dbskkd_port" lineno="21819">
+<interface name="corenet_udp_receive_dbskkd_port" lineno="20849">
<summary>
Receive UDP traffic on the dbskkd port.
</summary>
@@ -23124,7 +23170,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="21838">
+<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="20864">
<summary>
Do not audit attempts to receive UDP traffic on the dbskkd port.
</summary>
@@ -23135,7 +23181,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="21857">
+<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="20879">
<summary>
Send and receive UDP traffic on the dbskkd port.
</summary>
@@ -23146,7 +23192,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="21874">
+<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="20895">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dbskkd port.
@@ -23158,7 +23204,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dbskkd_port" lineno="21890">
+<interface name="corenet_tcp_bind_dbskkd_port" lineno="20910">
<summary>
Bind TCP sockets to the dbskkd port.
</summary>
@@ -23169,7 +23215,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dbskkd_port" lineno="21910">
+<interface name="corenet_udp_bind_dbskkd_port" lineno="20930">
<summary>
Bind UDP sockets to the dbskkd port.
</summary>
@@ -23180,7 +23226,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dbskkd_port" lineno="21929">
+<interface name="corenet_tcp_connect_dbskkd_port" lineno="20949">
<summary>
Make a TCP connection to the dbskkd port.
</summary>
@@ -23190,7 +23236,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dbskkd_client_packets" lineno="21949">
+<interface name="corenet_send_dbskkd_client_packets" lineno="20969">
<summary>
Send dbskkd_client packets.
</summary>
@@ -23201,7 +23247,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="21968">
+<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="20988">
<summary>
Do not audit attempts to send dbskkd_client packets.
</summary>
@@ -23212,7 +23258,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dbskkd_client_packets" lineno="21987">
+<interface name="corenet_receive_dbskkd_client_packets" lineno="21007">
<summary>
Receive dbskkd_client packets.
</summary>
@@ -23223,7 +23269,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="22006">
+<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="21026">
<summary>
Do not audit attempts to receive dbskkd_client packets.
</summary>
@@ -23234,7 +23280,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="22025">
+<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="21045">
<summary>
Send and receive dbskkd_client packets.
</summary>
@@ -23245,7 +23291,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="22041">
+<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="21061">
<summary>
Do not audit attempts to send and receive dbskkd_client packets.
</summary>
@@ -23256,7 +23302,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dbskkd_client_packets" lineno="22056">
+<interface name="corenet_relabelto_dbskkd_client_packets" lineno="21076">
<summary>
Relabel packets to dbskkd_client the packet type.
</summary>
@@ -23266,7 +23312,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dbskkd_server_packets" lineno="22076">
+<interface name="corenet_send_dbskkd_server_packets" lineno="21096">
<summary>
Send dbskkd_server packets.
</summary>
@@ -23277,7 +23323,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="22095">
+<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="21115">
<summary>
Do not audit attempts to send dbskkd_server packets.
</summary>
@@ -23288,7 +23334,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dbskkd_server_packets" lineno="22114">
+<interface name="corenet_receive_dbskkd_server_packets" lineno="21134">
<summary>
Receive dbskkd_server packets.
</summary>
@@ -23299,7 +23345,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="22133">
+<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="21153">
<summary>
Do not audit attempts to receive dbskkd_server packets.
</summary>
@@ -23310,7 +23356,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="22152">
+<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="21172">
<summary>
Send and receive dbskkd_server packets.
</summary>
@@ -23321,7 +23367,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="22168">
+<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="21188">
<summary>
Do not audit attempts to send and receive dbskkd_server packets.
</summary>
@@ -23332,7 +23378,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dbskkd_server_packets" lineno="22183">
+<interface name="corenet_relabelto_dbskkd_server_packets" lineno="21203">
<summary>
Relabel packets to dbskkd_server the packet type.
</summary>
@@ -23342,7 +23388,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dcc_port" lineno="22205">
+<interface name="corenet_tcp_sendrecv_dcc_port" lineno="21225">
<summary>
Send and receive TCP traffic on the dcc port.
</summary>
@@ -23353,7 +23399,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dcc_port" lineno="22224">
+<interface name="corenet_udp_send_dcc_port" lineno="21240">
<summary>
Send UDP traffic on the dcc port.
</summary>
@@ -23364,7 +23410,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="22243">
+<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="21255">
<summary>
Do not audit attempts to send UDP traffic on the dcc port.
</summary>
@@ -23375,7 +23421,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dcc_port" lineno="22262">
+<interface name="corenet_udp_receive_dcc_port" lineno="21270">
<summary>
Receive UDP traffic on the dcc port.
</summary>
@@ -23386,7 +23432,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="22281">
+<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="21285">
<summary>
Do not audit attempts to receive UDP traffic on the dcc port.
</summary>
@@ -23397,7 +23443,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dcc_port" lineno="22300">
+<interface name="corenet_udp_sendrecv_dcc_port" lineno="21300">
<summary>
Send and receive UDP traffic on the dcc port.
</summary>
@@ -23408,7 +23454,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="22317">
+<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="21316">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dcc port.
@@ -23420,7 +23466,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dcc_port" lineno="22333">
+<interface name="corenet_tcp_bind_dcc_port" lineno="21331">
<summary>
Bind TCP sockets to the dcc port.
</summary>
@@ -23431,7 +23477,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dcc_port" lineno="22353">
+<interface name="corenet_udp_bind_dcc_port" lineno="21351">
<summary>
Bind UDP sockets to the dcc port.
</summary>
@@ -23442,7 +23488,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dcc_port" lineno="22372">
+<interface name="corenet_tcp_connect_dcc_port" lineno="21370">
<summary>
Make a TCP connection to the dcc port.
</summary>
@@ -23452,7 +23498,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dcc_client_packets" lineno="22392">
+<interface name="corenet_send_dcc_client_packets" lineno="21390">
<summary>
Send dcc_client packets.
</summary>
@@ -23463,7 +23509,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="22411">
+<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="21409">
<summary>
Do not audit attempts to send dcc_client packets.
</summary>
@@ -23474,7 +23520,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dcc_client_packets" lineno="22430">
+<interface name="corenet_receive_dcc_client_packets" lineno="21428">
<summary>
Receive dcc_client packets.
</summary>
@@ -23485,7 +23531,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="22449">
+<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="21447">
<summary>
Do not audit attempts to receive dcc_client packets.
</summary>
@@ -23496,7 +23542,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dcc_client_packets" lineno="22468">
+<interface name="corenet_sendrecv_dcc_client_packets" lineno="21466">
<summary>
Send and receive dcc_client packets.
</summary>
@@ -23507,7 +23553,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="22484">
+<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="21482">
<summary>
Do not audit attempts to send and receive dcc_client packets.
</summary>
@@ -23518,7 +23564,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dcc_client_packets" lineno="22499">
+<interface name="corenet_relabelto_dcc_client_packets" lineno="21497">
<summary>
Relabel packets to dcc_client the packet type.
</summary>
@@ -23528,7 +23574,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dcc_server_packets" lineno="22519">
+<interface name="corenet_send_dcc_server_packets" lineno="21517">
<summary>
Send dcc_server packets.
</summary>
@@ -23539,7 +23585,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="22538">
+<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="21536">
<summary>
Do not audit attempts to send dcc_server packets.
</summary>
@@ -23550,7 +23596,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dcc_server_packets" lineno="22557">
+<interface name="corenet_receive_dcc_server_packets" lineno="21555">
<summary>
Receive dcc_server packets.
</summary>
@@ -23561,7 +23607,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="22576">
+<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="21574">
<summary>
Do not audit attempts to receive dcc_server packets.
</summary>
@@ -23572,7 +23618,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dcc_server_packets" lineno="22595">
+<interface name="corenet_sendrecv_dcc_server_packets" lineno="21593">
<summary>
Send and receive dcc_server packets.
</summary>
@@ -23583,7 +23629,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="22611">
+<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="21609">
<summary>
Do not audit attempts to send and receive dcc_server packets.
</summary>
@@ -23594,7 +23640,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dcc_server_packets" lineno="22626">
+<interface name="corenet_relabelto_dcc_server_packets" lineno="21624">
<summary>
Relabel packets to dcc_server the packet type.
</summary>
@@ -23604,7 +23650,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dccm_port" lineno="22648">
+<interface name="corenet_tcp_sendrecv_dccm_port" lineno="21646">
<summary>
Send and receive TCP traffic on the dccm port.
</summary>
@@ -23615,7 +23661,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dccm_port" lineno="22667">
+<interface name="corenet_udp_send_dccm_port" lineno="21661">
<summary>
Send UDP traffic on the dccm port.
</summary>
@@ -23626,7 +23672,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="22686">
+<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="21676">
<summary>
Do not audit attempts to send UDP traffic on the dccm port.
</summary>
@@ -23637,7 +23683,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dccm_port" lineno="22705">
+<interface name="corenet_udp_receive_dccm_port" lineno="21691">
<summary>
Receive UDP traffic on the dccm port.
</summary>
@@ -23648,7 +23694,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="22724">
+<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="21706">
<summary>
Do not audit attempts to receive UDP traffic on the dccm port.
</summary>
@@ -23659,7 +23705,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dccm_port" lineno="22743">
+<interface name="corenet_udp_sendrecv_dccm_port" lineno="21721">
<summary>
Send and receive UDP traffic on the dccm port.
</summary>
@@ -23670,7 +23716,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="22760">
+<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="21737">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dccm port.
@@ -23682,7 +23728,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dccm_port" lineno="22776">
+<interface name="corenet_tcp_bind_dccm_port" lineno="21752">
<summary>
Bind TCP sockets to the dccm port.
</summary>
@@ -23693,7 +23739,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dccm_port" lineno="22796">
+<interface name="corenet_udp_bind_dccm_port" lineno="21772">
<summary>
Bind UDP sockets to the dccm port.
</summary>
@@ -23704,7 +23750,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dccm_port" lineno="22815">
+<interface name="corenet_tcp_connect_dccm_port" lineno="21791">
<summary>
Make a TCP connection to the dccm port.
</summary>
@@ -23714,7 +23760,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dccm_client_packets" lineno="22835">
+<interface name="corenet_send_dccm_client_packets" lineno="21811">
<summary>
Send dccm_client packets.
</summary>
@@ -23725,7 +23771,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="22854">
+<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="21830">
<summary>
Do not audit attempts to send dccm_client packets.
</summary>
@@ -23736,7 +23782,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dccm_client_packets" lineno="22873">
+<interface name="corenet_receive_dccm_client_packets" lineno="21849">
<summary>
Receive dccm_client packets.
</summary>
@@ -23747,7 +23793,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="22892">
+<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="21868">
<summary>
Do not audit attempts to receive dccm_client packets.
</summary>
@@ -23758,7 +23804,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dccm_client_packets" lineno="22911">
+<interface name="corenet_sendrecv_dccm_client_packets" lineno="21887">
<summary>
Send and receive dccm_client packets.
</summary>
@@ -23769,7 +23815,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="22927">
+<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="21903">
<summary>
Do not audit attempts to send and receive dccm_client packets.
</summary>
@@ -23780,7 +23826,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dccm_client_packets" lineno="22942">
+<interface name="corenet_relabelto_dccm_client_packets" lineno="21918">
<summary>
Relabel packets to dccm_client the packet type.
</summary>
@@ -23790,7 +23836,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dccm_server_packets" lineno="22962">
+<interface name="corenet_send_dccm_server_packets" lineno="21938">
<summary>
Send dccm_server packets.
</summary>
@@ -23801,7 +23847,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="22981">
+<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="21957">
<summary>
Do not audit attempts to send dccm_server packets.
</summary>
@@ -23812,7 +23858,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dccm_server_packets" lineno="23000">
+<interface name="corenet_receive_dccm_server_packets" lineno="21976">
<summary>
Receive dccm_server packets.
</summary>
@@ -23823,7 +23869,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="23019">
+<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="21995">
<summary>
Do not audit attempts to receive dccm_server packets.
</summary>
@@ -23834,7 +23880,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dccm_server_packets" lineno="23038">
+<interface name="corenet_sendrecv_dccm_server_packets" lineno="22014">
<summary>
Send and receive dccm_server packets.
</summary>
@@ -23845,7 +23891,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="23054">
+<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="22030">
<summary>
Do not audit attempts to send and receive dccm_server packets.
</summary>
@@ -23856,7 +23902,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dccm_server_packets" lineno="23069">
+<interface name="corenet_relabelto_dccm_server_packets" lineno="22045">
<summary>
Relabel packets to dccm_server the packet type.
</summary>
@@ -23866,7 +23912,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="23091">
+<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="22067">
<summary>
Send and receive TCP traffic on the dhcpc port.
</summary>
@@ -23877,7 +23923,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dhcpc_port" lineno="23110">
+<interface name="corenet_udp_send_dhcpc_port" lineno="22082">
<summary>
Send UDP traffic on the dhcpc port.
</summary>
@@ -23888,7 +23934,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="23129">
+<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="22097">
<summary>
Do not audit attempts to send UDP traffic on the dhcpc port.
</summary>
@@ -23899,7 +23945,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dhcpc_port" lineno="23148">
+<interface name="corenet_udp_receive_dhcpc_port" lineno="22112">
<summary>
Receive UDP traffic on the dhcpc port.
</summary>
@@ -23910,7 +23956,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="23167">
+<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="22127">
<summary>
Do not audit attempts to receive UDP traffic on the dhcpc port.
</summary>
@@ -23921,7 +23967,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="23186">
+<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="22142">
<summary>
Send and receive UDP traffic on the dhcpc port.
</summary>
@@ -23932,7 +23978,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="23203">
+<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="22158">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dhcpc port.
@@ -23944,7 +23990,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dhcpc_port" lineno="23219">
+<interface name="corenet_tcp_bind_dhcpc_port" lineno="22173">
<summary>
Bind TCP sockets to the dhcpc port.
</summary>
@@ -23955,7 +24001,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dhcpc_port" lineno="23239">
+<interface name="corenet_udp_bind_dhcpc_port" lineno="22193">
<summary>
Bind UDP sockets to the dhcpc port.
</summary>
@@ -23966,7 +24012,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dhcpc_port" lineno="23258">
+<interface name="corenet_tcp_connect_dhcpc_port" lineno="22212">
<summary>
Make a TCP connection to the dhcpc port.
</summary>
@@ -23976,7 +24022,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dhcpc_client_packets" lineno="23278">
+<interface name="corenet_send_dhcpc_client_packets" lineno="22232">
<summary>
Send dhcpc_client packets.
</summary>
@@ -23987,7 +24033,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="23297">
+<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="22251">
<summary>
Do not audit attempts to send dhcpc_client packets.
</summary>
@@ -23998,7 +24044,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dhcpc_client_packets" lineno="23316">
+<interface name="corenet_receive_dhcpc_client_packets" lineno="22270">
<summary>
Receive dhcpc_client packets.
</summary>
@@ -24009,7 +24055,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="23335">
+<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="22289">
<summary>
Do not audit attempts to receive dhcpc_client packets.
</summary>
@@ -24020,7 +24066,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="23354">
+<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="22308">
<summary>
Send and receive dhcpc_client packets.
</summary>
@@ -24031,7 +24077,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="23370">
+<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="22324">
<summary>
Do not audit attempts to send and receive dhcpc_client packets.
</summary>
@@ -24042,7 +24088,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dhcpc_client_packets" lineno="23385">
+<interface name="corenet_relabelto_dhcpc_client_packets" lineno="22339">
<summary>
Relabel packets to dhcpc_client the packet type.
</summary>
@@ -24052,7 +24098,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dhcpc_server_packets" lineno="23405">
+<interface name="corenet_send_dhcpc_server_packets" lineno="22359">
<summary>
Send dhcpc_server packets.
</summary>
@@ -24063,7 +24109,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="23424">
+<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="22378">
<summary>
Do not audit attempts to send dhcpc_server packets.
</summary>
@@ -24074,7 +24120,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dhcpc_server_packets" lineno="23443">
+<interface name="corenet_receive_dhcpc_server_packets" lineno="22397">
<summary>
Receive dhcpc_server packets.
</summary>
@@ -24085,7 +24131,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="23462">
+<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="22416">
<summary>
Do not audit attempts to receive dhcpc_server packets.
</summary>
@@ -24096,7 +24142,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="23481">
+<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="22435">
<summary>
Send and receive dhcpc_server packets.
</summary>
@@ -24107,7 +24153,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="23497">
+<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="22451">
<summary>
Do not audit attempts to send and receive dhcpc_server packets.
</summary>
@@ -24118,7 +24164,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dhcpc_server_packets" lineno="23512">
+<interface name="corenet_relabelto_dhcpc_server_packets" lineno="22466">
<summary>
Relabel packets to dhcpc_server the packet type.
</summary>
@@ -24128,7 +24174,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="23534">
+<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="22488">
<summary>
Send and receive TCP traffic on the dhcpd port.
</summary>
@@ -24139,7 +24185,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dhcpd_port" lineno="23553">
+<interface name="corenet_udp_send_dhcpd_port" lineno="22503">
<summary>
Send UDP traffic on the dhcpd port.
</summary>
@@ -24150,7 +24196,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="23572">
+<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="22518">
<summary>
Do not audit attempts to send UDP traffic on the dhcpd port.
</summary>
@@ -24161,7 +24207,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dhcpd_port" lineno="23591">
+<interface name="corenet_udp_receive_dhcpd_port" lineno="22533">
<summary>
Receive UDP traffic on the dhcpd port.
</summary>
@@ -24172,7 +24218,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="23610">
+<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="22548">
<summary>
Do not audit attempts to receive UDP traffic on the dhcpd port.
</summary>
@@ -24183,7 +24229,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="23629">
+<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="22563">
<summary>
Send and receive UDP traffic on the dhcpd port.
</summary>
@@ -24194,7 +24240,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="23646">
+<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="22579">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dhcpd port.
@@ -24206,7 +24252,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dhcpd_port" lineno="23662">
+<interface name="corenet_tcp_bind_dhcpd_port" lineno="22594">
<summary>
Bind TCP sockets to the dhcpd port.
</summary>
@@ -24217,7 +24263,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dhcpd_port" lineno="23682">
+<interface name="corenet_udp_bind_dhcpd_port" lineno="22614">
<summary>
Bind UDP sockets to the dhcpd port.
</summary>
@@ -24228,7 +24274,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dhcpd_port" lineno="23701">
+<interface name="corenet_tcp_connect_dhcpd_port" lineno="22633">
<summary>
Make a TCP connection to the dhcpd port.
</summary>
@@ -24238,7 +24284,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dhcpd_client_packets" lineno="23721">
+<interface name="corenet_send_dhcpd_client_packets" lineno="22653">
<summary>
Send dhcpd_client packets.
</summary>
@@ -24249,7 +24295,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="23740">
+<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="22672">
<summary>
Do not audit attempts to send dhcpd_client packets.
</summary>
@@ -24260,7 +24306,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dhcpd_client_packets" lineno="23759">
+<interface name="corenet_receive_dhcpd_client_packets" lineno="22691">
<summary>
Receive dhcpd_client packets.
</summary>
@@ -24271,7 +24317,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="23778">
+<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="22710">
<summary>
Do not audit attempts to receive dhcpd_client packets.
</summary>
@@ -24282,7 +24328,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="23797">
+<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="22729">
<summary>
Send and receive dhcpd_client packets.
</summary>
@@ -24293,7 +24339,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="23813">
+<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="22745">
<summary>
Do not audit attempts to send and receive dhcpd_client packets.
</summary>
@@ -24304,7 +24350,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dhcpd_client_packets" lineno="23828">
+<interface name="corenet_relabelto_dhcpd_client_packets" lineno="22760">
<summary>
Relabel packets to dhcpd_client the packet type.
</summary>
@@ -24314,7 +24360,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dhcpd_server_packets" lineno="23848">
+<interface name="corenet_send_dhcpd_server_packets" lineno="22780">
<summary>
Send dhcpd_server packets.
</summary>
@@ -24325,7 +24371,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="23867">
+<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="22799">
<summary>
Do not audit attempts to send dhcpd_server packets.
</summary>
@@ -24336,7 +24382,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dhcpd_server_packets" lineno="23886">
+<interface name="corenet_receive_dhcpd_server_packets" lineno="22818">
<summary>
Receive dhcpd_server packets.
</summary>
@@ -24347,7 +24393,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="23905">
+<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="22837">
<summary>
Do not audit attempts to receive dhcpd_server packets.
</summary>
@@ -24358,7 +24404,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="23924">
+<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="22856">
<summary>
Send and receive dhcpd_server packets.
</summary>
@@ -24369,7 +24415,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="23940">
+<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="22872">
<summary>
Do not audit attempts to send and receive dhcpd_server packets.
</summary>
@@ -24380,7 +24426,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dhcpd_server_packets" lineno="23955">
+<interface name="corenet_relabelto_dhcpd_server_packets" lineno="22887">
<summary>
Relabel packets to dhcpd_server the packet type.
</summary>
@@ -24390,7 +24436,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dict_port" lineno="23977">
+<interface name="corenet_tcp_sendrecv_dict_port" lineno="22909">
<summary>
Send and receive TCP traffic on the dict port.
</summary>
@@ -24401,7 +24447,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dict_port" lineno="23996">
+<interface name="corenet_udp_send_dict_port" lineno="22924">
<summary>
Send UDP traffic on the dict port.
</summary>
@@ -24412,7 +24458,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dict_port" lineno="24015">
+<interface name="corenet_dontaudit_udp_send_dict_port" lineno="22939">
<summary>
Do not audit attempts to send UDP traffic on the dict port.
</summary>
@@ -24423,7 +24469,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dict_port" lineno="24034">
+<interface name="corenet_udp_receive_dict_port" lineno="22954">
<summary>
Receive UDP traffic on the dict port.
</summary>
@@ -24434,7 +24480,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="24053">
+<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="22969">
<summary>
Do not audit attempts to receive UDP traffic on the dict port.
</summary>
@@ -24445,7 +24491,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dict_port" lineno="24072">
+<interface name="corenet_udp_sendrecv_dict_port" lineno="22984">
<summary>
Send and receive UDP traffic on the dict port.
</summary>
@@ -24456,7 +24502,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="24089">
+<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="23000">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dict port.
@@ -24468,7 +24514,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dict_port" lineno="24105">
+<interface name="corenet_tcp_bind_dict_port" lineno="23015">
<summary>
Bind TCP sockets to the dict port.
</summary>
@@ -24479,7 +24525,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dict_port" lineno="24125">
+<interface name="corenet_udp_bind_dict_port" lineno="23035">
<summary>
Bind UDP sockets to the dict port.
</summary>
@@ -24490,7 +24536,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dict_port" lineno="24144">
+<interface name="corenet_tcp_connect_dict_port" lineno="23054">
<summary>
Make a TCP connection to the dict port.
</summary>
@@ -24500,7 +24546,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dict_client_packets" lineno="24164">
+<interface name="corenet_send_dict_client_packets" lineno="23074">
<summary>
Send dict_client packets.
</summary>
@@ -24511,7 +24557,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dict_client_packets" lineno="24183">
+<interface name="corenet_dontaudit_send_dict_client_packets" lineno="23093">
<summary>
Do not audit attempts to send dict_client packets.
</summary>
@@ -24522,7 +24568,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dict_client_packets" lineno="24202">
+<interface name="corenet_receive_dict_client_packets" lineno="23112">
<summary>
Receive dict_client packets.
</summary>
@@ -24533,7 +24579,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="24221">
+<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="23131">
<summary>
Do not audit attempts to receive dict_client packets.
</summary>
@@ -24544,7 +24590,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dict_client_packets" lineno="24240">
+<interface name="corenet_sendrecv_dict_client_packets" lineno="23150">
<summary>
Send and receive dict_client packets.
</summary>
@@ -24555,7 +24601,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="24256">
+<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="23166">
<summary>
Do not audit attempts to send and receive dict_client packets.
</summary>
@@ -24566,7 +24612,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dict_client_packets" lineno="24271">
+<interface name="corenet_relabelto_dict_client_packets" lineno="23181">
<summary>
Relabel packets to dict_client the packet type.
</summary>
@@ -24576,7 +24622,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dict_server_packets" lineno="24291">
+<interface name="corenet_send_dict_server_packets" lineno="23201">
<summary>
Send dict_server packets.
</summary>
@@ -24587,7 +24633,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dict_server_packets" lineno="24310">
+<interface name="corenet_dontaudit_send_dict_server_packets" lineno="23220">
<summary>
Do not audit attempts to send dict_server packets.
</summary>
@@ -24598,7 +24644,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dict_server_packets" lineno="24329">
+<interface name="corenet_receive_dict_server_packets" lineno="23239">
<summary>
Receive dict_server packets.
</summary>
@@ -24609,7 +24655,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="24348">
+<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="23258">
<summary>
Do not audit attempts to receive dict_server packets.
</summary>
@@ -24620,7 +24666,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dict_server_packets" lineno="24367">
+<interface name="corenet_sendrecv_dict_server_packets" lineno="23277">
<summary>
Send and receive dict_server packets.
</summary>
@@ -24631,7 +24677,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="24383">
+<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="23293">
<summary>
Do not audit attempts to send and receive dict_server packets.
</summary>
@@ -24642,7 +24688,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dict_server_packets" lineno="24398">
+<interface name="corenet_relabelto_dict_server_packets" lineno="23308">
<summary>
Relabel packets to dict_server the packet type.
</summary>
@@ -24652,7 +24698,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_distccd_port" lineno="24420">
+<interface name="corenet_tcp_sendrecv_distccd_port" lineno="23330">
<summary>
Send and receive TCP traffic on the distccd port.
</summary>
@@ -24663,7 +24709,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_distccd_port" lineno="24439">
+<interface name="corenet_udp_send_distccd_port" lineno="23345">
<summary>
Send UDP traffic on the distccd port.
</summary>
@@ -24674,7 +24720,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="24458">
+<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="23360">
<summary>
Do not audit attempts to send UDP traffic on the distccd port.
</summary>
@@ -24685,7 +24731,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_distccd_port" lineno="24477">
+<interface name="corenet_udp_receive_distccd_port" lineno="23375">
<summary>
Receive UDP traffic on the distccd port.
</summary>
@@ -24696,7 +24742,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="24496">
+<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="23390">
<summary>
Do not audit attempts to receive UDP traffic on the distccd port.
</summary>
@@ -24707,7 +24753,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_distccd_port" lineno="24515">
+<interface name="corenet_udp_sendrecv_distccd_port" lineno="23405">
<summary>
Send and receive UDP traffic on the distccd port.
</summary>
@@ -24718,7 +24764,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="24532">
+<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="23421">
<summary>
Do not audit attempts to send and receive
UDP traffic on the distccd port.
@@ -24730,7 +24776,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_distccd_port" lineno="24548">
+<interface name="corenet_tcp_bind_distccd_port" lineno="23436">
<summary>
Bind TCP sockets to the distccd port.
</summary>
@@ -24741,7 +24787,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_distccd_port" lineno="24568">
+<interface name="corenet_udp_bind_distccd_port" lineno="23456">
<summary>
Bind UDP sockets to the distccd port.
</summary>
@@ -24752,7 +24798,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_distccd_port" lineno="24587">
+<interface name="corenet_tcp_connect_distccd_port" lineno="23475">
<summary>
Make a TCP connection to the distccd port.
</summary>
@@ -24762,7 +24808,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_distccd_client_packets" lineno="24607">
+<interface name="corenet_send_distccd_client_packets" lineno="23495">
<summary>
Send distccd_client packets.
</summary>
@@ -24773,7 +24819,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="24626">
+<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="23514">
<summary>
Do not audit attempts to send distccd_client packets.
</summary>
@@ -24784,7 +24830,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_distccd_client_packets" lineno="24645">
+<interface name="corenet_receive_distccd_client_packets" lineno="23533">
<summary>
Receive distccd_client packets.
</summary>
@@ -24795,7 +24841,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="24664">
+<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="23552">
<summary>
Do not audit attempts to receive distccd_client packets.
</summary>
@@ -24806,7 +24852,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_distccd_client_packets" lineno="24683">
+<interface name="corenet_sendrecv_distccd_client_packets" lineno="23571">
<summary>
Send and receive distccd_client packets.
</summary>
@@ -24817,7 +24863,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="24699">
+<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="23587">
<summary>
Do not audit attempts to send and receive distccd_client packets.
</summary>
@@ -24828,7 +24874,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_distccd_client_packets" lineno="24714">
+<interface name="corenet_relabelto_distccd_client_packets" lineno="23602">
<summary>
Relabel packets to distccd_client the packet type.
</summary>
@@ -24838,7 +24884,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_distccd_server_packets" lineno="24734">
+<interface name="corenet_send_distccd_server_packets" lineno="23622">
<summary>
Send distccd_server packets.
</summary>
@@ -24849,7 +24895,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="24753">
+<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="23641">
<summary>
Do not audit attempts to send distccd_server packets.
</summary>
@@ -24860,7 +24906,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_distccd_server_packets" lineno="24772">
+<interface name="corenet_receive_distccd_server_packets" lineno="23660">
<summary>
Receive distccd_server packets.
</summary>
@@ -24871,7 +24917,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="24791">
+<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="23679">
<summary>
Do not audit attempts to receive distccd_server packets.
</summary>
@@ -24882,7 +24928,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_distccd_server_packets" lineno="24810">
+<interface name="corenet_sendrecv_distccd_server_packets" lineno="23698">
<summary>
Send and receive distccd_server packets.
</summary>
@@ -24893,7 +24939,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="24826">
+<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="23714">
<summary>
Do not audit attempts to send and receive distccd_server packets.
</summary>
@@ -24904,7 +24950,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_distccd_server_packets" lineno="24841">
+<interface name="corenet_relabelto_distccd_server_packets" lineno="23729">
<summary>
Relabel packets to distccd_server the packet type.
</summary>
@@ -24914,7 +24960,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dns_port" lineno="24863">
+<interface name="corenet_tcp_sendrecv_dns_port" lineno="23751">
<summary>
Send and receive TCP traffic on the dns port.
</summary>
@@ -24925,7 +24971,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dns_port" lineno="24882">
+<interface name="corenet_udp_send_dns_port" lineno="23766">
<summary>
Send UDP traffic on the dns port.
</summary>
@@ -24936,7 +24982,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dns_port" lineno="24901">
+<interface name="corenet_dontaudit_udp_send_dns_port" lineno="23781">
<summary>
Do not audit attempts to send UDP traffic on the dns port.
</summary>
@@ -24947,7 +24993,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dns_port" lineno="24920">
+<interface name="corenet_udp_receive_dns_port" lineno="23796">
<summary>
Receive UDP traffic on the dns port.
</summary>
@@ -24958,7 +25004,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="24939">
+<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="23811">
<summary>
Do not audit attempts to receive UDP traffic on the dns port.
</summary>
@@ -24969,7 +25015,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dns_port" lineno="24958">
+<interface name="corenet_udp_sendrecv_dns_port" lineno="23826">
<summary>
Send and receive UDP traffic on the dns port.
</summary>
@@ -24980,7 +25026,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="24975">
+<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="23842">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dns port.
@@ -24992,7 +25038,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dns_port" lineno="24991">
+<interface name="corenet_tcp_bind_dns_port" lineno="23857">
<summary>
Bind TCP sockets to the dns port.
</summary>
@@ -25003,7 +25049,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dns_port" lineno="25011">
+<interface name="corenet_udp_bind_dns_port" lineno="23877">
<summary>
Bind UDP sockets to the dns port.
</summary>
@@ -25014,7 +25060,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dns_port" lineno="25030">
+<interface name="corenet_tcp_connect_dns_port" lineno="23896">
<summary>
Make a TCP connection to the dns port.
</summary>
@@ -25024,7 +25070,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dns_client_packets" lineno="25050">
+<interface name="corenet_send_dns_client_packets" lineno="23916">
<summary>
Send dns_client packets.
</summary>
@@ -25035,7 +25081,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dns_client_packets" lineno="25069">
+<interface name="corenet_dontaudit_send_dns_client_packets" lineno="23935">
<summary>
Do not audit attempts to send dns_client packets.
</summary>
@@ -25046,7 +25092,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dns_client_packets" lineno="25088">
+<interface name="corenet_receive_dns_client_packets" lineno="23954">
<summary>
Receive dns_client packets.
</summary>
@@ -25057,7 +25103,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="25107">
+<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="23973">
<summary>
Do not audit attempts to receive dns_client packets.
</summary>
@@ -25068,7 +25114,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dns_client_packets" lineno="25126">
+<interface name="corenet_sendrecv_dns_client_packets" lineno="23992">
<summary>
Send and receive dns_client packets.
</summary>
@@ -25079,7 +25125,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="25142">
+<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="24008">
<summary>
Do not audit attempts to send and receive dns_client packets.
</summary>
@@ -25090,7 +25136,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dns_client_packets" lineno="25157">
+<interface name="corenet_relabelto_dns_client_packets" lineno="24023">
<summary>
Relabel packets to dns_client the packet type.
</summary>
@@ -25100,7 +25146,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dns_server_packets" lineno="25177">
+<interface name="corenet_send_dns_server_packets" lineno="24043">
<summary>
Send dns_server packets.
</summary>
@@ -25111,7 +25157,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dns_server_packets" lineno="25196">
+<interface name="corenet_dontaudit_send_dns_server_packets" lineno="24062">
<summary>
Do not audit attempts to send dns_server packets.
</summary>
@@ -25122,7 +25168,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dns_server_packets" lineno="25215">
+<interface name="corenet_receive_dns_server_packets" lineno="24081">
<summary>
Receive dns_server packets.
</summary>
@@ -25133,7 +25179,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="25234">
+<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="24100">
<summary>
Do not audit attempts to receive dns_server packets.
</summary>
@@ -25144,7 +25190,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dns_server_packets" lineno="25253">
+<interface name="corenet_sendrecv_dns_server_packets" lineno="24119">
<summary>
Send and receive dns_server packets.
</summary>
@@ -25155,7 +25201,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="25269">
+<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="24135">
<summary>
Do not audit attempts to send and receive dns_server packets.
</summary>
@@ -25166,7 +25212,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dns_server_packets" lineno="25284">
+<interface name="corenet_relabelto_dns_server_packets" lineno="24150">
<summary>
Relabel packets to dns_server the packet type.
</summary>
@@ -25176,7 +25222,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_dropbox_port" lineno="25306">
+<interface name="corenet_tcp_sendrecv_dropbox_port" lineno="24172">
<summary>
Send and receive TCP traffic on the dropbox port.
</summary>
@@ -25187,7 +25233,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_dropbox_port" lineno="25325">
+<interface name="corenet_udp_send_dropbox_port" lineno="24187">
<summary>
Send UDP traffic on the dropbox port.
</summary>
@@ -25198,7 +25244,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_dropbox_port" lineno="25344">
+<interface name="corenet_dontaudit_udp_send_dropbox_port" lineno="24202">
<summary>
Do not audit attempts to send UDP traffic on the dropbox port.
</summary>
@@ -25209,7 +25255,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_dropbox_port" lineno="25363">
+<interface name="corenet_udp_receive_dropbox_port" lineno="24217">
<summary>
Receive UDP traffic on the dropbox port.
</summary>
@@ -25220,7 +25266,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_dropbox_port" lineno="25382">
+<interface name="corenet_dontaudit_udp_receive_dropbox_port" lineno="24232">
<summary>
Do not audit attempts to receive UDP traffic on the dropbox port.
</summary>
@@ -25231,7 +25277,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_dropbox_port" lineno="25401">
+<interface name="corenet_udp_sendrecv_dropbox_port" lineno="24247">
<summary>
Send and receive UDP traffic on the dropbox port.
</summary>
@@ -25242,7 +25288,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_dropbox_port" lineno="25418">
+<interface name="corenet_dontaudit_udp_sendrecv_dropbox_port" lineno="24263">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dropbox port.
@@ -25254,7 +25300,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_dropbox_port" lineno="25434">
+<interface name="corenet_tcp_bind_dropbox_port" lineno="24278">
<summary>
Bind TCP sockets to the dropbox port.
</summary>
@@ -25265,7 +25311,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_dropbox_port" lineno="25454">
+<interface name="corenet_udp_bind_dropbox_port" lineno="24298">
<summary>
Bind UDP sockets to the dropbox port.
</summary>
@@ -25276,7 +25322,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_dropbox_port" lineno="25473">
+<interface name="corenet_tcp_connect_dropbox_port" lineno="24317">
<summary>
Make a TCP connection to the dropbox port.
</summary>
@@ -25286,7 +25332,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dropbox_client_packets" lineno="25493">
+<interface name="corenet_send_dropbox_client_packets" lineno="24337">
<summary>
Send dropbox_client packets.
</summary>
@@ -25297,7 +25343,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="25512">
+<interface name="corenet_dontaudit_send_dropbox_client_packets" lineno="24356">
<summary>
Do not audit attempts to send dropbox_client packets.
</summary>
@@ -25308,7 +25354,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dropbox_client_packets" lineno="25531">
+<interface name="corenet_receive_dropbox_client_packets" lineno="24375">
<summary>
Receive dropbox_client packets.
</summary>
@@ -25319,7 +25365,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="25550">
+<interface name="corenet_dontaudit_receive_dropbox_client_packets" lineno="24394">
<summary>
Do not audit attempts to receive dropbox_client packets.
</summary>
@@ -25330,7 +25376,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dropbox_client_packets" lineno="25569">
+<interface name="corenet_sendrecv_dropbox_client_packets" lineno="24413">
<summary>
Send and receive dropbox_client packets.
</summary>
@@ -25341,7 +25387,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="25585">
+<interface name="corenet_dontaudit_sendrecv_dropbox_client_packets" lineno="24429">
<summary>
Do not audit attempts to send and receive dropbox_client packets.
</summary>
@@ -25352,7 +25398,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dropbox_client_packets" lineno="25600">
+<interface name="corenet_relabelto_dropbox_client_packets" lineno="24444">
<summary>
Relabel packets to dropbox_client the packet type.
</summary>
@@ -25362,7 +25408,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_dropbox_server_packets" lineno="25620">
+<interface name="corenet_send_dropbox_server_packets" lineno="24464">
<summary>
Send dropbox_server packets.
</summary>
@@ -25373,7 +25419,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="25639">
+<interface name="corenet_dontaudit_send_dropbox_server_packets" lineno="24483">
<summary>
Do not audit attempts to send dropbox_server packets.
</summary>
@@ -25384,7 +25430,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_dropbox_server_packets" lineno="25658">
+<interface name="corenet_receive_dropbox_server_packets" lineno="24502">
<summary>
Receive dropbox_server packets.
</summary>
@@ -25395,7 +25441,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="25677">
+<interface name="corenet_dontaudit_receive_dropbox_server_packets" lineno="24521">
<summary>
Do not audit attempts to receive dropbox_server packets.
</summary>
@@ -25406,7 +25452,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_dropbox_server_packets" lineno="25696">
+<interface name="corenet_sendrecv_dropbox_server_packets" lineno="24540">
<summary>
Send and receive dropbox_server packets.
</summary>
@@ -25417,7 +25463,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="25712">
+<interface name="corenet_dontaudit_sendrecv_dropbox_server_packets" lineno="24556">
<summary>
Do not audit attempts to send and receive dropbox_server packets.
</summary>
@@ -25428,7 +25474,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_dropbox_server_packets" lineno="25727">
+<interface name="corenet_relabelto_dropbox_server_packets" lineno="24571">
<summary>
Relabel packets to dropbox_server the packet type.
</summary>
@@ -25438,7 +25484,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_efs_port" lineno="25749">
+<interface name="corenet_tcp_sendrecv_efs_port" lineno="24593">
<summary>
Send and receive TCP traffic on the efs port.
</summary>
@@ -25449,7 +25495,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_efs_port" lineno="25768">
+<interface name="corenet_udp_send_efs_port" lineno="24608">
<summary>
Send UDP traffic on the efs port.
</summary>
@@ -25460,7 +25506,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_efs_port" lineno="25787">
+<interface name="corenet_dontaudit_udp_send_efs_port" lineno="24623">
<summary>
Do not audit attempts to send UDP traffic on the efs port.
</summary>
@@ -25471,7 +25517,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_efs_port" lineno="25806">
+<interface name="corenet_udp_receive_efs_port" lineno="24638">
<summary>
Receive UDP traffic on the efs port.
</summary>
@@ -25482,7 +25528,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="25825">
+<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="24653">
<summary>
Do not audit attempts to receive UDP traffic on the efs port.
</summary>
@@ -25493,7 +25539,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_efs_port" lineno="25844">
+<interface name="corenet_udp_sendrecv_efs_port" lineno="24668">
<summary>
Send and receive UDP traffic on the efs port.
</summary>
@@ -25504,7 +25550,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="25861">
+<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="24684">
<summary>
Do not audit attempts to send and receive
UDP traffic on the efs port.
@@ -25516,7 +25562,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_efs_port" lineno="25877">
+<interface name="corenet_tcp_bind_efs_port" lineno="24699">
<summary>
Bind TCP sockets to the efs port.
</summary>
@@ -25527,7 +25573,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_efs_port" lineno="25897">
+<interface name="corenet_udp_bind_efs_port" lineno="24719">
<summary>
Bind UDP sockets to the efs port.
</summary>
@@ -25538,7 +25584,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_efs_port" lineno="25916">
+<interface name="corenet_tcp_connect_efs_port" lineno="24738">
<summary>
Make a TCP connection to the efs port.
</summary>
@@ -25548,7 +25594,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_efs_client_packets" lineno="25936">
+<interface name="corenet_send_efs_client_packets" lineno="24758">
<summary>
Send efs_client packets.
</summary>
@@ -25559,7 +25605,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_efs_client_packets" lineno="25955">
+<interface name="corenet_dontaudit_send_efs_client_packets" lineno="24777">
<summary>
Do not audit attempts to send efs_client packets.
</summary>
@@ -25570,7 +25616,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_efs_client_packets" lineno="25974">
+<interface name="corenet_receive_efs_client_packets" lineno="24796">
<summary>
Receive efs_client packets.
</summary>
@@ -25581,7 +25627,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="25993">
+<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="24815">
<summary>
Do not audit attempts to receive efs_client packets.
</summary>
@@ -25592,7 +25638,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_efs_client_packets" lineno="26012">
+<interface name="corenet_sendrecv_efs_client_packets" lineno="24834">
<summary>
Send and receive efs_client packets.
</summary>
@@ -25603,7 +25649,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="26028">
+<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="24850">
<summary>
Do not audit attempts to send and receive efs_client packets.
</summary>
@@ -25614,7 +25660,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_efs_client_packets" lineno="26043">
+<interface name="corenet_relabelto_efs_client_packets" lineno="24865">
<summary>
Relabel packets to efs_client the packet type.
</summary>
@@ -25624,7 +25670,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_efs_server_packets" lineno="26063">
+<interface name="corenet_send_efs_server_packets" lineno="24885">
<summary>
Send efs_server packets.
</summary>
@@ -25635,7 +25681,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_efs_server_packets" lineno="26082">
+<interface name="corenet_dontaudit_send_efs_server_packets" lineno="24904">
<summary>
Do not audit attempts to send efs_server packets.
</summary>
@@ -25646,7 +25692,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_efs_server_packets" lineno="26101">
+<interface name="corenet_receive_efs_server_packets" lineno="24923">
<summary>
Receive efs_server packets.
</summary>
@@ -25657,7 +25703,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="26120">
+<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="24942">
<summary>
Do not audit attempts to receive efs_server packets.
</summary>
@@ -25668,7 +25714,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_efs_server_packets" lineno="26139">
+<interface name="corenet_sendrecv_efs_server_packets" lineno="24961">
<summary>
Send and receive efs_server packets.
</summary>
@@ -25679,7 +25725,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="26155">
+<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="24977">
<summary>
Do not audit attempts to send and receive efs_server packets.
</summary>
@@ -25690,7 +25736,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_efs_server_packets" lineno="26170">
+<interface name="corenet_relabelto_efs_server_packets" lineno="24992">
<summary>
Relabel packets to efs_server the packet type.
</summary>
@@ -25700,7 +25746,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="26192">
+<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="25014">
<summary>
Send and receive TCP traffic on the embrace_dp_c port.
</summary>
@@ -25711,7 +25757,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_embrace_dp_c_port" lineno="26211">
+<interface name="corenet_udp_send_embrace_dp_c_port" lineno="25029">
<summary>
Send UDP traffic on the embrace_dp_c port.
</summary>
@@ -25722,7 +25768,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="26230">
+<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="25044">
<summary>
Do not audit attempts to send UDP traffic on the embrace_dp_c port.
</summary>
@@ -25733,7 +25779,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="26249">
+<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="25059">
<summary>
Receive UDP traffic on the embrace_dp_c port.
</summary>
@@ -25744,7 +25790,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="26268">
+<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="25074">
<summary>
Do not audit attempts to receive UDP traffic on the embrace_dp_c port.
</summary>
@@ -25755,7 +25801,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="26287">
+<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="25089">
<summary>
Send and receive UDP traffic on the embrace_dp_c port.
</summary>
@@ -25766,7 +25812,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="26304">
+<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="25105">
<summary>
Do not audit attempts to send and receive
UDP traffic on the embrace_dp_c port.
@@ -25778,7 +25824,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="26320">
+<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="25120">
<summary>
Bind TCP sockets to the embrace_dp_c port.
</summary>
@@ -25789,7 +25835,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="26340">
+<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="25140">
<summary>
Bind UDP sockets to the embrace_dp_c port.
</summary>
@@ -25800,7 +25846,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="26359">
+<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="25159">
<summary>
Make a TCP connection to the embrace_dp_c port.
</summary>
@@ -25810,7 +25856,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_embrace_dp_c_client_packets" lineno="26379">
+<interface name="corenet_send_embrace_dp_c_client_packets" lineno="25179">
<summary>
Send embrace_dp_c_client packets.
</summary>
@@ -25821,7 +25867,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="26398">
+<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="25198">
<summary>
Do not audit attempts to send embrace_dp_c_client packets.
</summary>
@@ -25832,7 +25878,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="26417">
+<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="25217">
<summary>
Receive embrace_dp_c_client packets.
</summary>
@@ -25843,7 +25889,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="26436">
+<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="25236">
<summary>
Do not audit attempts to receive embrace_dp_c_client packets.
</summary>
@@ -25854,7 +25900,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="26455">
+<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="25255">
<summary>
Send and receive embrace_dp_c_client packets.
</summary>
@@ -25865,7 +25911,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="26471">
+<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="25271">
<summary>
Do not audit attempts to send and receive embrace_dp_c_client packets.
</summary>
@@ -25876,7 +25922,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="26486">
+<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="25286">
<summary>
Relabel packets to embrace_dp_c_client the packet type.
</summary>
@@ -25886,7 +25932,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_embrace_dp_c_server_packets" lineno="26506">
+<interface name="corenet_send_embrace_dp_c_server_packets" lineno="25306">
<summary>
Send embrace_dp_c_server packets.
</summary>
@@ -25897,7 +25943,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="26525">
+<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="25325">
<summary>
Do not audit attempts to send embrace_dp_c_server packets.
</summary>
@@ -25908,7 +25954,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="26544">
+<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="25344">
<summary>
Receive embrace_dp_c_server packets.
</summary>
@@ -25919,7 +25965,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="26563">
+<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="25363">
<summary>
Do not audit attempts to receive embrace_dp_c_server packets.
</summary>
@@ -25930,7 +25976,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="26582">
+<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="25382">
<summary>
Send and receive embrace_dp_c_server packets.
</summary>
@@ -25941,7 +25987,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="26598">
+<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="25398">
<summary>
Do not audit attempts to send and receive embrace_dp_c_server packets.
</summary>
@@ -25952,7 +25998,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="26613">
+<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="25413">
<summary>
Relabel packets to embrace_dp_c_server the packet type.
</summary>
@@ -25962,7 +26008,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_epmap_port" lineno="26635">
+<interface name="corenet_tcp_sendrecv_epmap_port" lineno="25435">
<summary>
Send and receive TCP traffic on the epmap port.
</summary>
@@ -25973,7 +26019,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_epmap_port" lineno="26654">
+<interface name="corenet_udp_send_epmap_port" lineno="25450">
<summary>
Send UDP traffic on the epmap port.
</summary>
@@ -25984,7 +26030,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="26673">
+<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="25465">
<summary>
Do not audit attempts to send UDP traffic on the epmap port.
</summary>
@@ -25995,7 +26041,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_epmap_port" lineno="26692">
+<interface name="corenet_udp_receive_epmap_port" lineno="25480">
<summary>
Receive UDP traffic on the epmap port.
</summary>
@@ -26006,7 +26052,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="26711">
+<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="25495">
<summary>
Do not audit attempts to receive UDP traffic on the epmap port.
</summary>
@@ -26017,7 +26063,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_epmap_port" lineno="26730">
+<interface name="corenet_udp_sendrecv_epmap_port" lineno="25510">
<summary>
Send and receive UDP traffic on the epmap port.
</summary>
@@ -26028,7 +26074,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="26747">
+<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="25526">
<summary>
Do not audit attempts to send and receive
UDP traffic on the epmap port.
@@ -26040,7 +26086,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_epmap_port" lineno="26763">
+<interface name="corenet_tcp_bind_epmap_port" lineno="25541">
<summary>
Bind TCP sockets to the epmap port.
</summary>
@@ -26051,7 +26097,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_epmap_port" lineno="26783">
+<interface name="corenet_udp_bind_epmap_port" lineno="25561">
<summary>
Bind UDP sockets to the epmap port.
</summary>
@@ -26062,7 +26108,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_epmap_port" lineno="26802">
+<interface name="corenet_tcp_connect_epmap_port" lineno="25580">
<summary>
Make a TCP connection to the epmap port.
</summary>
@@ -26072,7 +26118,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_epmap_client_packets" lineno="26822">
+<interface name="corenet_send_epmap_client_packets" lineno="25600">
<summary>
Send epmap_client packets.
</summary>
@@ -26083,7 +26129,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="26841">
+<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="25619">
<summary>
Do not audit attempts to send epmap_client packets.
</summary>
@@ -26094,7 +26140,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_epmap_client_packets" lineno="26860">
+<interface name="corenet_receive_epmap_client_packets" lineno="25638">
<summary>
Receive epmap_client packets.
</summary>
@@ -26105,7 +26151,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="26879">
+<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="25657">
<summary>
Do not audit attempts to receive epmap_client packets.
</summary>
@@ -26116,7 +26162,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_epmap_client_packets" lineno="26898">
+<interface name="corenet_sendrecv_epmap_client_packets" lineno="25676">
<summary>
Send and receive epmap_client packets.
</summary>
@@ -26127,7 +26173,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="26914">
+<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="25692">
<summary>
Do not audit attempts to send and receive epmap_client packets.
</summary>
@@ -26138,7 +26184,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_epmap_client_packets" lineno="26929">
+<interface name="corenet_relabelto_epmap_client_packets" lineno="25707">
<summary>
Relabel packets to epmap_client the packet type.
</summary>
@@ -26148,7 +26194,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_epmap_server_packets" lineno="26949">
+<interface name="corenet_send_epmap_server_packets" lineno="25727">
<summary>
Send epmap_server packets.
</summary>
@@ -26159,7 +26205,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="26968">
+<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="25746">
<summary>
Do not audit attempts to send epmap_server packets.
</summary>
@@ -26170,7 +26216,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_epmap_server_packets" lineno="26987">
+<interface name="corenet_receive_epmap_server_packets" lineno="25765">
<summary>
Receive epmap_server packets.
</summary>
@@ -26181,7 +26227,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="27006">
+<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="25784">
<summary>
Do not audit attempts to receive epmap_server packets.
</summary>
@@ -26192,7 +26238,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_epmap_server_packets" lineno="27025">
+<interface name="corenet_sendrecv_epmap_server_packets" lineno="25803">
<summary>
Send and receive epmap_server packets.
</summary>
@@ -26203,7 +26249,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="27041">
+<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="25819">
<summary>
Do not audit attempts to send and receive epmap_server packets.
</summary>
@@ -26214,7 +26260,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_epmap_server_packets" lineno="27056">
+<interface name="corenet_relabelto_epmap_server_packets" lineno="25834">
<summary>
Relabel packets to epmap_server the packet type.
</summary>
@@ -26224,7 +26270,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_epmd_port" lineno="27078">
+<interface name="corenet_tcp_sendrecv_epmd_port" lineno="25856">
<summary>
Send and receive TCP traffic on the epmd port.
</summary>
@@ -26235,7 +26281,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_epmd_port" lineno="27097">
+<interface name="corenet_udp_send_epmd_port" lineno="25871">
<summary>
Send UDP traffic on the epmd port.
</summary>
@@ -26246,7 +26292,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="27116">
+<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="25886">
<summary>
Do not audit attempts to send UDP traffic on the epmd port.
</summary>
@@ -26257,7 +26303,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_epmd_port" lineno="27135">
+<interface name="corenet_udp_receive_epmd_port" lineno="25901">
<summary>
Receive UDP traffic on the epmd port.
</summary>
@@ -26268,7 +26314,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="27154">
+<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="25916">
<summary>
Do not audit attempts to receive UDP traffic on the epmd port.
</summary>
@@ -26279,7 +26325,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_epmd_port" lineno="27173">
+<interface name="corenet_udp_sendrecv_epmd_port" lineno="25931">
<summary>
Send and receive UDP traffic on the epmd port.
</summary>
@@ -26290,7 +26336,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="27190">
+<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="25947">
<summary>
Do not audit attempts to send and receive
UDP traffic on the epmd port.
@@ -26302,7 +26348,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_epmd_port" lineno="27206">
+<interface name="corenet_tcp_bind_epmd_port" lineno="25962">
<summary>
Bind TCP sockets to the epmd port.
</summary>
@@ -26313,7 +26359,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_epmd_port" lineno="27226">
+<interface name="corenet_udp_bind_epmd_port" lineno="25982">
<summary>
Bind UDP sockets to the epmd port.
</summary>
@@ -26324,7 +26370,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_epmd_port" lineno="27245">
+<interface name="corenet_tcp_connect_epmd_port" lineno="26001">
<summary>
Make a TCP connection to the epmd port.
</summary>
@@ -26334,7 +26380,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_epmd_client_packets" lineno="27265">
+<interface name="corenet_send_epmd_client_packets" lineno="26021">
<summary>
Send epmd_client packets.
</summary>
@@ -26345,7 +26391,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="27284">
+<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="26040">
<summary>
Do not audit attempts to send epmd_client packets.
</summary>
@@ -26356,7 +26402,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_epmd_client_packets" lineno="27303">
+<interface name="corenet_receive_epmd_client_packets" lineno="26059">
<summary>
Receive epmd_client packets.
</summary>
@@ -26367,7 +26413,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="27322">
+<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="26078">
<summary>
Do not audit attempts to receive epmd_client packets.
</summary>
@@ -26378,7 +26424,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_epmd_client_packets" lineno="27341">
+<interface name="corenet_sendrecv_epmd_client_packets" lineno="26097">
<summary>
Send and receive epmd_client packets.
</summary>
@@ -26389,7 +26435,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="27357">
+<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="26113">
<summary>
Do not audit attempts to send and receive epmd_client packets.
</summary>
@@ -26400,7 +26446,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_epmd_client_packets" lineno="27372">
+<interface name="corenet_relabelto_epmd_client_packets" lineno="26128">
<summary>
Relabel packets to epmd_client the packet type.
</summary>
@@ -26410,7 +26456,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_epmd_server_packets" lineno="27392">
+<interface name="corenet_send_epmd_server_packets" lineno="26148">
<summary>
Send epmd_server packets.
</summary>
@@ -26421,7 +26467,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="27411">
+<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="26167">
<summary>
Do not audit attempts to send epmd_server packets.
</summary>
@@ -26432,7 +26478,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_epmd_server_packets" lineno="27430">
+<interface name="corenet_receive_epmd_server_packets" lineno="26186">
<summary>
Receive epmd_server packets.
</summary>
@@ -26443,7 +26489,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="27449">
+<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="26205">
<summary>
Do not audit attempts to receive epmd_server packets.
</summary>
@@ -26454,7 +26500,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_epmd_server_packets" lineno="27468">
+<interface name="corenet_sendrecv_epmd_server_packets" lineno="26224">
<summary>
Send and receive epmd_server packets.
</summary>
@@ -26465,7 +26511,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="27484">
+<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="26240">
<summary>
Do not audit attempts to send and receive epmd_server packets.
</summary>
@@ -26476,7 +26522,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_epmd_server_packets" lineno="27499">
+<interface name="corenet_relabelto_epmd_server_packets" lineno="26255">
<summary>
Relabel packets to epmd_server the packet type.
</summary>
@@ -26486,7 +26532,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="27521">
+<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="26277">
<summary>
Send and receive TCP traffic on the fingerd port.
</summary>
@@ -26497,7 +26543,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_fingerd_port" lineno="27540">
+<interface name="corenet_udp_send_fingerd_port" lineno="26292">
<summary>
Send UDP traffic on the fingerd port.
</summary>
@@ -26508,7 +26554,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="27559">
+<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="26307">
<summary>
Do not audit attempts to send UDP traffic on the fingerd port.
</summary>
@@ -26519,7 +26565,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_fingerd_port" lineno="27578">
+<interface name="corenet_udp_receive_fingerd_port" lineno="26322">
<summary>
Receive UDP traffic on the fingerd port.
</summary>
@@ -26530,7 +26576,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="27597">
+<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="26337">
<summary>
Do not audit attempts to receive UDP traffic on the fingerd port.
</summary>
@@ -26541,7 +26587,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_fingerd_port" lineno="27616">
+<interface name="corenet_udp_sendrecv_fingerd_port" lineno="26352">
<summary>
Send and receive UDP traffic on the fingerd port.
</summary>
@@ -26552,7 +26598,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="27633">
+<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="26368">
<summary>
Do not audit attempts to send and receive
UDP traffic on the fingerd port.
@@ -26564,7 +26610,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_fingerd_port" lineno="27649">
+<interface name="corenet_tcp_bind_fingerd_port" lineno="26383">
<summary>
Bind TCP sockets to the fingerd port.
</summary>
@@ -26575,7 +26621,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_fingerd_port" lineno="27669">
+<interface name="corenet_udp_bind_fingerd_port" lineno="26403">
<summary>
Bind UDP sockets to the fingerd port.
</summary>
@@ -26586,7 +26632,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_fingerd_port" lineno="27688">
+<interface name="corenet_tcp_connect_fingerd_port" lineno="26422">
<summary>
Make a TCP connection to the fingerd port.
</summary>
@@ -26596,7 +26642,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_fingerd_client_packets" lineno="27708">
+<interface name="corenet_send_fingerd_client_packets" lineno="26442">
<summary>
Send fingerd_client packets.
</summary>
@@ -26607,7 +26653,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="27727">
+<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="26461">
<summary>
Do not audit attempts to send fingerd_client packets.
</summary>
@@ -26618,7 +26664,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_fingerd_client_packets" lineno="27746">
+<interface name="corenet_receive_fingerd_client_packets" lineno="26480">
<summary>
Receive fingerd_client packets.
</summary>
@@ -26629,7 +26675,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="27765">
+<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="26499">
<summary>
Do not audit attempts to receive fingerd_client packets.
</summary>
@@ -26640,7 +26686,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_fingerd_client_packets" lineno="27784">
+<interface name="corenet_sendrecv_fingerd_client_packets" lineno="26518">
<summary>
Send and receive fingerd_client packets.
</summary>
@@ -26651,7 +26697,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="27800">
+<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="26534">
<summary>
Do not audit attempts to send and receive fingerd_client packets.
</summary>
@@ -26662,7 +26708,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_fingerd_client_packets" lineno="27815">
+<interface name="corenet_relabelto_fingerd_client_packets" lineno="26549">
<summary>
Relabel packets to fingerd_client the packet type.
</summary>
@@ -26672,7 +26718,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_fingerd_server_packets" lineno="27835">
+<interface name="corenet_send_fingerd_server_packets" lineno="26569">
<summary>
Send fingerd_server packets.
</summary>
@@ -26683,7 +26729,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="27854">
+<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="26588">
<summary>
Do not audit attempts to send fingerd_server packets.
</summary>
@@ -26694,7 +26740,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_fingerd_server_packets" lineno="27873">
+<interface name="corenet_receive_fingerd_server_packets" lineno="26607">
<summary>
Receive fingerd_server packets.
</summary>
@@ -26705,7 +26751,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="27892">
+<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="26626">
<summary>
Do not audit attempts to receive fingerd_server packets.
</summary>
@@ -26716,7 +26762,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_fingerd_server_packets" lineno="27911">
+<interface name="corenet_sendrecv_fingerd_server_packets" lineno="26645">
<summary>
Send and receive fingerd_server packets.
</summary>
@@ -26727,7 +26773,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="27927">
+<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="26661">
<summary>
Do not audit attempts to send and receive fingerd_server packets.
</summary>
@@ -26738,7 +26784,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_fingerd_server_packets" lineno="27942">
+<interface name="corenet_relabelto_fingerd_server_packets" lineno="26676">
<summary>
Relabel packets to fingerd_server the packet type.
</summary>
@@ -26748,7 +26794,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ftp_port" lineno="27964">
+<interface name="corenet_tcp_sendrecv_ftp_port" lineno="26698">
<summary>
Send and receive TCP traffic on the ftp port.
</summary>
@@ -26759,7 +26805,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ftp_port" lineno="27983">
+<interface name="corenet_udp_send_ftp_port" lineno="26713">
<summary>
Send UDP traffic on the ftp port.
</summary>
@@ -26770,7 +26816,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="28002">
+<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="26728">
<summary>
Do not audit attempts to send UDP traffic on the ftp port.
</summary>
@@ -26781,7 +26827,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ftp_port" lineno="28021">
+<interface name="corenet_udp_receive_ftp_port" lineno="26743">
<summary>
Receive UDP traffic on the ftp port.
</summary>
@@ -26792,7 +26838,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="28040">
+<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="26758">
<summary>
Do not audit attempts to receive UDP traffic on the ftp port.
</summary>
@@ -26803,7 +26849,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ftp_port" lineno="28059">
+<interface name="corenet_udp_sendrecv_ftp_port" lineno="26773">
<summary>
Send and receive UDP traffic on the ftp port.
</summary>
@@ -26814,7 +26860,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="28076">
+<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="26789">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ftp port.
@@ -26826,7 +26872,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ftp_port" lineno="28092">
+<interface name="corenet_tcp_bind_ftp_port" lineno="26804">
<summary>
Bind TCP sockets to the ftp port.
</summary>
@@ -26837,7 +26883,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ftp_port" lineno="28112">
+<interface name="corenet_udp_bind_ftp_port" lineno="26824">
<summary>
Bind UDP sockets to the ftp port.
</summary>
@@ -26848,7 +26894,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ftp_port" lineno="28131">
+<interface name="corenet_tcp_connect_ftp_port" lineno="26843">
<summary>
Make a TCP connection to the ftp port.
</summary>
@@ -26858,7 +26904,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ftp_client_packets" lineno="28151">
+<interface name="corenet_send_ftp_client_packets" lineno="26863">
<summary>
Send ftp_client packets.
</summary>
@@ -26869,7 +26915,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="28170">
+<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="26882">
<summary>
Do not audit attempts to send ftp_client packets.
</summary>
@@ -26880,7 +26926,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ftp_client_packets" lineno="28189">
+<interface name="corenet_receive_ftp_client_packets" lineno="26901">
<summary>
Receive ftp_client packets.
</summary>
@@ -26891,7 +26937,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="28208">
+<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="26920">
<summary>
Do not audit attempts to receive ftp_client packets.
</summary>
@@ -26902,7 +26948,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ftp_client_packets" lineno="28227">
+<interface name="corenet_sendrecv_ftp_client_packets" lineno="26939">
<summary>
Send and receive ftp_client packets.
</summary>
@@ -26913,7 +26959,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="28243">
+<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="26955">
<summary>
Do not audit attempts to send and receive ftp_client packets.
</summary>
@@ -26924,7 +26970,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ftp_client_packets" lineno="28258">
+<interface name="corenet_relabelto_ftp_client_packets" lineno="26970">
<summary>
Relabel packets to ftp_client the packet type.
</summary>
@@ -26934,7 +26980,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ftp_server_packets" lineno="28278">
+<interface name="corenet_send_ftp_server_packets" lineno="26990">
<summary>
Send ftp_server packets.
</summary>
@@ -26945,7 +26991,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="28297">
+<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="27009">
<summary>
Do not audit attempts to send ftp_server packets.
</summary>
@@ -26956,7 +27002,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ftp_server_packets" lineno="28316">
+<interface name="corenet_receive_ftp_server_packets" lineno="27028">
<summary>
Receive ftp_server packets.
</summary>
@@ -26967,7 +27013,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="28335">
+<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="27047">
<summary>
Do not audit attempts to receive ftp_server packets.
</summary>
@@ -26978,7 +27024,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ftp_server_packets" lineno="28354">
+<interface name="corenet_sendrecv_ftp_server_packets" lineno="27066">
<summary>
Send and receive ftp_server packets.
</summary>
@@ -26989,7 +27035,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="28370">
+<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="27082">
<summary>
Do not audit attempts to send and receive ftp_server packets.
</summary>
@@ -27000,7 +27046,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ftp_server_packets" lineno="28385">
+<interface name="corenet_relabelto_ftp_server_packets" lineno="27097">
<summary>
Relabel packets to ftp_server the packet type.
</summary>
@@ -27010,7 +27056,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="28407">
+<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="27119">
<summary>
Send and receive TCP traffic on the ftp_data port.
</summary>
@@ -27021,7 +27067,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ftp_data_port" lineno="28426">
+<interface name="corenet_udp_send_ftp_data_port" lineno="27134">
<summary>
Send UDP traffic on the ftp_data port.
</summary>
@@ -27032,7 +27078,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="28445">
+<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="27149">
<summary>
Do not audit attempts to send UDP traffic on the ftp_data port.
</summary>
@@ -27043,7 +27089,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ftp_data_port" lineno="28464">
+<interface name="corenet_udp_receive_ftp_data_port" lineno="27164">
<summary>
Receive UDP traffic on the ftp_data port.
</summary>
@@ -27054,7 +27100,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="28483">
+<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="27179">
<summary>
Do not audit attempts to receive UDP traffic on the ftp_data port.
</summary>
@@ -27065,7 +27111,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="28502">
+<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="27194">
<summary>
Send and receive UDP traffic on the ftp_data port.
</summary>
@@ -27076,7 +27122,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="28519">
+<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="27210">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ftp_data port.
@@ -27088,7 +27134,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ftp_data_port" lineno="28535">
+<interface name="corenet_tcp_bind_ftp_data_port" lineno="27225">
<summary>
Bind TCP sockets to the ftp_data port.
</summary>
@@ -27099,7 +27145,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ftp_data_port" lineno="28555">
+<interface name="corenet_udp_bind_ftp_data_port" lineno="27245">
<summary>
Bind UDP sockets to the ftp_data port.
</summary>
@@ -27110,7 +27156,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ftp_data_port" lineno="28574">
+<interface name="corenet_tcp_connect_ftp_data_port" lineno="27264">
<summary>
Make a TCP connection to the ftp_data port.
</summary>
@@ -27120,7 +27166,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ftp_data_client_packets" lineno="28594">
+<interface name="corenet_send_ftp_data_client_packets" lineno="27284">
<summary>
Send ftp_data_client packets.
</summary>
@@ -27131,7 +27177,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="28613">
+<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="27303">
<summary>
Do not audit attempts to send ftp_data_client packets.
</summary>
@@ -27142,7 +27188,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ftp_data_client_packets" lineno="28632">
+<interface name="corenet_receive_ftp_data_client_packets" lineno="27322">
<summary>
Receive ftp_data_client packets.
</summary>
@@ -27153,7 +27199,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="28651">
+<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="27341">
<summary>
Do not audit attempts to receive ftp_data_client packets.
</summary>
@@ -27164,7 +27210,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="28670">
+<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="27360">
<summary>
Send and receive ftp_data_client packets.
</summary>
@@ -27175,7 +27221,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="28686">
+<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="27376">
<summary>
Do not audit attempts to send and receive ftp_data_client packets.
</summary>
@@ -27186,7 +27232,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ftp_data_client_packets" lineno="28701">
+<interface name="corenet_relabelto_ftp_data_client_packets" lineno="27391">
<summary>
Relabel packets to ftp_data_client the packet type.
</summary>
@@ -27196,7 +27242,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ftp_data_server_packets" lineno="28721">
+<interface name="corenet_send_ftp_data_server_packets" lineno="27411">
<summary>
Send ftp_data_server packets.
</summary>
@@ -27207,7 +27253,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="28740">
+<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="27430">
<summary>
Do not audit attempts to send ftp_data_server packets.
</summary>
@@ -27218,7 +27264,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ftp_data_server_packets" lineno="28759">
+<interface name="corenet_receive_ftp_data_server_packets" lineno="27449">
<summary>
Receive ftp_data_server packets.
</summary>
@@ -27229,7 +27275,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="28778">
+<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="27468">
<summary>
Do not audit attempts to receive ftp_data_server packets.
</summary>
@@ -27240,7 +27286,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="28797">
+<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="27487">
<summary>
Send and receive ftp_data_server packets.
</summary>
@@ -27251,7 +27297,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="28813">
+<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="27503">
<summary>
Do not audit attempts to send and receive ftp_data_server packets.
</summary>
@@ -27262,7 +27308,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ftp_data_server_packets" lineno="28828">
+<interface name="corenet_relabelto_ftp_data_server_packets" lineno="27518">
<summary>
Relabel packets to ftp_data_server the packet type.
</summary>
@@ -27272,7 +27318,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="28850">
+<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="27540">
<summary>
Send and receive TCP traffic on the gatekeeper port.
</summary>
@@ -27283,7 +27329,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_gatekeeper_port" lineno="28869">
+<interface name="corenet_udp_send_gatekeeper_port" lineno="27555">
<summary>
Send UDP traffic on the gatekeeper port.
</summary>
@@ -27294,7 +27340,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="28888">
+<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="27570">
<summary>
Do not audit attempts to send UDP traffic on the gatekeeper port.
</summary>
@@ -27305,7 +27351,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_gatekeeper_port" lineno="28907">
+<interface name="corenet_udp_receive_gatekeeper_port" lineno="27585">
<summary>
Receive UDP traffic on the gatekeeper port.
</summary>
@@ -27316,7 +27362,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="28926">
+<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="27600">
<summary>
Do not audit attempts to receive UDP traffic on the gatekeeper port.
</summary>
@@ -27327,7 +27373,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="28945">
+<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="27615">
<summary>
Send and receive UDP traffic on the gatekeeper port.
</summary>
@@ -27338,7 +27384,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="28962">
+<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="27631">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gatekeeper port.
@@ -27350,7 +27396,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_gatekeeper_port" lineno="28978">
+<interface name="corenet_tcp_bind_gatekeeper_port" lineno="27646">
<summary>
Bind TCP sockets to the gatekeeper port.
</summary>
@@ -27361,7 +27407,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_gatekeeper_port" lineno="28998">
+<interface name="corenet_udp_bind_gatekeeper_port" lineno="27666">
<summary>
Bind UDP sockets to the gatekeeper port.
</summary>
@@ -27372,7 +27418,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_gatekeeper_port" lineno="29017">
+<interface name="corenet_tcp_connect_gatekeeper_port" lineno="27685">
<summary>
Make a TCP connection to the gatekeeper port.
</summary>
@@ -27382,7 +27428,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gatekeeper_client_packets" lineno="29037">
+<interface name="corenet_send_gatekeeper_client_packets" lineno="27705">
<summary>
Send gatekeeper_client packets.
</summary>
@@ -27393,7 +27439,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="29056">
+<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="27724">
<summary>
Do not audit attempts to send gatekeeper_client packets.
</summary>
@@ -27404,7 +27450,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gatekeeper_client_packets" lineno="29075">
+<interface name="corenet_receive_gatekeeper_client_packets" lineno="27743">
<summary>
Receive gatekeeper_client packets.
</summary>
@@ -27415,7 +27461,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="29094">
+<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="27762">
<summary>
Do not audit attempts to receive gatekeeper_client packets.
</summary>
@@ -27426,7 +27472,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="29113">
+<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="27781">
<summary>
Send and receive gatekeeper_client packets.
</summary>
@@ -27437,7 +27483,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="29129">
+<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="27797">
<summary>
Do not audit attempts to send and receive gatekeeper_client packets.
</summary>
@@ -27448,7 +27494,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="29144">
+<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="27812">
<summary>
Relabel packets to gatekeeper_client the packet type.
</summary>
@@ -27458,7 +27504,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gatekeeper_server_packets" lineno="29164">
+<interface name="corenet_send_gatekeeper_server_packets" lineno="27832">
<summary>
Send gatekeeper_server packets.
</summary>
@@ -27469,7 +27515,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="29183">
+<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="27851">
<summary>
Do not audit attempts to send gatekeeper_server packets.
</summary>
@@ -27480,7 +27526,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gatekeeper_server_packets" lineno="29202">
+<interface name="corenet_receive_gatekeeper_server_packets" lineno="27870">
<summary>
Receive gatekeeper_server packets.
</summary>
@@ -27491,7 +27537,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="29221">
+<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="27889">
<summary>
Do not audit attempts to receive gatekeeper_server packets.
</summary>
@@ -27502,7 +27548,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="29240">
+<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="27908">
<summary>
Send and receive gatekeeper_server packets.
</summary>
@@ -27513,7 +27559,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="29256">
+<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="27924">
<summary>
Do not audit attempts to send and receive gatekeeper_server packets.
</summary>
@@ -27524,7 +27570,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="29271">
+<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="27939">
<summary>
Relabel packets to gatekeeper_server the packet type.
</summary>
@@ -27534,7 +27580,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="29293">
+<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="27961">
<summary>
Send and receive TCP traffic on the gdomap port.
</summary>
@@ -27545,7 +27591,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_gdomap_port" lineno="29312">
+<interface name="corenet_udp_send_gdomap_port" lineno="27976">
<summary>
Send UDP traffic on the gdomap port.
</summary>
@@ -27556,7 +27602,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="29331">
+<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="27991">
<summary>
Do not audit attempts to send UDP traffic on the gdomap port.
</summary>
@@ -27567,7 +27613,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_gdomap_port" lineno="29350">
+<interface name="corenet_udp_receive_gdomap_port" lineno="28006">
<summary>
Receive UDP traffic on the gdomap port.
</summary>
@@ -27578,7 +27624,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="29369">
+<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="28021">
<summary>
Do not audit attempts to receive UDP traffic on the gdomap port.
</summary>
@@ -27589,7 +27635,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_gdomap_port" lineno="29388">
+<interface name="corenet_udp_sendrecv_gdomap_port" lineno="28036">
<summary>
Send and receive UDP traffic on the gdomap port.
</summary>
@@ -27600,7 +27646,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="29405">
+<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="28052">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gdomap port.
@@ -27612,7 +27658,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_gdomap_port" lineno="29421">
+<interface name="corenet_tcp_bind_gdomap_port" lineno="28067">
<summary>
Bind TCP sockets to the gdomap port.
</summary>
@@ -27623,7 +27669,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_gdomap_port" lineno="29441">
+<interface name="corenet_udp_bind_gdomap_port" lineno="28087">
<summary>
Bind UDP sockets to the gdomap port.
</summary>
@@ -27634,7 +27680,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_gdomap_port" lineno="29460">
+<interface name="corenet_tcp_connect_gdomap_port" lineno="28106">
<summary>
Make a TCP connection to the gdomap port.
</summary>
@@ -27644,7 +27690,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gdomap_client_packets" lineno="29480">
+<interface name="corenet_send_gdomap_client_packets" lineno="28126">
<summary>
Send gdomap_client packets.
</summary>
@@ -27655,7 +27701,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="29499">
+<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="28145">
<summary>
Do not audit attempts to send gdomap_client packets.
</summary>
@@ -27666,7 +27712,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gdomap_client_packets" lineno="29518">
+<interface name="corenet_receive_gdomap_client_packets" lineno="28164">
<summary>
Receive gdomap_client packets.
</summary>
@@ -27677,7 +27723,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="29537">
+<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="28183">
<summary>
Do not audit attempts to receive gdomap_client packets.
</summary>
@@ -27688,7 +27734,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gdomap_client_packets" lineno="29556">
+<interface name="corenet_sendrecv_gdomap_client_packets" lineno="28202">
<summary>
Send and receive gdomap_client packets.
</summary>
@@ -27699,7 +27745,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="29572">
+<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="28218">
<summary>
Do not audit attempts to send and receive gdomap_client packets.
</summary>
@@ -27710,7 +27756,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gdomap_client_packets" lineno="29587">
+<interface name="corenet_relabelto_gdomap_client_packets" lineno="28233">
<summary>
Relabel packets to gdomap_client the packet type.
</summary>
@@ -27720,7 +27766,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gdomap_server_packets" lineno="29607">
+<interface name="corenet_send_gdomap_server_packets" lineno="28253">
<summary>
Send gdomap_server packets.
</summary>
@@ -27731,7 +27777,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="29626">
+<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="28272">
<summary>
Do not audit attempts to send gdomap_server packets.
</summary>
@@ -27742,7 +27788,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gdomap_server_packets" lineno="29645">
+<interface name="corenet_receive_gdomap_server_packets" lineno="28291">
<summary>
Receive gdomap_server packets.
</summary>
@@ -27753,7 +27799,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="29664">
+<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="28310">
<summary>
Do not audit attempts to receive gdomap_server packets.
</summary>
@@ -27764,7 +27810,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gdomap_server_packets" lineno="29683">
+<interface name="corenet_sendrecv_gdomap_server_packets" lineno="28329">
<summary>
Send and receive gdomap_server packets.
</summary>
@@ -27775,7 +27821,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="29699">
+<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="28345">
<summary>
Do not audit attempts to send and receive gdomap_server packets.
</summary>
@@ -27786,7 +27832,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gdomap_server_packets" lineno="29714">
+<interface name="corenet_relabelto_gdomap_server_packets" lineno="28360">
<summary>
Relabel packets to gdomap_server the packet type.
</summary>
@@ -27796,7 +27842,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="29736">
+<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="28382">
<summary>
Send and receive TCP traffic on the gds_db port.
</summary>
@@ -27807,7 +27853,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_gds_db_port" lineno="29755">
+<interface name="corenet_udp_send_gds_db_port" lineno="28397">
<summary>
Send UDP traffic on the gds_db port.
</summary>
@@ -27818,7 +27864,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="29774">
+<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="28412">
<summary>
Do not audit attempts to send UDP traffic on the gds_db port.
</summary>
@@ -27829,7 +27875,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_gds_db_port" lineno="29793">
+<interface name="corenet_udp_receive_gds_db_port" lineno="28427">
<summary>
Receive UDP traffic on the gds_db port.
</summary>
@@ -27840,7 +27886,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="29812">
+<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="28442">
<summary>
Do not audit attempts to receive UDP traffic on the gds_db port.
</summary>
@@ -27851,7 +27897,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_gds_db_port" lineno="29831">
+<interface name="corenet_udp_sendrecv_gds_db_port" lineno="28457">
<summary>
Send and receive UDP traffic on the gds_db port.
</summary>
@@ -27862,7 +27908,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="29848">
+<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="28473">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gds_db port.
@@ -27874,7 +27920,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_gds_db_port" lineno="29864">
+<interface name="corenet_tcp_bind_gds_db_port" lineno="28488">
<summary>
Bind TCP sockets to the gds_db port.
</summary>
@@ -27885,7 +27931,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_gds_db_port" lineno="29884">
+<interface name="corenet_udp_bind_gds_db_port" lineno="28508">
<summary>
Bind UDP sockets to the gds_db port.
</summary>
@@ -27896,7 +27942,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_gds_db_port" lineno="29903">
+<interface name="corenet_tcp_connect_gds_db_port" lineno="28527">
<summary>
Make a TCP connection to the gds_db port.
</summary>
@@ -27906,7 +27952,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gds_db_client_packets" lineno="29923">
+<interface name="corenet_send_gds_db_client_packets" lineno="28547">
<summary>
Send gds_db_client packets.
</summary>
@@ -27917,7 +27963,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="29942">
+<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="28566">
<summary>
Do not audit attempts to send gds_db_client packets.
</summary>
@@ -27928,7 +27974,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gds_db_client_packets" lineno="29961">
+<interface name="corenet_receive_gds_db_client_packets" lineno="28585">
<summary>
Receive gds_db_client packets.
</summary>
@@ -27939,7 +27985,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="29980">
+<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="28604">
<summary>
Do not audit attempts to receive gds_db_client packets.
</summary>
@@ -27950,7 +27996,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gds_db_client_packets" lineno="29999">
+<interface name="corenet_sendrecv_gds_db_client_packets" lineno="28623">
<summary>
Send and receive gds_db_client packets.
</summary>
@@ -27961,7 +28007,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="30015">
+<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="28639">
<summary>
Do not audit attempts to send and receive gds_db_client packets.
</summary>
@@ -27972,7 +28018,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gds_db_client_packets" lineno="30030">
+<interface name="corenet_relabelto_gds_db_client_packets" lineno="28654">
<summary>
Relabel packets to gds_db_client the packet type.
</summary>
@@ -27982,7 +28028,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gds_db_server_packets" lineno="30050">
+<interface name="corenet_send_gds_db_server_packets" lineno="28674">
<summary>
Send gds_db_server packets.
</summary>
@@ -27993,7 +28039,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="30069">
+<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="28693">
<summary>
Do not audit attempts to send gds_db_server packets.
</summary>
@@ -28004,7 +28050,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gds_db_server_packets" lineno="30088">
+<interface name="corenet_receive_gds_db_server_packets" lineno="28712">
<summary>
Receive gds_db_server packets.
</summary>
@@ -28015,7 +28061,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="30107">
+<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="28731">
<summary>
Do not audit attempts to receive gds_db_server packets.
</summary>
@@ -28026,7 +28072,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gds_db_server_packets" lineno="30126">
+<interface name="corenet_sendrecv_gds_db_server_packets" lineno="28750">
<summary>
Send and receive gds_db_server packets.
</summary>
@@ -28037,7 +28083,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="30142">
+<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="28766">
<summary>
Do not audit attempts to send and receive gds_db_server packets.
</summary>
@@ -28048,7 +28094,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gds_db_server_packets" lineno="30157">
+<interface name="corenet_relabelto_gds_db_server_packets" lineno="28781">
<summary>
Relabel packets to gds_db_server the packet type.
</summary>
@@ -28058,7 +28104,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_giftd_port" lineno="30179">
+<interface name="corenet_tcp_sendrecv_giftd_port" lineno="28803">
<summary>
Send and receive TCP traffic on the giftd port.
</summary>
@@ -28069,7 +28115,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_giftd_port" lineno="30198">
+<interface name="corenet_udp_send_giftd_port" lineno="28818">
<summary>
Send UDP traffic on the giftd port.
</summary>
@@ -28080,7 +28126,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_giftd_port" lineno="30217">
+<interface name="corenet_dontaudit_udp_send_giftd_port" lineno="28833">
<summary>
Do not audit attempts to send UDP traffic on the giftd port.
</summary>
@@ -28091,7 +28137,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_giftd_port" lineno="30236">
+<interface name="corenet_udp_receive_giftd_port" lineno="28848">
<summary>
Receive UDP traffic on the giftd port.
</summary>
@@ -28102,7 +28148,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_giftd_port" lineno="30255">
+<interface name="corenet_dontaudit_udp_receive_giftd_port" lineno="28863">
<summary>
Do not audit attempts to receive UDP traffic on the giftd port.
</summary>
@@ -28113,7 +28159,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_giftd_port" lineno="30274">
+<interface name="corenet_udp_sendrecv_giftd_port" lineno="28878">
<summary>
Send and receive UDP traffic on the giftd port.
</summary>
@@ -28124,7 +28170,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_giftd_port" lineno="30291">
+<interface name="corenet_dontaudit_udp_sendrecv_giftd_port" lineno="28894">
<summary>
Do not audit attempts to send and receive
UDP traffic on the giftd port.
@@ -28136,7 +28182,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_giftd_port" lineno="30307">
+<interface name="corenet_tcp_bind_giftd_port" lineno="28909">
<summary>
Bind TCP sockets to the giftd port.
</summary>
@@ -28147,7 +28193,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_giftd_port" lineno="30327">
+<interface name="corenet_udp_bind_giftd_port" lineno="28929">
<summary>
Bind UDP sockets to the giftd port.
</summary>
@@ -28158,7 +28204,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_giftd_port" lineno="30346">
+<interface name="corenet_tcp_connect_giftd_port" lineno="28948">
<summary>
Make a TCP connection to the giftd port.
</summary>
@@ -28168,7 +28214,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_giftd_client_packets" lineno="30366">
+<interface name="corenet_send_giftd_client_packets" lineno="28968">
<summary>
Send giftd_client packets.
</summary>
@@ -28179,7 +28225,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_giftd_client_packets" lineno="30385">
+<interface name="corenet_dontaudit_send_giftd_client_packets" lineno="28987">
<summary>
Do not audit attempts to send giftd_client packets.
</summary>
@@ -28190,7 +28236,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_giftd_client_packets" lineno="30404">
+<interface name="corenet_receive_giftd_client_packets" lineno="29006">
<summary>
Receive giftd_client packets.
</summary>
@@ -28201,7 +28247,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_giftd_client_packets" lineno="30423">
+<interface name="corenet_dontaudit_receive_giftd_client_packets" lineno="29025">
<summary>
Do not audit attempts to receive giftd_client packets.
</summary>
@@ -28212,7 +28258,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_giftd_client_packets" lineno="30442">
+<interface name="corenet_sendrecv_giftd_client_packets" lineno="29044">
<summary>
Send and receive giftd_client packets.
</summary>
@@ -28223,7 +28269,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_giftd_client_packets" lineno="30458">
+<interface name="corenet_dontaudit_sendrecv_giftd_client_packets" lineno="29060">
<summary>
Do not audit attempts to send and receive giftd_client packets.
</summary>
@@ -28234,7 +28280,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_giftd_client_packets" lineno="30473">
+<interface name="corenet_relabelto_giftd_client_packets" lineno="29075">
<summary>
Relabel packets to giftd_client the packet type.
</summary>
@@ -28244,7 +28290,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_giftd_server_packets" lineno="30493">
+<interface name="corenet_send_giftd_server_packets" lineno="29095">
<summary>
Send giftd_server packets.
</summary>
@@ -28255,7 +28301,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_giftd_server_packets" lineno="30512">
+<interface name="corenet_dontaudit_send_giftd_server_packets" lineno="29114">
<summary>
Do not audit attempts to send giftd_server packets.
</summary>
@@ -28266,7 +28312,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_giftd_server_packets" lineno="30531">
+<interface name="corenet_receive_giftd_server_packets" lineno="29133">
<summary>
Receive giftd_server packets.
</summary>
@@ -28277,7 +28323,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_giftd_server_packets" lineno="30550">
+<interface name="corenet_dontaudit_receive_giftd_server_packets" lineno="29152">
<summary>
Do not audit attempts to receive giftd_server packets.
</summary>
@@ -28288,7 +28334,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_giftd_server_packets" lineno="30569">
+<interface name="corenet_sendrecv_giftd_server_packets" lineno="29171">
<summary>
Send and receive giftd_server packets.
</summary>
@@ -28299,7 +28345,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_giftd_server_packets" lineno="30585">
+<interface name="corenet_dontaudit_sendrecv_giftd_server_packets" lineno="29187">
<summary>
Do not audit attempts to send and receive giftd_server packets.
</summary>
@@ -28310,7 +28356,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_giftd_server_packets" lineno="30600">
+<interface name="corenet_relabelto_giftd_server_packets" lineno="29202">
<summary>
Relabel packets to giftd_server the packet type.
</summary>
@@ -28320,7 +28366,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_git_port" lineno="30622">
+<interface name="corenet_tcp_sendrecv_git_port" lineno="29224">
<summary>
Send and receive TCP traffic on the git port.
</summary>
@@ -28331,7 +28377,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_git_port" lineno="30641">
+<interface name="corenet_udp_send_git_port" lineno="29239">
<summary>
Send UDP traffic on the git port.
</summary>
@@ -28342,7 +28388,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_git_port" lineno="30660">
+<interface name="corenet_dontaudit_udp_send_git_port" lineno="29254">
<summary>
Do not audit attempts to send UDP traffic on the git port.
</summary>
@@ -28353,7 +28399,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_git_port" lineno="30679">
+<interface name="corenet_udp_receive_git_port" lineno="29269">
<summary>
Receive UDP traffic on the git port.
</summary>
@@ -28364,7 +28410,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_git_port" lineno="30698">
+<interface name="corenet_dontaudit_udp_receive_git_port" lineno="29284">
<summary>
Do not audit attempts to receive UDP traffic on the git port.
</summary>
@@ -28375,7 +28421,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_git_port" lineno="30717">
+<interface name="corenet_udp_sendrecv_git_port" lineno="29299">
<summary>
Send and receive UDP traffic on the git port.
</summary>
@@ -28386,7 +28432,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="30734">
+<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="29315">
<summary>
Do not audit attempts to send and receive
UDP traffic on the git port.
@@ -28398,7 +28444,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_git_port" lineno="30750">
+<interface name="corenet_tcp_bind_git_port" lineno="29330">
<summary>
Bind TCP sockets to the git port.
</summary>
@@ -28409,7 +28455,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_git_port" lineno="30770">
+<interface name="corenet_udp_bind_git_port" lineno="29350">
<summary>
Bind UDP sockets to the git port.
</summary>
@@ -28420,7 +28466,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_git_port" lineno="30789">
+<interface name="corenet_tcp_connect_git_port" lineno="29369">
<summary>
Make a TCP connection to the git port.
</summary>
@@ -28430,7 +28476,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_git_client_packets" lineno="30809">
+<interface name="corenet_send_git_client_packets" lineno="29389">
<summary>
Send git_client packets.
</summary>
@@ -28441,7 +28487,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_git_client_packets" lineno="30828">
+<interface name="corenet_dontaudit_send_git_client_packets" lineno="29408">
<summary>
Do not audit attempts to send git_client packets.
</summary>
@@ -28452,7 +28498,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_git_client_packets" lineno="30847">
+<interface name="corenet_receive_git_client_packets" lineno="29427">
<summary>
Receive git_client packets.
</summary>
@@ -28463,7 +28509,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_git_client_packets" lineno="30866">
+<interface name="corenet_dontaudit_receive_git_client_packets" lineno="29446">
<summary>
Do not audit attempts to receive git_client packets.
</summary>
@@ -28474,7 +28520,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_git_client_packets" lineno="30885">
+<interface name="corenet_sendrecv_git_client_packets" lineno="29465">
<summary>
Send and receive git_client packets.
</summary>
@@ -28485,7 +28531,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="30901">
+<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="29481">
<summary>
Do not audit attempts to send and receive git_client packets.
</summary>
@@ -28496,7 +28542,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_git_client_packets" lineno="30916">
+<interface name="corenet_relabelto_git_client_packets" lineno="29496">
<summary>
Relabel packets to git_client the packet type.
</summary>
@@ -28506,7 +28552,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_git_server_packets" lineno="30936">
+<interface name="corenet_send_git_server_packets" lineno="29516">
<summary>
Send git_server packets.
</summary>
@@ -28517,7 +28563,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_git_server_packets" lineno="30955">
+<interface name="corenet_dontaudit_send_git_server_packets" lineno="29535">
<summary>
Do not audit attempts to send git_server packets.
</summary>
@@ -28528,7 +28574,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_git_server_packets" lineno="30974">
+<interface name="corenet_receive_git_server_packets" lineno="29554">
<summary>
Receive git_server packets.
</summary>
@@ -28539,7 +28585,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_git_server_packets" lineno="30993">
+<interface name="corenet_dontaudit_receive_git_server_packets" lineno="29573">
<summary>
Do not audit attempts to receive git_server packets.
</summary>
@@ -28550,7 +28596,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_git_server_packets" lineno="31012">
+<interface name="corenet_sendrecv_git_server_packets" lineno="29592">
<summary>
Send and receive git_server packets.
</summary>
@@ -28561,7 +28607,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="31028">
+<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="29608">
<summary>
Do not audit attempts to send and receive git_server packets.
</summary>
@@ -28572,7 +28618,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_git_server_packets" lineno="31043">
+<interface name="corenet_relabelto_git_server_packets" lineno="29623">
<summary>
Relabel packets to git_server the packet type.
</summary>
@@ -28582,7 +28628,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="31065">
+<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="29645">
<summary>
Send and receive TCP traffic on the glance_registry port.
</summary>
@@ -28593,7 +28639,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_glance_registry_port" lineno="31084">
+<interface name="corenet_udp_send_glance_registry_port" lineno="29660">
<summary>
Send UDP traffic on the glance_registry port.
</summary>
@@ -28604,7 +28650,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="31103">
+<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="29675">
<summary>
Do not audit attempts to send UDP traffic on the glance_registry port.
</summary>
@@ -28615,7 +28661,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_glance_registry_port" lineno="31122">
+<interface name="corenet_udp_receive_glance_registry_port" lineno="29690">
<summary>
Receive UDP traffic on the glance_registry port.
</summary>
@@ -28626,7 +28672,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="31141">
+<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="29705">
<summary>
Do not audit attempts to receive UDP traffic on the glance_registry port.
</summary>
@@ -28637,7 +28683,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="31160">
+<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="29720">
<summary>
Send and receive UDP traffic on the glance_registry port.
</summary>
@@ -28648,7 +28694,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="31177">
+<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="29736">
<summary>
Do not audit attempts to send and receive
UDP traffic on the glance_registry port.
@@ -28660,7 +28706,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_glance_registry_port" lineno="31193">
+<interface name="corenet_tcp_bind_glance_registry_port" lineno="29751">
<summary>
Bind TCP sockets to the glance_registry port.
</summary>
@@ -28671,7 +28717,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_glance_registry_port" lineno="31213">
+<interface name="corenet_udp_bind_glance_registry_port" lineno="29771">
<summary>
Bind UDP sockets to the glance_registry port.
</summary>
@@ -28682,7 +28728,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_glance_registry_port" lineno="31232">
+<interface name="corenet_tcp_connect_glance_registry_port" lineno="29790">
<summary>
Make a TCP connection to the glance_registry port.
</summary>
@@ -28692,7 +28738,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_glance_registry_client_packets" lineno="31252">
+<interface name="corenet_send_glance_registry_client_packets" lineno="29810">
<summary>
Send glance_registry_client packets.
</summary>
@@ -28703,7 +28749,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="31271">
+<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="29829">
<summary>
Do not audit attempts to send glance_registry_client packets.
</summary>
@@ -28714,7 +28760,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_glance_registry_client_packets" lineno="31290">
+<interface name="corenet_receive_glance_registry_client_packets" lineno="29848">
<summary>
Receive glance_registry_client packets.
</summary>
@@ -28725,7 +28771,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="31309">
+<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="29867">
<summary>
Do not audit attempts to receive glance_registry_client packets.
</summary>
@@ -28736,7 +28782,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="31328">
+<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="29886">
<summary>
Send and receive glance_registry_client packets.
</summary>
@@ -28747,7 +28793,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="31344">
+<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="29902">
<summary>
Do not audit attempts to send and receive glance_registry_client packets.
</summary>
@@ -28758,7 +28804,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_glance_registry_client_packets" lineno="31359">
+<interface name="corenet_relabelto_glance_registry_client_packets" lineno="29917">
<summary>
Relabel packets to glance_registry_client the packet type.
</summary>
@@ -28768,7 +28814,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_glance_registry_server_packets" lineno="31379">
+<interface name="corenet_send_glance_registry_server_packets" lineno="29937">
<summary>
Send glance_registry_server packets.
</summary>
@@ -28779,7 +28825,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="31398">
+<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="29956">
<summary>
Do not audit attempts to send glance_registry_server packets.
</summary>
@@ -28790,7 +28836,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_glance_registry_server_packets" lineno="31417">
+<interface name="corenet_receive_glance_registry_server_packets" lineno="29975">
<summary>
Receive glance_registry_server packets.
</summary>
@@ -28801,7 +28847,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="31436">
+<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="29994">
<summary>
Do not audit attempts to receive glance_registry_server packets.
</summary>
@@ -28812,7 +28858,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="31455">
+<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="30013">
<summary>
Send and receive glance_registry_server packets.
</summary>
@@ -28823,7 +28869,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="31471">
+<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="30029">
<summary>
Do not audit attempts to send and receive glance_registry_server packets.
</summary>
@@ -28834,7 +28880,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_glance_registry_server_packets" lineno="31486">
+<interface name="corenet_relabelto_glance_registry_server_packets" lineno="30044">
<summary>
Relabel packets to glance_registry_server the packet type.
</summary>
@@ -28844,7 +28890,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_gopher_port" lineno="31508">
+<interface name="corenet_tcp_sendrecv_gopher_port" lineno="30066">
<summary>
Send and receive TCP traffic on the gopher port.
</summary>
@@ -28855,7 +28901,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_gopher_port" lineno="31527">
+<interface name="corenet_udp_send_gopher_port" lineno="30081">
<summary>
Send UDP traffic on the gopher port.
</summary>
@@ -28866,7 +28912,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="31546">
+<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="30096">
<summary>
Do not audit attempts to send UDP traffic on the gopher port.
</summary>
@@ -28877,7 +28923,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_gopher_port" lineno="31565">
+<interface name="corenet_udp_receive_gopher_port" lineno="30111">
<summary>
Receive UDP traffic on the gopher port.
</summary>
@@ -28888,7 +28934,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="31584">
+<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="30126">
<summary>
Do not audit attempts to receive UDP traffic on the gopher port.
</summary>
@@ -28899,7 +28945,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_gopher_port" lineno="31603">
+<interface name="corenet_udp_sendrecv_gopher_port" lineno="30141">
<summary>
Send and receive UDP traffic on the gopher port.
</summary>
@@ -28910,7 +28956,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="31620">
+<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="30157">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gopher port.
@@ -28922,7 +28968,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_gopher_port" lineno="31636">
+<interface name="corenet_tcp_bind_gopher_port" lineno="30172">
<summary>
Bind TCP sockets to the gopher port.
</summary>
@@ -28933,7 +28979,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_gopher_port" lineno="31656">
+<interface name="corenet_udp_bind_gopher_port" lineno="30192">
<summary>
Bind UDP sockets to the gopher port.
</summary>
@@ -28944,7 +28990,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_gopher_port" lineno="31675">
+<interface name="corenet_tcp_connect_gopher_port" lineno="30211">
<summary>
Make a TCP connection to the gopher port.
</summary>
@@ -28954,7 +29000,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gopher_client_packets" lineno="31695">
+<interface name="corenet_send_gopher_client_packets" lineno="30231">
<summary>
Send gopher_client packets.
</summary>
@@ -28965,7 +29011,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="31714">
+<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="30250">
<summary>
Do not audit attempts to send gopher_client packets.
</summary>
@@ -28976,7 +29022,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gopher_client_packets" lineno="31733">
+<interface name="corenet_receive_gopher_client_packets" lineno="30269">
<summary>
Receive gopher_client packets.
</summary>
@@ -28987,7 +29033,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="31752">
+<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="30288">
<summary>
Do not audit attempts to receive gopher_client packets.
</summary>
@@ -28998,7 +29044,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gopher_client_packets" lineno="31771">
+<interface name="corenet_sendrecv_gopher_client_packets" lineno="30307">
<summary>
Send and receive gopher_client packets.
</summary>
@@ -29009,7 +29055,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="31787">
+<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="30323">
<summary>
Do not audit attempts to send and receive gopher_client packets.
</summary>
@@ -29020,7 +29066,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gopher_client_packets" lineno="31802">
+<interface name="corenet_relabelto_gopher_client_packets" lineno="30338">
<summary>
Relabel packets to gopher_client the packet type.
</summary>
@@ -29030,7 +29076,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gopher_server_packets" lineno="31822">
+<interface name="corenet_send_gopher_server_packets" lineno="30358">
<summary>
Send gopher_server packets.
</summary>
@@ -29041,7 +29087,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="31841">
+<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="30377">
<summary>
Do not audit attempts to send gopher_server packets.
</summary>
@@ -29052,7 +29098,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gopher_server_packets" lineno="31860">
+<interface name="corenet_receive_gopher_server_packets" lineno="30396">
<summary>
Receive gopher_server packets.
</summary>
@@ -29063,7 +29109,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="31879">
+<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="30415">
<summary>
Do not audit attempts to receive gopher_server packets.
</summary>
@@ -29074,7 +29120,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gopher_server_packets" lineno="31898">
+<interface name="corenet_sendrecv_gopher_server_packets" lineno="30434">
<summary>
Send and receive gopher_server packets.
</summary>
@@ -29085,7 +29131,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="31914">
+<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="30450">
<summary>
Do not audit attempts to send and receive gopher_server packets.
</summary>
@@ -29096,7 +29142,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gopher_server_packets" lineno="31929">
+<interface name="corenet_relabelto_gopher_server_packets" lineno="30465">
<summary>
Relabel packets to gopher_server the packet type.
</summary>
@@ -29106,7 +29152,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="31951">
+<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="30487">
<summary>
Send and receive TCP traffic on the gpsd port.
</summary>
@@ -29117,7 +29163,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_gpsd_port" lineno="31970">
+<interface name="corenet_udp_send_gpsd_port" lineno="30502">
<summary>
Send UDP traffic on the gpsd port.
</summary>
@@ -29128,7 +29174,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="31989">
+<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="30517">
<summary>
Do not audit attempts to send UDP traffic on the gpsd port.
</summary>
@@ -29139,7 +29185,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_gpsd_port" lineno="32008">
+<interface name="corenet_udp_receive_gpsd_port" lineno="30532">
<summary>
Receive UDP traffic on the gpsd port.
</summary>
@@ -29150,7 +29196,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="32027">
+<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="30547">
<summary>
Do not audit attempts to receive UDP traffic on the gpsd port.
</summary>
@@ -29161,7 +29207,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_gpsd_port" lineno="32046">
+<interface name="corenet_udp_sendrecv_gpsd_port" lineno="30562">
<summary>
Send and receive UDP traffic on the gpsd port.
</summary>
@@ -29172,7 +29218,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="32063">
+<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="30578">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gpsd port.
@@ -29184,7 +29230,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_gpsd_port" lineno="32079">
+<interface name="corenet_tcp_bind_gpsd_port" lineno="30593">
<summary>
Bind TCP sockets to the gpsd port.
</summary>
@@ -29195,7 +29241,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_gpsd_port" lineno="32099">
+<interface name="corenet_udp_bind_gpsd_port" lineno="30613">
<summary>
Bind UDP sockets to the gpsd port.
</summary>
@@ -29206,7 +29252,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_gpsd_port" lineno="32118">
+<interface name="corenet_tcp_connect_gpsd_port" lineno="30632">
<summary>
Make a TCP connection to the gpsd port.
</summary>
@@ -29216,7 +29262,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gpsd_client_packets" lineno="32138">
+<interface name="corenet_send_gpsd_client_packets" lineno="30652">
<summary>
Send gpsd_client packets.
</summary>
@@ -29227,7 +29273,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="32157">
+<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="30671">
<summary>
Do not audit attempts to send gpsd_client packets.
</summary>
@@ -29238,7 +29284,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gpsd_client_packets" lineno="32176">
+<interface name="corenet_receive_gpsd_client_packets" lineno="30690">
<summary>
Receive gpsd_client packets.
</summary>
@@ -29249,7 +29295,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="32195">
+<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="30709">
<summary>
Do not audit attempts to receive gpsd_client packets.
</summary>
@@ -29260,7 +29306,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gpsd_client_packets" lineno="32214">
+<interface name="corenet_sendrecv_gpsd_client_packets" lineno="30728">
<summary>
Send and receive gpsd_client packets.
</summary>
@@ -29271,7 +29317,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="32230">
+<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="30744">
<summary>
Do not audit attempts to send and receive gpsd_client packets.
</summary>
@@ -29282,7 +29328,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gpsd_client_packets" lineno="32245">
+<interface name="corenet_relabelto_gpsd_client_packets" lineno="30759">
<summary>
Relabel packets to gpsd_client the packet type.
</summary>
@@ -29292,7 +29338,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_gpsd_server_packets" lineno="32265">
+<interface name="corenet_send_gpsd_server_packets" lineno="30779">
<summary>
Send gpsd_server packets.
</summary>
@@ -29303,7 +29349,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="32284">
+<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="30798">
<summary>
Do not audit attempts to send gpsd_server packets.
</summary>
@@ -29314,7 +29360,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_gpsd_server_packets" lineno="32303">
+<interface name="corenet_receive_gpsd_server_packets" lineno="30817">
<summary>
Receive gpsd_server packets.
</summary>
@@ -29325,7 +29371,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="32322">
+<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="30836">
<summary>
Do not audit attempts to receive gpsd_server packets.
</summary>
@@ -29336,7 +29382,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_gpsd_server_packets" lineno="32341">
+<interface name="corenet_sendrecv_gpsd_server_packets" lineno="30855">
<summary>
Send and receive gpsd_server packets.
</summary>
@@ -29347,7 +29393,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="32357">
+<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="30871">
<summary>
Do not audit attempts to send and receive gpsd_server packets.
</summary>
@@ -29358,7 +29404,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_gpsd_server_packets" lineno="32372">
+<interface name="corenet_relabelto_gpsd_server_packets" lineno="30886">
<summary>
Relabel packets to gpsd_server the packet type.
</summary>
@@ -29368,7 +29414,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="32394">
+<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="30908">
<summary>
Send and receive TCP traffic on the hadoop_datanode port.
</summary>
@@ -29379,7 +29425,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_hadoop_datanode_port" lineno="32413">
+<interface name="corenet_udp_send_hadoop_datanode_port" lineno="30923">
<summary>
Send UDP traffic on the hadoop_datanode port.
</summary>
@@ -29390,7 +29436,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="32432">
+<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="30938">
<summary>
Do not audit attempts to send UDP traffic on the hadoop_datanode port.
</summary>
@@ -29401,7 +29447,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="32451">
+<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="30953">
<summary>
Receive UDP traffic on the hadoop_datanode port.
</summary>
@@ -29412,7 +29458,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="32470">
+<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="30968">
<summary>
Do not audit attempts to receive UDP traffic on the hadoop_datanode port.
</summary>
@@ -29423,7 +29469,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="32489">
+<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="30983">
<summary>
Send and receive UDP traffic on the hadoop_datanode port.
</summary>
@@ -29434,7 +29480,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="32506">
+<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="30999">
<summary>
Do not audit attempts to send and receive
UDP traffic on the hadoop_datanode port.
@@ -29446,7 +29492,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="32522">
+<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="31014">
<summary>
Bind TCP sockets to the hadoop_datanode port.
</summary>
@@ -29457,7 +29503,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="32542">
+<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="31034">
<summary>
Bind UDP sockets to the hadoop_datanode port.
</summary>
@@ -29468,7 +29514,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="32561">
+<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="31053">
<summary>
Make a TCP connection to the hadoop_datanode port.
</summary>
@@ -29478,7 +29524,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hadoop_datanode_client_packets" lineno="32581">
+<interface name="corenet_send_hadoop_datanode_client_packets" lineno="31073">
<summary>
Send hadoop_datanode_client packets.
</summary>
@@ -29489,7 +29535,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="32600">
+<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="31092">
<summary>
Do not audit attempts to send hadoop_datanode_client packets.
</summary>
@@ -29500,7 +29546,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="32619">
+<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="31111">
<summary>
Receive hadoop_datanode_client packets.
</summary>
@@ -29511,7 +29557,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="32638">
+<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="31130">
<summary>
Do not audit attempts to receive hadoop_datanode_client packets.
</summary>
@@ -29522,7 +29568,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="32657">
+<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="31149">
<summary>
Send and receive hadoop_datanode_client packets.
</summary>
@@ -29533,7 +29579,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="32673">
+<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="31165">
<summary>
Do not audit attempts to send and receive hadoop_datanode_client packets.
</summary>
@@ -29544,7 +29590,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="32688">
+<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="31180">
<summary>
Relabel packets to hadoop_datanode_client the packet type.
</summary>
@@ -29554,7 +29600,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hadoop_datanode_server_packets" lineno="32708">
+<interface name="corenet_send_hadoop_datanode_server_packets" lineno="31200">
<summary>
Send hadoop_datanode_server packets.
</summary>
@@ -29565,7 +29611,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="32727">
+<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="31219">
<summary>
Do not audit attempts to send hadoop_datanode_server packets.
</summary>
@@ -29576,7 +29622,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="32746">
+<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="31238">
<summary>
Receive hadoop_datanode_server packets.
</summary>
@@ -29587,7 +29633,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="32765">
+<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="31257">
<summary>
Do not audit attempts to receive hadoop_datanode_server packets.
</summary>
@@ -29598,7 +29644,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="32784">
+<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="31276">
<summary>
Send and receive hadoop_datanode_server packets.
</summary>
@@ -29609,7 +29655,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="32800">
+<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="31292">
<summary>
Do not audit attempts to send and receive hadoop_datanode_server packets.
</summary>
@@ -29620,7 +29666,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="32815">
+<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="31307">
<summary>
Relabel packets to hadoop_datanode_server the packet type.
</summary>
@@ -29630,7 +29676,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="32837">
+<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="31329">
<summary>
Send and receive TCP traffic on the hadoop_namenode port.
</summary>
@@ -29641,7 +29687,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_hadoop_namenode_port" lineno="32856">
+<interface name="corenet_udp_send_hadoop_namenode_port" lineno="31344">
<summary>
Send UDP traffic on the hadoop_namenode port.
</summary>
@@ -29652,7 +29698,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="32875">
+<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="31359">
<summary>
Do not audit attempts to send UDP traffic on the hadoop_namenode port.
</summary>
@@ -29663,7 +29709,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="32894">
+<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="31374">
<summary>
Receive UDP traffic on the hadoop_namenode port.
</summary>
@@ -29674,7 +29720,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="32913">
+<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="31389">
<summary>
Do not audit attempts to receive UDP traffic on the hadoop_namenode port.
</summary>
@@ -29685,7 +29731,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="32932">
+<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="31404">
<summary>
Send and receive UDP traffic on the hadoop_namenode port.
</summary>
@@ -29696,7 +29742,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="32949">
+<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="31420">
<summary>
Do not audit attempts to send and receive
UDP traffic on the hadoop_namenode port.
@@ -29708,7 +29754,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="32965">
+<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="31435">
<summary>
Bind TCP sockets to the hadoop_namenode port.
</summary>
@@ -29719,7 +29765,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="32985">
+<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="31455">
<summary>
Bind UDP sockets to the hadoop_namenode port.
</summary>
@@ -29730,7 +29776,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="33004">
+<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="31474">
<summary>
Make a TCP connection to the hadoop_namenode port.
</summary>
@@ -29740,7 +29786,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hadoop_namenode_client_packets" lineno="33024">
+<interface name="corenet_send_hadoop_namenode_client_packets" lineno="31494">
<summary>
Send hadoop_namenode_client packets.
</summary>
@@ -29751,7 +29797,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="33043">
+<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="31513">
<summary>
Do not audit attempts to send hadoop_namenode_client packets.
</summary>
@@ -29762,7 +29808,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="33062">
+<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="31532">
<summary>
Receive hadoop_namenode_client packets.
</summary>
@@ -29773,7 +29819,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="33081">
+<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="31551">
<summary>
Do not audit attempts to receive hadoop_namenode_client packets.
</summary>
@@ -29784,7 +29830,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="33100">
+<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="31570">
<summary>
Send and receive hadoop_namenode_client packets.
</summary>
@@ -29795,7 +29841,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="33116">
+<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="31586">
<summary>
Do not audit attempts to send and receive hadoop_namenode_client packets.
</summary>
@@ -29806,7 +29852,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="33131">
+<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="31601">
<summary>
Relabel packets to hadoop_namenode_client the packet type.
</summary>
@@ -29816,7 +29862,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hadoop_namenode_server_packets" lineno="33151">
+<interface name="corenet_send_hadoop_namenode_server_packets" lineno="31621">
<summary>
Send hadoop_namenode_server packets.
</summary>
@@ -29827,7 +29873,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="33170">
+<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="31640">
<summary>
Do not audit attempts to send hadoop_namenode_server packets.
</summary>
@@ -29838,7 +29884,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="33189">
+<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="31659">
<summary>
Receive hadoop_namenode_server packets.
</summary>
@@ -29849,7 +29895,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="33208">
+<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="31678">
<summary>
Do not audit attempts to receive hadoop_namenode_server packets.
</summary>
@@ -29860,7 +29906,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="33227">
+<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="31697">
<summary>
Send and receive hadoop_namenode_server packets.
</summary>
@@ -29871,7 +29917,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="33243">
+<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="31713">
<summary>
Do not audit attempts to send and receive hadoop_namenode_server packets.
</summary>
@@ -29882,7 +29928,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="33258">
+<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="31728">
<summary>
Relabel packets to hadoop_namenode_server the packet type.
</summary>
@@ -29892,7 +29938,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="33280">
+<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="31750">
<summary>
Send and receive TCP traffic on the hddtemp port.
</summary>
@@ -29903,7 +29949,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_hddtemp_port" lineno="33299">
+<interface name="corenet_udp_send_hddtemp_port" lineno="31765">
<summary>
Send UDP traffic on the hddtemp port.
</summary>
@@ -29914,7 +29960,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="33318">
+<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="31780">
<summary>
Do not audit attempts to send UDP traffic on the hddtemp port.
</summary>
@@ -29925,7 +29971,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_hddtemp_port" lineno="33337">
+<interface name="corenet_udp_receive_hddtemp_port" lineno="31795">
<summary>
Receive UDP traffic on the hddtemp port.
</summary>
@@ -29936,7 +29982,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="33356">
+<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="31810">
<summary>
Do not audit attempts to receive UDP traffic on the hddtemp port.
</summary>
@@ -29947,7 +29993,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="33375">
+<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="31825">
<summary>
Send and receive UDP traffic on the hddtemp port.
</summary>
@@ -29958,7 +30004,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="33392">
+<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="31841">
<summary>
Do not audit attempts to send and receive
UDP traffic on the hddtemp port.
@@ -29970,7 +30016,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_hddtemp_port" lineno="33408">
+<interface name="corenet_tcp_bind_hddtemp_port" lineno="31856">
<summary>
Bind TCP sockets to the hddtemp port.
</summary>
@@ -29981,7 +30027,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_hddtemp_port" lineno="33428">
+<interface name="corenet_udp_bind_hddtemp_port" lineno="31876">
<summary>
Bind UDP sockets to the hddtemp port.
</summary>
@@ -29992,7 +30038,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_hddtemp_port" lineno="33447">
+<interface name="corenet_tcp_connect_hddtemp_port" lineno="31895">
<summary>
Make a TCP connection to the hddtemp port.
</summary>
@@ -30002,7 +30048,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hddtemp_client_packets" lineno="33467">
+<interface name="corenet_send_hddtemp_client_packets" lineno="31915">
<summary>
Send hddtemp_client packets.
</summary>
@@ -30013,7 +30059,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="33486">
+<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="31934">
<summary>
Do not audit attempts to send hddtemp_client packets.
</summary>
@@ -30024,7 +30070,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hddtemp_client_packets" lineno="33505">
+<interface name="corenet_receive_hddtemp_client_packets" lineno="31953">
<summary>
Receive hddtemp_client packets.
</summary>
@@ -30035,7 +30081,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="33524">
+<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="31972">
<summary>
Do not audit attempts to receive hddtemp_client packets.
</summary>
@@ -30046,7 +30092,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="33543">
+<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="31991">
<summary>
Send and receive hddtemp_client packets.
</summary>
@@ -30057,7 +30103,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="33559">
+<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="32007">
<summary>
Do not audit attempts to send and receive hddtemp_client packets.
</summary>
@@ -30068,7 +30114,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hddtemp_client_packets" lineno="33574">
+<interface name="corenet_relabelto_hddtemp_client_packets" lineno="32022">
<summary>
Relabel packets to hddtemp_client the packet type.
</summary>
@@ -30078,7 +30124,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hddtemp_server_packets" lineno="33594">
+<interface name="corenet_send_hddtemp_server_packets" lineno="32042">
<summary>
Send hddtemp_server packets.
</summary>
@@ -30089,7 +30135,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="33613">
+<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="32061">
<summary>
Do not audit attempts to send hddtemp_server packets.
</summary>
@@ -30100,7 +30146,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hddtemp_server_packets" lineno="33632">
+<interface name="corenet_receive_hddtemp_server_packets" lineno="32080">
<summary>
Receive hddtemp_server packets.
</summary>
@@ -30111,7 +30157,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="33651">
+<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="32099">
<summary>
Do not audit attempts to receive hddtemp_server packets.
</summary>
@@ -30122,7 +30168,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="33670">
+<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="32118">
<summary>
Send and receive hddtemp_server packets.
</summary>
@@ -30133,7 +30179,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="33686">
+<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="32134">
<summary>
Do not audit attempts to send and receive hddtemp_server packets.
</summary>
@@ -30144,7 +30190,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hddtemp_server_packets" lineno="33701">
+<interface name="corenet_relabelto_hddtemp_server_packets" lineno="32149">
<summary>
Relabel packets to hddtemp_server the packet type.
</summary>
@@ -30154,7 +30200,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_howl_port" lineno="33723">
+<interface name="corenet_tcp_sendrecv_howl_port" lineno="32171">
<summary>
Send and receive TCP traffic on the howl port.
</summary>
@@ -30165,7 +30211,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_howl_port" lineno="33742">
+<interface name="corenet_udp_send_howl_port" lineno="32186">
<summary>
Send UDP traffic on the howl port.
</summary>
@@ -30176,7 +30222,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_howl_port" lineno="33761">
+<interface name="corenet_dontaudit_udp_send_howl_port" lineno="32201">
<summary>
Do not audit attempts to send UDP traffic on the howl port.
</summary>
@@ -30187,7 +30233,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_howl_port" lineno="33780">
+<interface name="corenet_udp_receive_howl_port" lineno="32216">
<summary>
Receive UDP traffic on the howl port.
</summary>
@@ -30198,7 +30244,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="33799">
+<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="32231">
<summary>
Do not audit attempts to receive UDP traffic on the howl port.
</summary>
@@ -30209,7 +30255,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_howl_port" lineno="33818">
+<interface name="corenet_udp_sendrecv_howl_port" lineno="32246">
<summary>
Send and receive UDP traffic on the howl port.
</summary>
@@ -30220,7 +30266,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="33835">
+<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="32262">
<summary>
Do not audit attempts to send and receive
UDP traffic on the howl port.
@@ -30232,7 +30278,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_howl_port" lineno="33851">
+<interface name="corenet_tcp_bind_howl_port" lineno="32277">
<summary>
Bind TCP sockets to the howl port.
</summary>
@@ -30243,7 +30289,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_howl_port" lineno="33871">
+<interface name="corenet_udp_bind_howl_port" lineno="32297">
<summary>
Bind UDP sockets to the howl port.
</summary>
@@ -30254,7 +30300,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_howl_port" lineno="33890">
+<interface name="corenet_tcp_connect_howl_port" lineno="32316">
<summary>
Make a TCP connection to the howl port.
</summary>
@@ -30264,7 +30310,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_howl_client_packets" lineno="33910">
+<interface name="corenet_send_howl_client_packets" lineno="32336">
<summary>
Send howl_client packets.
</summary>
@@ -30275,7 +30321,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_howl_client_packets" lineno="33929">
+<interface name="corenet_dontaudit_send_howl_client_packets" lineno="32355">
<summary>
Do not audit attempts to send howl_client packets.
</summary>
@@ -30286,7 +30332,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_howl_client_packets" lineno="33948">
+<interface name="corenet_receive_howl_client_packets" lineno="32374">
<summary>
Receive howl_client packets.
</summary>
@@ -30297,7 +30343,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="33967">
+<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="32393">
<summary>
Do not audit attempts to receive howl_client packets.
</summary>
@@ -30308,7 +30354,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_howl_client_packets" lineno="33986">
+<interface name="corenet_sendrecv_howl_client_packets" lineno="32412">
<summary>
Send and receive howl_client packets.
</summary>
@@ -30319,7 +30365,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="34002">
+<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="32428">
<summary>
Do not audit attempts to send and receive howl_client packets.
</summary>
@@ -30330,7 +30376,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_howl_client_packets" lineno="34017">
+<interface name="corenet_relabelto_howl_client_packets" lineno="32443">
<summary>
Relabel packets to howl_client the packet type.
</summary>
@@ -30340,7 +30386,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_howl_server_packets" lineno="34037">
+<interface name="corenet_send_howl_server_packets" lineno="32463">
<summary>
Send howl_server packets.
</summary>
@@ -30351,7 +30397,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_howl_server_packets" lineno="34056">
+<interface name="corenet_dontaudit_send_howl_server_packets" lineno="32482">
<summary>
Do not audit attempts to send howl_server packets.
</summary>
@@ -30362,7 +30408,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_howl_server_packets" lineno="34075">
+<interface name="corenet_receive_howl_server_packets" lineno="32501">
<summary>
Receive howl_server packets.
</summary>
@@ -30373,7 +30419,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="34094">
+<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="32520">
<summary>
Do not audit attempts to receive howl_server packets.
</summary>
@@ -30384,7 +30430,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_howl_server_packets" lineno="34113">
+<interface name="corenet_sendrecv_howl_server_packets" lineno="32539">
<summary>
Send and receive howl_server packets.
</summary>
@@ -30395,7 +30441,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="34129">
+<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="32555">
<summary>
Do not audit attempts to send and receive howl_server packets.
</summary>
@@ -30406,7 +30452,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_howl_server_packets" lineno="34144">
+<interface name="corenet_relabelto_howl_server_packets" lineno="32570">
<summary>
Relabel packets to howl_server the packet type.
</summary>
@@ -30416,7 +30462,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_hplip_port" lineno="34166">
+<interface name="corenet_tcp_sendrecv_hplip_port" lineno="32592">
<summary>
Send and receive TCP traffic on the hplip port.
</summary>
@@ -30427,7 +30473,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_hplip_port" lineno="34185">
+<interface name="corenet_udp_send_hplip_port" lineno="32607">
<summary>
Send UDP traffic on the hplip port.
</summary>
@@ -30438,7 +30484,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="34204">
+<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="32622">
<summary>
Do not audit attempts to send UDP traffic on the hplip port.
</summary>
@@ -30449,7 +30495,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_hplip_port" lineno="34223">
+<interface name="corenet_udp_receive_hplip_port" lineno="32637">
<summary>
Receive UDP traffic on the hplip port.
</summary>
@@ -30460,7 +30506,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="34242">
+<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="32652">
<summary>
Do not audit attempts to receive UDP traffic on the hplip port.
</summary>
@@ -30471,7 +30517,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_hplip_port" lineno="34261">
+<interface name="corenet_udp_sendrecv_hplip_port" lineno="32667">
<summary>
Send and receive UDP traffic on the hplip port.
</summary>
@@ -30482,7 +30528,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="34278">
+<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="32683">
<summary>
Do not audit attempts to send and receive
UDP traffic on the hplip port.
@@ -30494,7 +30540,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_hplip_port" lineno="34294">
+<interface name="corenet_tcp_bind_hplip_port" lineno="32698">
<summary>
Bind TCP sockets to the hplip port.
</summary>
@@ -30505,7 +30551,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_hplip_port" lineno="34314">
+<interface name="corenet_udp_bind_hplip_port" lineno="32718">
<summary>
Bind UDP sockets to the hplip port.
</summary>
@@ -30516,7 +30562,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_hplip_port" lineno="34333">
+<interface name="corenet_tcp_connect_hplip_port" lineno="32737">
<summary>
Make a TCP connection to the hplip port.
</summary>
@@ -30526,7 +30572,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hplip_client_packets" lineno="34353">
+<interface name="corenet_send_hplip_client_packets" lineno="32757">
<summary>
Send hplip_client packets.
</summary>
@@ -30537,7 +30583,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="34372">
+<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="32776">
<summary>
Do not audit attempts to send hplip_client packets.
</summary>
@@ -30548,7 +30594,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hplip_client_packets" lineno="34391">
+<interface name="corenet_receive_hplip_client_packets" lineno="32795">
<summary>
Receive hplip_client packets.
</summary>
@@ -30559,7 +30605,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="34410">
+<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="32814">
<summary>
Do not audit attempts to receive hplip_client packets.
</summary>
@@ -30570,7 +30616,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hplip_client_packets" lineno="34429">
+<interface name="corenet_sendrecv_hplip_client_packets" lineno="32833">
<summary>
Send and receive hplip_client packets.
</summary>
@@ -30581,7 +30627,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="34445">
+<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="32849">
<summary>
Do not audit attempts to send and receive hplip_client packets.
</summary>
@@ -30592,7 +30638,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hplip_client_packets" lineno="34460">
+<interface name="corenet_relabelto_hplip_client_packets" lineno="32864">
<summary>
Relabel packets to hplip_client the packet type.
</summary>
@@ -30602,7 +30648,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_hplip_server_packets" lineno="34480">
+<interface name="corenet_send_hplip_server_packets" lineno="32884">
<summary>
Send hplip_server packets.
</summary>
@@ -30613,7 +30659,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="34499">
+<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="32903">
<summary>
Do not audit attempts to send hplip_server packets.
</summary>
@@ -30624,7 +30670,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_hplip_server_packets" lineno="34518">
+<interface name="corenet_receive_hplip_server_packets" lineno="32922">
<summary>
Receive hplip_server packets.
</summary>
@@ -30635,7 +30681,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="34537">
+<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="32941">
<summary>
Do not audit attempts to receive hplip_server packets.
</summary>
@@ -30646,7 +30692,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_hplip_server_packets" lineno="34556">
+<interface name="corenet_sendrecv_hplip_server_packets" lineno="32960">
<summary>
Send and receive hplip_server packets.
</summary>
@@ -30657,7 +30703,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="34572">
+<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="32976">
<summary>
Do not audit attempts to send and receive hplip_server packets.
</summary>
@@ -30668,7 +30714,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_hplip_server_packets" lineno="34587">
+<interface name="corenet_relabelto_hplip_server_packets" lineno="32991">
<summary>
Relabel packets to hplip_server the packet type.
</summary>
@@ -30678,7 +30724,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_http_port" lineno="34609">
+<interface name="corenet_tcp_sendrecv_http_port" lineno="33013">
<summary>
Send and receive TCP traffic on the http port.
</summary>
@@ -30689,7 +30735,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_http_port" lineno="34628">
+<interface name="corenet_udp_send_http_port" lineno="33028">
<summary>
Send UDP traffic on the http port.
</summary>
@@ -30700,7 +30746,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_http_port" lineno="34647">
+<interface name="corenet_dontaudit_udp_send_http_port" lineno="33043">
<summary>
Do not audit attempts to send UDP traffic on the http port.
</summary>
@@ -30711,7 +30757,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_http_port" lineno="34666">
+<interface name="corenet_udp_receive_http_port" lineno="33058">
<summary>
Receive UDP traffic on the http port.
</summary>
@@ -30722,7 +30768,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_http_port" lineno="34685">
+<interface name="corenet_dontaudit_udp_receive_http_port" lineno="33073">
<summary>
Do not audit attempts to receive UDP traffic on the http port.
</summary>
@@ -30733,7 +30779,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_http_port" lineno="34704">
+<interface name="corenet_udp_sendrecv_http_port" lineno="33088">
<summary>
Send and receive UDP traffic on the http port.
</summary>
@@ -30744,7 +30790,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="34721">
+<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="33104">
<summary>
Do not audit attempts to send and receive
UDP traffic on the http port.
@@ -30756,7 +30802,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_http_port" lineno="34737">
+<interface name="corenet_tcp_bind_http_port" lineno="33119">
<summary>
Bind TCP sockets to the http port.
</summary>
@@ -30767,7 +30813,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_http_port" lineno="34757">
+<interface name="corenet_udp_bind_http_port" lineno="33139">
<summary>
Bind UDP sockets to the http port.
</summary>
@@ -30778,7 +30824,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_http_port" lineno="34776">
+<interface name="corenet_tcp_connect_http_port" lineno="33158">
<summary>
Make a TCP connection to the http port.
</summary>
@@ -30788,7 +30834,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_http_client_packets" lineno="34796">
+<interface name="corenet_send_http_client_packets" lineno="33178">
<summary>
Send http_client packets.
</summary>
@@ -30799,7 +30845,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_http_client_packets" lineno="34815">
+<interface name="corenet_dontaudit_send_http_client_packets" lineno="33197">
<summary>
Do not audit attempts to send http_client packets.
</summary>
@@ -30810,7 +30856,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_http_client_packets" lineno="34834">
+<interface name="corenet_receive_http_client_packets" lineno="33216">
<summary>
Receive http_client packets.
</summary>
@@ -30821,7 +30867,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_http_client_packets" lineno="34853">
+<interface name="corenet_dontaudit_receive_http_client_packets" lineno="33235">
<summary>
Do not audit attempts to receive http_client packets.
</summary>
@@ -30832,7 +30878,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_http_client_packets" lineno="34872">
+<interface name="corenet_sendrecv_http_client_packets" lineno="33254">
<summary>
Send and receive http_client packets.
</summary>
@@ -30843,7 +30889,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="34888">
+<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="33270">
<summary>
Do not audit attempts to send and receive http_client packets.
</summary>
@@ -30854,7 +30900,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_http_client_packets" lineno="34903">
+<interface name="corenet_relabelto_http_client_packets" lineno="33285">
<summary>
Relabel packets to http_client the packet type.
</summary>
@@ -30864,7 +30910,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_http_server_packets" lineno="34923">
+<interface name="corenet_send_http_server_packets" lineno="33305">
<summary>
Send http_server packets.
</summary>
@@ -30875,7 +30921,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_http_server_packets" lineno="34942">
+<interface name="corenet_dontaudit_send_http_server_packets" lineno="33324">
<summary>
Do not audit attempts to send http_server packets.
</summary>
@@ -30886,7 +30932,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_http_server_packets" lineno="34961">
+<interface name="corenet_receive_http_server_packets" lineno="33343">
<summary>
Receive http_server packets.
</summary>
@@ -30897,7 +30943,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_http_server_packets" lineno="34980">
+<interface name="corenet_dontaudit_receive_http_server_packets" lineno="33362">
<summary>
Do not audit attempts to receive http_server packets.
</summary>
@@ -30908,7 +30954,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_http_server_packets" lineno="34999">
+<interface name="corenet_sendrecv_http_server_packets" lineno="33381">
<summary>
Send and receive http_server packets.
</summary>
@@ -30919,7 +30965,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="35015">
+<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="33397">
<summary>
Do not audit attempts to send and receive http_server packets.
</summary>
@@ -30930,7 +30976,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_http_server_packets" lineno="35030">
+<interface name="corenet_relabelto_http_server_packets" lineno="33412">
<summary>
Relabel packets to http_server the packet type.
</summary>
@@ -30940,7 +30986,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="35052">
+<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="33434">
<summary>
Send and receive TCP traffic on the http_cache port.
</summary>
@@ -30951,7 +30997,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_http_cache_port" lineno="35071">
+<interface name="corenet_udp_send_http_cache_port" lineno="33449">
<summary>
Send UDP traffic on the http_cache port.
</summary>
@@ -30962,7 +31008,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="35090">
+<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="33464">
<summary>
Do not audit attempts to send UDP traffic on the http_cache port.
</summary>
@@ -30973,7 +31019,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_http_cache_port" lineno="35109">
+<interface name="corenet_udp_receive_http_cache_port" lineno="33479">
<summary>
Receive UDP traffic on the http_cache port.
</summary>
@@ -30984,7 +31030,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="35128">
+<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="33494">
<summary>
Do not audit attempts to receive UDP traffic on the http_cache port.
</summary>
@@ -30995,7 +31041,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_http_cache_port" lineno="35147">
+<interface name="corenet_udp_sendrecv_http_cache_port" lineno="33509">
<summary>
Send and receive UDP traffic on the http_cache port.
</summary>
@@ -31006,7 +31052,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="35164">
+<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="33525">
<summary>
Do not audit attempts to send and receive
UDP traffic on the http_cache port.
@@ -31018,7 +31064,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_http_cache_port" lineno="35180">
+<interface name="corenet_tcp_bind_http_cache_port" lineno="33540">
<summary>
Bind TCP sockets to the http_cache port.
</summary>
@@ -31029,7 +31075,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_http_cache_port" lineno="35200">
+<interface name="corenet_udp_bind_http_cache_port" lineno="33560">
<summary>
Bind UDP sockets to the http_cache port.
</summary>
@@ -31040,7 +31086,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_http_cache_port" lineno="35219">
+<interface name="corenet_tcp_connect_http_cache_port" lineno="33579">
<summary>
Make a TCP connection to the http_cache port.
</summary>
@@ -31050,7 +31096,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_http_cache_client_packets" lineno="35239">
+<interface name="corenet_send_http_cache_client_packets" lineno="33599">
<summary>
Send http_cache_client packets.
</summary>
@@ -31061,7 +31107,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="35258">
+<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="33618">
<summary>
Do not audit attempts to send http_cache_client packets.
</summary>
@@ -31072,7 +31118,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_http_cache_client_packets" lineno="35277">
+<interface name="corenet_receive_http_cache_client_packets" lineno="33637">
<summary>
Receive http_cache_client packets.
</summary>
@@ -31083,7 +31129,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="35296">
+<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="33656">
<summary>
Do not audit attempts to receive http_cache_client packets.
</summary>
@@ -31094,7 +31140,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_http_cache_client_packets" lineno="35315">
+<interface name="corenet_sendrecv_http_cache_client_packets" lineno="33675">
<summary>
Send and receive http_cache_client packets.
</summary>
@@ -31105,7 +31151,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="35331">
+<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="33691">
<summary>
Do not audit attempts to send and receive http_cache_client packets.
</summary>
@@ -31116,7 +31162,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_http_cache_client_packets" lineno="35346">
+<interface name="corenet_relabelto_http_cache_client_packets" lineno="33706">
<summary>
Relabel packets to http_cache_client the packet type.
</summary>
@@ -31126,7 +31172,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_http_cache_server_packets" lineno="35366">
+<interface name="corenet_send_http_cache_server_packets" lineno="33726">
<summary>
Send http_cache_server packets.
</summary>
@@ -31137,7 +31183,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="35385">
+<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="33745">
<summary>
Do not audit attempts to send http_cache_server packets.
</summary>
@@ -31148,7 +31194,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_http_cache_server_packets" lineno="35404">
+<interface name="corenet_receive_http_cache_server_packets" lineno="33764">
<summary>
Receive http_cache_server packets.
</summary>
@@ -31159,7 +31205,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="35423">
+<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="33783">
<summary>
Do not audit attempts to receive http_cache_server packets.
</summary>
@@ -31170,7 +31216,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_http_cache_server_packets" lineno="35442">
+<interface name="corenet_sendrecv_http_cache_server_packets" lineno="33802">
<summary>
Send and receive http_cache_server packets.
</summary>
@@ -31181,7 +31227,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="35458">
+<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="33818">
<summary>
Do not audit attempts to send and receive http_cache_server packets.
</summary>
@@ -31192,7 +31238,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_http_cache_server_packets" lineno="35473">
+<interface name="corenet_relabelto_http_cache_server_packets" lineno="33833">
<summary>
Relabel packets to http_cache_server the packet type.
</summary>
@@ -31202,7 +31248,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="35495">
+<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="33855">
<summary>
Send and receive TCP traffic on the i18n_input port.
</summary>
@@ -31213,7 +31259,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_i18n_input_port" lineno="35514">
+<interface name="corenet_udp_send_i18n_input_port" lineno="33870">
<summary>
Send UDP traffic on the i18n_input port.
</summary>
@@ -31224,7 +31270,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="35533">
+<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="33885">
<summary>
Do not audit attempts to send UDP traffic on the i18n_input port.
</summary>
@@ -31235,7 +31281,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_i18n_input_port" lineno="35552">
+<interface name="corenet_udp_receive_i18n_input_port" lineno="33900">
<summary>
Receive UDP traffic on the i18n_input port.
</summary>
@@ -31246,7 +31292,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="35571">
+<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="33915">
<summary>
Do not audit attempts to receive UDP traffic on the i18n_input port.
</summary>
@@ -31257,7 +31303,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="35590">
+<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="33930">
<summary>
Send and receive UDP traffic on the i18n_input port.
</summary>
@@ -31268,7 +31314,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="35607">
+<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="33946">
<summary>
Do not audit attempts to send and receive
UDP traffic on the i18n_input port.
@@ -31280,7 +31326,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_i18n_input_port" lineno="35623">
+<interface name="corenet_tcp_bind_i18n_input_port" lineno="33961">
<summary>
Bind TCP sockets to the i18n_input port.
</summary>
@@ -31291,7 +31337,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_i18n_input_port" lineno="35643">
+<interface name="corenet_udp_bind_i18n_input_port" lineno="33981">
<summary>
Bind UDP sockets to the i18n_input port.
</summary>
@@ -31302,7 +31348,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_i18n_input_port" lineno="35662">
+<interface name="corenet_tcp_connect_i18n_input_port" lineno="34000">
<summary>
Make a TCP connection to the i18n_input port.
</summary>
@@ -31312,7 +31358,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_i18n_input_client_packets" lineno="35682">
+<interface name="corenet_send_i18n_input_client_packets" lineno="34020">
<summary>
Send i18n_input_client packets.
</summary>
@@ -31323,7 +31369,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="35701">
+<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="34039">
<summary>
Do not audit attempts to send i18n_input_client packets.
</summary>
@@ -31334,7 +31380,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_i18n_input_client_packets" lineno="35720">
+<interface name="corenet_receive_i18n_input_client_packets" lineno="34058">
<summary>
Receive i18n_input_client packets.
</summary>
@@ -31345,7 +31391,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="35739">
+<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="34077">
<summary>
Do not audit attempts to receive i18n_input_client packets.
</summary>
@@ -31356,7 +31402,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="35758">
+<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="34096">
<summary>
Send and receive i18n_input_client packets.
</summary>
@@ -31367,7 +31413,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="35774">
+<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="34112">
<summary>
Do not audit attempts to send and receive i18n_input_client packets.
</summary>
@@ -31378,7 +31424,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_i18n_input_client_packets" lineno="35789">
+<interface name="corenet_relabelto_i18n_input_client_packets" lineno="34127">
<summary>
Relabel packets to i18n_input_client the packet type.
</summary>
@@ -31388,7 +31434,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_i18n_input_server_packets" lineno="35809">
+<interface name="corenet_send_i18n_input_server_packets" lineno="34147">
<summary>
Send i18n_input_server packets.
</summary>
@@ -31399,7 +31445,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="35828">
+<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="34166">
<summary>
Do not audit attempts to send i18n_input_server packets.
</summary>
@@ -31410,7 +31456,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_i18n_input_server_packets" lineno="35847">
+<interface name="corenet_receive_i18n_input_server_packets" lineno="34185">
<summary>
Receive i18n_input_server packets.
</summary>
@@ -31421,7 +31467,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="35866">
+<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="34204">
<summary>
Do not audit attempts to receive i18n_input_server packets.
</summary>
@@ -31432,7 +31478,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="35885">
+<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="34223">
<summary>
Send and receive i18n_input_server packets.
</summary>
@@ -31443,7 +31489,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="35901">
+<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="34239">
<summary>
Do not audit attempts to send and receive i18n_input_server packets.
</summary>
@@ -31454,7 +31500,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_i18n_input_server_packets" lineno="35916">
+<interface name="corenet_relabelto_i18n_input_server_packets" lineno="34254">
<summary>
Relabel packets to i18n_input_server the packet type.
</summary>
@@ -31464,7 +31510,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_imaze_port" lineno="35938">
+<interface name="corenet_tcp_sendrecv_imaze_port" lineno="34276">
<summary>
Send and receive TCP traffic on the imaze port.
</summary>
@@ -31475,7 +31521,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_imaze_port" lineno="35957">
+<interface name="corenet_udp_send_imaze_port" lineno="34291">
<summary>
Send UDP traffic on the imaze port.
</summary>
@@ -31486,7 +31532,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="35976">
+<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="34306">
<summary>
Do not audit attempts to send UDP traffic on the imaze port.
</summary>
@@ -31497,7 +31543,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_imaze_port" lineno="35995">
+<interface name="corenet_udp_receive_imaze_port" lineno="34321">
<summary>
Receive UDP traffic on the imaze port.
</summary>
@@ -31508,7 +31554,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="36014">
+<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="34336">
<summary>
Do not audit attempts to receive UDP traffic on the imaze port.
</summary>
@@ -31519,7 +31565,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_imaze_port" lineno="36033">
+<interface name="corenet_udp_sendrecv_imaze_port" lineno="34351">
<summary>
Send and receive UDP traffic on the imaze port.
</summary>
@@ -31530,7 +31576,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="36050">
+<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="34367">
<summary>
Do not audit attempts to send and receive
UDP traffic on the imaze port.
@@ -31542,7 +31588,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_imaze_port" lineno="36066">
+<interface name="corenet_tcp_bind_imaze_port" lineno="34382">
<summary>
Bind TCP sockets to the imaze port.
</summary>
@@ -31553,7 +31599,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_imaze_port" lineno="36086">
+<interface name="corenet_udp_bind_imaze_port" lineno="34402">
<summary>
Bind UDP sockets to the imaze port.
</summary>
@@ -31564,7 +31610,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_imaze_port" lineno="36105">
+<interface name="corenet_tcp_connect_imaze_port" lineno="34421">
<summary>
Make a TCP connection to the imaze port.
</summary>
@@ -31574,7 +31620,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_imaze_client_packets" lineno="36125">
+<interface name="corenet_send_imaze_client_packets" lineno="34441">
<summary>
Send imaze_client packets.
</summary>
@@ -31585,7 +31631,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="36144">
+<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="34460">
<summary>
Do not audit attempts to send imaze_client packets.
</summary>
@@ -31596,7 +31642,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_imaze_client_packets" lineno="36163">
+<interface name="corenet_receive_imaze_client_packets" lineno="34479">
<summary>
Receive imaze_client packets.
</summary>
@@ -31607,7 +31653,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="36182">
+<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="34498">
<summary>
Do not audit attempts to receive imaze_client packets.
</summary>
@@ -31618,7 +31664,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_imaze_client_packets" lineno="36201">
+<interface name="corenet_sendrecv_imaze_client_packets" lineno="34517">
<summary>
Send and receive imaze_client packets.
</summary>
@@ -31629,7 +31675,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="36217">
+<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="34533">
<summary>
Do not audit attempts to send and receive imaze_client packets.
</summary>
@@ -31640,7 +31686,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_imaze_client_packets" lineno="36232">
+<interface name="corenet_relabelto_imaze_client_packets" lineno="34548">
<summary>
Relabel packets to imaze_client the packet type.
</summary>
@@ -31650,7 +31696,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_imaze_server_packets" lineno="36252">
+<interface name="corenet_send_imaze_server_packets" lineno="34568">
<summary>
Send imaze_server packets.
</summary>
@@ -31661,7 +31707,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="36271">
+<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="34587">
<summary>
Do not audit attempts to send imaze_server packets.
</summary>
@@ -31672,7 +31718,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_imaze_server_packets" lineno="36290">
+<interface name="corenet_receive_imaze_server_packets" lineno="34606">
<summary>
Receive imaze_server packets.
</summary>
@@ -31683,7 +31729,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="36309">
+<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="34625">
<summary>
Do not audit attempts to receive imaze_server packets.
</summary>
@@ -31694,7 +31740,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_imaze_server_packets" lineno="36328">
+<interface name="corenet_sendrecv_imaze_server_packets" lineno="34644">
<summary>
Send and receive imaze_server packets.
</summary>
@@ -31705,7 +31751,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="36344">
+<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="34660">
<summary>
Do not audit attempts to send and receive imaze_server packets.
</summary>
@@ -31716,7 +31762,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_imaze_server_packets" lineno="36359">
+<interface name="corenet_relabelto_imaze_server_packets" lineno="34675">
<summary>
Relabel packets to imaze_server the packet type.
</summary>
@@ -31726,7 +31772,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="36381">
+<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="34697">
<summary>
Send and receive TCP traffic on the inetd_child port.
</summary>
@@ -31737,7 +31783,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_inetd_child_port" lineno="36400">
+<interface name="corenet_udp_send_inetd_child_port" lineno="34712">
<summary>
Send UDP traffic on the inetd_child port.
</summary>
@@ -31748,7 +31794,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="36419">
+<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="34727">
<summary>
Do not audit attempts to send UDP traffic on the inetd_child port.
</summary>
@@ -31759,7 +31805,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_inetd_child_port" lineno="36438">
+<interface name="corenet_udp_receive_inetd_child_port" lineno="34742">
<summary>
Receive UDP traffic on the inetd_child port.
</summary>
@@ -31770,7 +31816,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="36457">
+<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="34757">
<summary>
Do not audit attempts to receive UDP traffic on the inetd_child port.
</summary>
@@ -31781,7 +31827,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="36476">
+<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="34772">
<summary>
Send and receive UDP traffic on the inetd_child port.
</summary>
@@ -31792,7 +31838,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="36493">
+<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="34788">
<summary>
Do not audit attempts to send and receive
UDP traffic on the inetd_child port.
@@ -31804,7 +31850,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_inetd_child_port" lineno="36509">
+<interface name="corenet_tcp_bind_inetd_child_port" lineno="34803">
<summary>
Bind TCP sockets to the inetd_child port.
</summary>
@@ -31815,7 +31861,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_inetd_child_port" lineno="36529">
+<interface name="corenet_udp_bind_inetd_child_port" lineno="34823">
<summary>
Bind UDP sockets to the inetd_child port.
</summary>
@@ -31826,7 +31872,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_inetd_child_port" lineno="36548">
+<interface name="corenet_tcp_connect_inetd_child_port" lineno="34842">
<summary>
Make a TCP connection to the inetd_child port.
</summary>
@@ -31836,7 +31882,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_inetd_child_client_packets" lineno="36568">
+<interface name="corenet_send_inetd_child_client_packets" lineno="34862">
<summary>
Send inetd_child_client packets.
</summary>
@@ -31847,7 +31893,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="36587">
+<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="34881">
<summary>
Do not audit attempts to send inetd_child_client packets.
</summary>
@@ -31858,7 +31904,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_inetd_child_client_packets" lineno="36606">
+<interface name="corenet_receive_inetd_child_client_packets" lineno="34900">
<summary>
Receive inetd_child_client packets.
</summary>
@@ -31869,7 +31915,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="36625">
+<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="34919">
<summary>
Do not audit attempts to receive inetd_child_client packets.
</summary>
@@ -31880,7 +31926,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="36644">
+<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="34938">
<summary>
Send and receive inetd_child_client packets.
</summary>
@@ -31891,7 +31937,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="36660">
+<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="34954">
<summary>
Do not audit attempts to send and receive inetd_child_client packets.
</summary>
@@ -31902,7 +31948,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_inetd_child_client_packets" lineno="36675">
+<interface name="corenet_relabelto_inetd_child_client_packets" lineno="34969">
<summary>
Relabel packets to inetd_child_client the packet type.
</summary>
@@ -31912,7 +31958,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_inetd_child_server_packets" lineno="36695">
+<interface name="corenet_send_inetd_child_server_packets" lineno="34989">
<summary>
Send inetd_child_server packets.
</summary>
@@ -31923,7 +31969,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="36714">
+<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="35008">
<summary>
Do not audit attempts to send inetd_child_server packets.
</summary>
@@ -31934,7 +31980,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_inetd_child_server_packets" lineno="36733">
+<interface name="corenet_receive_inetd_child_server_packets" lineno="35027">
<summary>
Receive inetd_child_server packets.
</summary>
@@ -31945,7 +31991,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="36752">
+<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="35046">
<summary>
Do not audit attempts to receive inetd_child_server packets.
</summary>
@@ -31956,7 +32002,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="36771">
+<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="35065">
<summary>
Send and receive inetd_child_server packets.
</summary>
@@ -31967,7 +32013,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="36787">
+<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="35081">
<summary>
Do not audit attempts to send and receive inetd_child_server packets.
</summary>
@@ -31978,7 +32024,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_inetd_child_server_packets" lineno="36802">
+<interface name="corenet_relabelto_inetd_child_server_packets" lineno="35096">
<summary>
Relabel packets to inetd_child_server the packet type.
</summary>
@@ -31988,7 +32034,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_innd_port" lineno="36824">
+<interface name="corenet_tcp_sendrecv_innd_port" lineno="35118">
<summary>
Send and receive TCP traffic on the innd port.
</summary>
@@ -31999,7 +32045,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_innd_port" lineno="36843">
+<interface name="corenet_udp_send_innd_port" lineno="35133">
<summary>
Send UDP traffic on the innd port.
</summary>
@@ -32010,7 +32056,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_innd_port" lineno="36862">
+<interface name="corenet_dontaudit_udp_send_innd_port" lineno="35148">
<summary>
Do not audit attempts to send UDP traffic on the innd port.
</summary>
@@ -32021,7 +32067,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_innd_port" lineno="36881">
+<interface name="corenet_udp_receive_innd_port" lineno="35163">
<summary>
Receive UDP traffic on the innd port.
</summary>
@@ -32032,7 +32078,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="36900">
+<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="35178">
<summary>
Do not audit attempts to receive UDP traffic on the innd port.
</summary>
@@ -32043,7 +32089,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_innd_port" lineno="36919">
+<interface name="corenet_udp_sendrecv_innd_port" lineno="35193">
<summary>
Send and receive UDP traffic on the innd port.
</summary>
@@ -32054,7 +32100,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="36936">
+<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="35209">
<summary>
Do not audit attempts to send and receive
UDP traffic on the innd port.
@@ -32066,7 +32112,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_innd_port" lineno="36952">
+<interface name="corenet_tcp_bind_innd_port" lineno="35224">
<summary>
Bind TCP sockets to the innd port.
</summary>
@@ -32077,7 +32123,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_innd_port" lineno="36972">
+<interface name="corenet_udp_bind_innd_port" lineno="35244">
<summary>
Bind UDP sockets to the innd port.
</summary>
@@ -32088,7 +32134,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_innd_port" lineno="36991">
+<interface name="corenet_tcp_connect_innd_port" lineno="35263">
<summary>
Make a TCP connection to the innd port.
</summary>
@@ -32098,7 +32144,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_innd_client_packets" lineno="37011">
+<interface name="corenet_send_innd_client_packets" lineno="35283">
<summary>
Send innd_client packets.
</summary>
@@ -32109,7 +32155,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_innd_client_packets" lineno="37030">
+<interface name="corenet_dontaudit_send_innd_client_packets" lineno="35302">
<summary>
Do not audit attempts to send innd_client packets.
</summary>
@@ -32120,7 +32166,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_innd_client_packets" lineno="37049">
+<interface name="corenet_receive_innd_client_packets" lineno="35321">
<summary>
Receive innd_client packets.
</summary>
@@ -32131,7 +32177,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="37068">
+<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="35340">
<summary>
Do not audit attempts to receive innd_client packets.
</summary>
@@ -32142,7 +32188,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_innd_client_packets" lineno="37087">
+<interface name="corenet_sendrecv_innd_client_packets" lineno="35359">
<summary>
Send and receive innd_client packets.
</summary>
@@ -32153,7 +32199,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="37103">
+<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="35375">
<summary>
Do not audit attempts to send and receive innd_client packets.
</summary>
@@ -32164,7 +32210,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_innd_client_packets" lineno="37118">
+<interface name="corenet_relabelto_innd_client_packets" lineno="35390">
<summary>
Relabel packets to innd_client the packet type.
</summary>
@@ -32174,7 +32220,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_innd_server_packets" lineno="37138">
+<interface name="corenet_send_innd_server_packets" lineno="35410">
<summary>
Send innd_server packets.
</summary>
@@ -32185,7 +32231,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_innd_server_packets" lineno="37157">
+<interface name="corenet_dontaudit_send_innd_server_packets" lineno="35429">
<summary>
Do not audit attempts to send innd_server packets.
</summary>
@@ -32196,7 +32242,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_innd_server_packets" lineno="37176">
+<interface name="corenet_receive_innd_server_packets" lineno="35448">
<summary>
Receive innd_server packets.
</summary>
@@ -32207,7 +32253,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="37195">
+<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="35467">
<summary>
Do not audit attempts to receive innd_server packets.
</summary>
@@ -32218,7 +32264,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_innd_server_packets" lineno="37214">
+<interface name="corenet_sendrecv_innd_server_packets" lineno="35486">
<summary>
Send and receive innd_server packets.
</summary>
@@ -32229,7 +32275,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="37230">
+<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="35502">
<summary>
Do not audit attempts to send and receive innd_server packets.
</summary>
@@ -32240,7 +32286,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_innd_server_packets" lineno="37245">
+<interface name="corenet_relabelto_innd_server_packets" lineno="35517">
<summary>
Relabel packets to innd_server the packet type.
</summary>
@@ -32250,7 +32296,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_interwise_port" lineno="37267">
+<interface name="corenet_tcp_sendrecv_interwise_port" lineno="35539">
<summary>
Send and receive TCP traffic on the interwise port.
</summary>
@@ -32261,7 +32307,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_interwise_port" lineno="37286">
+<interface name="corenet_udp_send_interwise_port" lineno="35554">
<summary>
Send UDP traffic on the interwise port.
</summary>
@@ -32272,7 +32318,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="37305">
+<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="35569">
<summary>
Do not audit attempts to send UDP traffic on the interwise port.
</summary>
@@ -32283,7 +32329,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_interwise_port" lineno="37324">
+<interface name="corenet_udp_receive_interwise_port" lineno="35584">
<summary>
Receive UDP traffic on the interwise port.
</summary>
@@ -32294,7 +32340,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="37343">
+<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="35599">
<summary>
Do not audit attempts to receive UDP traffic on the interwise port.
</summary>
@@ -32305,7 +32351,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_interwise_port" lineno="37362">
+<interface name="corenet_udp_sendrecv_interwise_port" lineno="35614">
<summary>
Send and receive UDP traffic on the interwise port.
</summary>
@@ -32316,7 +32362,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="37379">
+<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="35630">
<summary>
Do not audit attempts to send and receive
UDP traffic on the interwise port.
@@ -32328,7 +32374,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_interwise_port" lineno="37395">
+<interface name="corenet_tcp_bind_interwise_port" lineno="35645">
<summary>
Bind TCP sockets to the interwise port.
</summary>
@@ -32339,7 +32385,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_interwise_port" lineno="37415">
+<interface name="corenet_udp_bind_interwise_port" lineno="35665">
<summary>
Bind UDP sockets to the interwise port.
</summary>
@@ -32350,7 +32396,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_interwise_port" lineno="37434">
+<interface name="corenet_tcp_connect_interwise_port" lineno="35684">
<summary>
Make a TCP connection to the interwise port.
</summary>
@@ -32360,7 +32406,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_interwise_client_packets" lineno="37454">
+<interface name="corenet_send_interwise_client_packets" lineno="35704">
<summary>
Send interwise_client packets.
</summary>
@@ -32371,7 +32417,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="37473">
+<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="35723">
<summary>
Do not audit attempts to send interwise_client packets.
</summary>
@@ -32382,7 +32428,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_interwise_client_packets" lineno="37492">
+<interface name="corenet_receive_interwise_client_packets" lineno="35742">
<summary>
Receive interwise_client packets.
</summary>
@@ -32393,7 +32439,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="37511">
+<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="35761">
<summary>
Do not audit attempts to receive interwise_client packets.
</summary>
@@ -32404,7 +32450,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_interwise_client_packets" lineno="37530">
+<interface name="corenet_sendrecv_interwise_client_packets" lineno="35780">
<summary>
Send and receive interwise_client packets.
</summary>
@@ -32415,7 +32461,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="37546">
+<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="35796">
<summary>
Do not audit attempts to send and receive interwise_client packets.
</summary>
@@ -32426,7 +32472,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_interwise_client_packets" lineno="37561">
+<interface name="corenet_relabelto_interwise_client_packets" lineno="35811">
<summary>
Relabel packets to interwise_client the packet type.
</summary>
@@ -32436,7 +32482,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_interwise_server_packets" lineno="37581">
+<interface name="corenet_send_interwise_server_packets" lineno="35831">
<summary>
Send interwise_server packets.
</summary>
@@ -32447,7 +32493,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="37600">
+<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="35850">
<summary>
Do not audit attempts to send interwise_server packets.
</summary>
@@ -32458,7 +32504,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_interwise_server_packets" lineno="37619">
+<interface name="corenet_receive_interwise_server_packets" lineno="35869">
<summary>
Receive interwise_server packets.
</summary>
@@ -32469,7 +32515,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="37638">
+<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="35888">
<summary>
Do not audit attempts to receive interwise_server packets.
</summary>
@@ -32480,7 +32526,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_interwise_server_packets" lineno="37657">
+<interface name="corenet_sendrecv_interwise_server_packets" lineno="35907">
<summary>
Send and receive interwise_server packets.
</summary>
@@ -32491,7 +32537,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="37673">
+<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="35923">
<summary>
Do not audit attempts to send and receive interwise_server packets.
</summary>
@@ -32502,7 +32548,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_interwise_server_packets" lineno="37688">
+<interface name="corenet_relabelto_interwise_server_packets" lineno="35938">
<summary>
Relabel packets to interwise_server the packet type.
</summary>
@@ -32512,7 +32558,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="37710">
+<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="35960">
<summary>
Send and receive TCP traffic on the ionixnetmon port.
</summary>
@@ -32523,7 +32569,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ionixnetmon_port" lineno="37729">
+<interface name="corenet_udp_send_ionixnetmon_port" lineno="35975">
<summary>
Send UDP traffic on the ionixnetmon port.
</summary>
@@ -32534,7 +32580,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="37748">
+<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="35990">
<summary>
Do not audit attempts to send UDP traffic on the ionixnetmon port.
</summary>
@@ -32545,7 +32591,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ionixnetmon_port" lineno="37767">
+<interface name="corenet_udp_receive_ionixnetmon_port" lineno="36005">
<summary>
Receive UDP traffic on the ionixnetmon port.
</summary>
@@ -32556,7 +32602,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="37786">
+<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="36020">
<summary>
Do not audit attempts to receive UDP traffic on the ionixnetmon port.
</summary>
@@ -32567,7 +32613,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="37805">
+<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="36035">
<summary>
Send and receive UDP traffic on the ionixnetmon port.
</summary>
@@ -32578,7 +32624,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="37822">
+<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="36051">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ionixnetmon port.
@@ -32590,7 +32636,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="37838">
+<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="36066">
<summary>
Bind TCP sockets to the ionixnetmon port.
</summary>
@@ -32601,7 +32647,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ionixnetmon_port" lineno="37858">
+<interface name="corenet_udp_bind_ionixnetmon_port" lineno="36086">
<summary>
Bind UDP sockets to the ionixnetmon port.
</summary>
@@ -32612,7 +32658,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="37877">
+<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="36105">
<summary>
Make a TCP connection to the ionixnetmon port.
</summary>
@@ -32622,7 +32668,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ionixnetmon_client_packets" lineno="37897">
+<interface name="corenet_send_ionixnetmon_client_packets" lineno="36125">
<summary>
Send ionixnetmon_client packets.
</summary>
@@ -32633,7 +32679,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="37916">
+<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="36144">
<summary>
Do not audit attempts to send ionixnetmon_client packets.
</summary>
@@ -32644,7 +32690,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ionixnetmon_client_packets" lineno="37935">
+<interface name="corenet_receive_ionixnetmon_client_packets" lineno="36163">
<summary>
Receive ionixnetmon_client packets.
</summary>
@@ -32655,7 +32701,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="37954">
+<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="36182">
<summary>
Do not audit attempts to receive ionixnetmon_client packets.
</summary>
@@ -32666,7 +32712,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="37973">
+<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="36201">
<summary>
Send and receive ionixnetmon_client packets.
</summary>
@@ -32677,7 +32723,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="37989">
+<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="36217">
<summary>
Do not audit attempts to send and receive ionixnetmon_client packets.
</summary>
@@ -32688,7 +32734,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="38004">
+<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="36232">
<summary>
Relabel packets to ionixnetmon_client the packet type.
</summary>
@@ -32698,7 +32744,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ionixnetmon_server_packets" lineno="38024">
+<interface name="corenet_send_ionixnetmon_server_packets" lineno="36252">
<summary>
Send ionixnetmon_server packets.
</summary>
@@ -32709,7 +32755,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="38043">
+<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="36271">
<summary>
Do not audit attempts to send ionixnetmon_server packets.
</summary>
@@ -32720,7 +32766,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ionixnetmon_server_packets" lineno="38062">
+<interface name="corenet_receive_ionixnetmon_server_packets" lineno="36290">
<summary>
Receive ionixnetmon_server packets.
</summary>
@@ -32731,7 +32777,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="38081">
+<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="36309">
<summary>
Do not audit attempts to receive ionixnetmon_server packets.
</summary>
@@ -32742,7 +32788,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="38100">
+<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="36328">
<summary>
Send and receive ionixnetmon_server packets.
</summary>
@@ -32753,7 +32799,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="38116">
+<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="36344">
<summary>
Do not audit attempts to send and receive ionixnetmon_server packets.
</summary>
@@ -32764,7 +32810,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="38131">
+<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="36359">
<summary>
Relabel packets to ionixnetmon_server the packet type.
</summary>
@@ -32774,7 +32820,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="38153">
+<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="36381">
<summary>
Send and receive TCP traffic on the ipmi port.
</summary>
@@ -32785,7 +32831,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ipmi_port" lineno="38172">
+<interface name="corenet_udp_send_ipmi_port" lineno="36396">
<summary>
Send UDP traffic on the ipmi port.
</summary>
@@ -32796,7 +32842,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="38191">
+<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="36411">
<summary>
Do not audit attempts to send UDP traffic on the ipmi port.
</summary>
@@ -32807,7 +32853,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ipmi_port" lineno="38210">
+<interface name="corenet_udp_receive_ipmi_port" lineno="36426">
<summary>
Receive UDP traffic on the ipmi port.
</summary>
@@ -32818,7 +32864,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="38229">
+<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="36441">
<summary>
Do not audit attempts to receive UDP traffic on the ipmi port.
</summary>
@@ -32829,7 +32875,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ipmi_port" lineno="38248">
+<interface name="corenet_udp_sendrecv_ipmi_port" lineno="36456">
<summary>
Send and receive UDP traffic on the ipmi port.
</summary>
@@ -32840,7 +32886,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="38265">
+<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="36472">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ipmi port.
@@ -32852,7 +32898,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ipmi_port" lineno="38281">
+<interface name="corenet_tcp_bind_ipmi_port" lineno="36487">
<summary>
Bind TCP sockets to the ipmi port.
</summary>
@@ -32863,7 +32909,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ipmi_port" lineno="38301">
+<interface name="corenet_udp_bind_ipmi_port" lineno="36507">
<summary>
Bind UDP sockets to the ipmi port.
</summary>
@@ -32874,7 +32920,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ipmi_port" lineno="38320">
+<interface name="corenet_tcp_connect_ipmi_port" lineno="36526">
<summary>
Make a TCP connection to the ipmi port.
</summary>
@@ -32884,7 +32930,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipmi_client_packets" lineno="38340">
+<interface name="corenet_send_ipmi_client_packets" lineno="36546">
<summary>
Send ipmi_client packets.
</summary>
@@ -32895,7 +32941,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="38359">
+<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="36565">
<summary>
Do not audit attempts to send ipmi_client packets.
</summary>
@@ -32906,7 +32952,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipmi_client_packets" lineno="38378">
+<interface name="corenet_receive_ipmi_client_packets" lineno="36584">
<summary>
Receive ipmi_client packets.
</summary>
@@ -32917,7 +32963,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="38397">
+<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="36603">
<summary>
Do not audit attempts to receive ipmi_client packets.
</summary>
@@ -32928,7 +32974,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipmi_client_packets" lineno="38416">
+<interface name="corenet_sendrecv_ipmi_client_packets" lineno="36622">
<summary>
Send and receive ipmi_client packets.
</summary>
@@ -32939,7 +32985,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="38432">
+<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="36638">
<summary>
Do not audit attempts to send and receive ipmi_client packets.
</summary>
@@ -32950,7 +32996,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipmi_client_packets" lineno="38447">
+<interface name="corenet_relabelto_ipmi_client_packets" lineno="36653">
<summary>
Relabel packets to ipmi_client the packet type.
</summary>
@@ -32960,7 +33006,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipmi_server_packets" lineno="38467">
+<interface name="corenet_send_ipmi_server_packets" lineno="36673">
<summary>
Send ipmi_server packets.
</summary>
@@ -32971,7 +33017,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="38486">
+<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="36692">
<summary>
Do not audit attempts to send ipmi_server packets.
</summary>
@@ -32982,7 +33028,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipmi_server_packets" lineno="38505">
+<interface name="corenet_receive_ipmi_server_packets" lineno="36711">
<summary>
Receive ipmi_server packets.
</summary>
@@ -32993,7 +33039,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="38524">
+<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="36730">
<summary>
Do not audit attempts to receive ipmi_server packets.
</summary>
@@ -33004,7 +33050,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipmi_server_packets" lineno="38543">
+<interface name="corenet_sendrecv_ipmi_server_packets" lineno="36749">
<summary>
Send and receive ipmi_server packets.
</summary>
@@ -33015,7 +33061,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="38559">
+<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="36765">
<summary>
Do not audit attempts to send and receive ipmi_server packets.
</summary>
@@ -33026,7 +33072,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipmi_server_packets" lineno="38574">
+<interface name="corenet_relabelto_ipmi_server_packets" lineno="36780">
<summary>
Relabel packets to ipmi_server the packet type.
</summary>
@@ -33036,7 +33082,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ipp_port" lineno="38596">
+<interface name="corenet_tcp_sendrecv_ipp_port" lineno="36802">
<summary>
Send and receive TCP traffic on the ipp port.
</summary>
@@ -33047,7 +33093,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ipp_port" lineno="38615">
+<interface name="corenet_udp_send_ipp_port" lineno="36817">
<summary>
Send UDP traffic on the ipp port.
</summary>
@@ -33058,7 +33104,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="38634">
+<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="36832">
<summary>
Do not audit attempts to send UDP traffic on the ipp port.
</summary>
@@ -33069,7 +33115,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ipp_port" lineno="38653">
+<interface name="corenet_udp_receive_ipp_port" lineno="36847">
<summary>
Receive UDP traffic on the ipp port.
</summary>
@@ -33080,7 +33126,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="38672">
+<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="36862">
<summary>
Do not audit attempts to receive UDP traffic on the ipp port.
</summary>
@@ -33091,7 +33137,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ipp_port" lineno="38691">
+<interface name="corenet_udp_sendrecv_ipp_port" lineno="36877">
<summary>
Send and receive UDP traffic on the ipp port.
</summary>
@@ -33102,7 +33148,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="38708">
+<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="36893">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ipp port.
@@ -33114,7 +33160,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ipp_port" lineno="38724">
+<interface name="corenet_tcp_bind_ipp_port" lineno="36908">
<summary>
Bind TCP sockets to the ipp port.
</summary>
@@ -33125,7 +33171,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ipp_port" lineno="38744">
+<interface name="corenet_udp_bind_ipp_port" lineno="36928">
<summary>
Bind UDP sockets to the ipp port.
</summary>
@@ -33136,7 +33182,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ipp_port" lineno="38763">
+<interface name="corenet_tcp_connect_ipp_port" lineno="36947">
<summary>
Make a TCP connection to the ipp port.
</summary>
@@ -33146,7 +33192,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipp_client_packets" lineno="38783">
+<interface name="corenet_send_ipp_client_packets" lineno="36967">
<summary>
Send ipp_client packets.
</summary>
@@ -33157,7 +33203,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="38802">
+<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="36986">
<summary>
Do not audit attempts to send ipp_client packets.
</summary>
@@ -33168,7 +33214,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipp_client_packets" lineno="38821">
+<interface name="corenet_receive_ipp_client_packets" lineno="37005">
<summary>
Receive ipp_client packets.
</summary>
@@ -33179,7 +33225,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="38840">
+<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="37024">
<summary>
Do not audit attempts to receive ipp_client packets.
</summary>
@@ -33190,7 +33236,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipp_client_packets" lineno="38859">
+<interface name="corenet_sendrecv_ipp_client_packets" lineno="37043">
<summary>
Send and receive ipp_client packets.
</summary>
@@ -33201,7 +33247,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="38875">
+<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="37059">
<summary>
Do not audit attempts to send and receive ipp_client packets.
</summary>
@@ -33212,7 +33258,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipp_client_packets" lineno="38890">
+<interface name="corenet_relabelto_ipp_client_packets" lineno="37074">
<summary>
Relabel packets to ipp_client the packet type.
</summary>
@@ -33222,7 +33268,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipp_server_packets" lineno="38910">
+<interface name="corenet_send_ipp_server_packets" lineno="37094">
<summary>
Send ipp_server packets.
</summary>
@@ -33233,7 +33279,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="38929">
+<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="37113">
<summary>
Do not audit attempts to send ipp_server packets.
</summary>
@@ -33244,7 +33290,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipp_server_packets" lineno="38948">
+<interface name="corenet_receive_ipp_server_packets" lineno="37132">
<summary>
Receive ipp_server packets.
</summary>
@@ -33255,7 +33301,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="38967">
+<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="37151">
<summary>
Do not audit attempts to receive ipp_server packets.
</summary>
@@ -33266,7 +33312,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipp_server_packets" lineno="38986">
+<interface name="corenet_sendrecv_ipp_server_packets" lineno="37170">
<summary>
Send and receive ipp_server packets.
</summary>
@@ -33277,7 +33323,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="39002">
+<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="37186">
<summary>
Do not audit attempts to send and receive ipp_server packets.
</summary>
@@ -33288,7 +33334,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipp_server_packets" lineno="39017">
+<interface name="corenet_relabelto_ipp_server_packets" lineno="37201">
<summary>
Relabel packets to ipp_server the packet type.
</summary>
@@ -33298,7 +33344,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="39039">
+<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="37223">
<summary>
Send and receive TCP traffic on the ipsecnat port.
</summary>
@@ -33309,7 +33355,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ipsecnat_port" lineno="39058">
+<interface name="corenet_udp_send_ipsecnat_port" lineno="37238">
<summary>
Send UDP traffic on the ipsecnat port.
</summary>
@@ -33320,7 +33366,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="39077">
+<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="37253">
<summary>
Do not audit attempts to send UDP traffic on the ipsecnat port.
</summary>
@@ -33331,7 +33377,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ipsecnat_port" lineno="39096">
+<interface name="corenet_udp_receive_ipsecnat_port" lineno="37268">
<summary>
Receive UDP traffic on the ipsecnat port.
</summary>
@@ -33342,7 +33388,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="39115">
+<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="37283">
<summary>
Do not audit attempts to receive UDP traffic on the ipsecnat port.
</summary>
@@ -33353,7 +33399,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="39134">
+<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="37298">
<summary>
Send and receive UDP traffic on the ipsecnat port.
</summary>
@@ -33364,7 +33410,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="39151">
+<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="37314">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ipsecnat port.
@@ -33376,7 +33422,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ipsecnat_port" lineno="39167">
+<interface name="corenet_tcp_bind_ipsecnat_port" lineno="37329">
<summary>
Bind TCP sockets to the ipsecnat port.
</summary>
@@ -33387,7 +33433,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ipsecnat_port" lineno="39187">
+<interface name="corenet_udp_bind_ipsecnat_port" lineno="37349">
<summary>
Bind UDP sockets to the ipsecnat port.
</summary>
@@ -33398,7 +33444,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ipsecnat_port" lineno="39206">
+<interface name="corenet_tcp_connect_ipsecnat_port" lineno="37368">
<summary>
Make a TCP connection to the ipsecnat port.
</summary>
@@ -33408,7 +33454,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipsecnat_client_packets" lineno="39226">
+<interface name="corenet_send_ipsecnat_client_packets" lineno="37388">
<summary>
Send ipsecnat_client packets.
</summary>
@@ -33419,7 +33465,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="39245">
+<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="37407">
<summary>
Do not audit attempts to send ipsecnat_client packets.
</summary>
@@ -33430,7 +33476,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipsecnat_client_packets" lineno="39264">
+<interface name="corenet_receive_ipsecnat_client_packets" lineno="37426">
<summary>
Receive ipsecnat_client packets.
</summary>
@@ -33441,7 +33487,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="39283">
+<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="37445">
<summary>
Do not audit attempts to receive ipsecnat_client packets.
</summary>
@@ -33452,7 +33498,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="39302">
+<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="37464">
<summary>
Send and receive ipsecnat_client packets.
</summary>
@@ -33463,7 +33509,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="39318">
+<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="37480">
<summary>
Do not audit attempts to send and receive ipsecnat_client packets.
</summary>
@@ -33474,7 +33520,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="39333">
+<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="37495">
<summary>
Relabel packets to ipsecnat_client the packet type.
</summary>
@@ -33484,7 +33530,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ipsecnat_server_packets" lineno="39353">
+<interface name="corenet_send_ipsecnat_server_packets" lineno="37515">
<summary>
Send ipsecnat_server packets.
</summary>
@@ -33495,7 +33541,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="39372">
+<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="37534">
<summary>
Do not audit attempts to send ipsecnat_server packets.
</summary>
@@ -33506,7 +33552,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ipsecnat_server_packets" lineno="39391">
+<interface name="corenet_receive_ipsecnat_server_packets" lineno="37553">
<summary>
Receive ipsecnat_server packets.
</summary>
@@ -33517,7 +33563,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="39410">
+<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="37572">
<summary>
Do not audit attempts to receive ipsecnat_server packets.
</summary>
@@ -33528,7 +33574,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="39429">
+<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="37591">
<summary>
Send and receive ipsecnat_server packets.
</summary>
@@ -33539,7 +33585,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="39445">
+<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="37607">
<summary>
Do not audit attempts to send and receive ipsecnat_server packets.
</summary>
@@ -33550,7 +33596,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="39460">
+<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="37622">
<summary>
Relabel packets to ipsecnat_server the packet type.
</summary>
@@ -33560,7 +33606,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ircd_port" lineno="39482">
+<interface name="corenet_tcp_sendrecv_ircd_port" lineno="37644">
<summary>
Send and receive TCP traffic on the ircd port.
</summary>
@@ -33571,7 +33617,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ircd_port" lineno="39501">
+<interface name="corenet_udp_send_ircd_port" lineno="37659">
<summary>
Send UDP traffic on the ircd port.
</summary>
@@ -33582,7 +33628,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="39520">
+<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="37674">
<summary>
Do not audit attempts to send UDP traffic on the ircd port.
</summary>
@@ -33593,7 +33639,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ircd_port" lineno="39539">
+<interface name="corenet_udp_receive_ircd_port" lineno="37689">
<summary>
Receive UDP traffic on the ircd port.
</summary>
@@ -33604,7 +33650,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="39558">
+<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="37704">
<summary>
Do not audit attempts to receive UDP traffic on the ircd port.
</summary>
@@ -33615,7 +33661,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ircd_port" lineno="39577">
+<interface name="corenet_udp_sendrecv_ircd_port" lineno="37719">
<summary>
Send and receive UDP traffic on the ircd port.
</summary>
@@ -33626,7 +33672,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="39594">
+<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="37735">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ircd port.
@@ -33638,7 +33684,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ircd_port" lineno="39610">
+<interface name="corenet_tcp_bind_ircd_port" lineno="37750">
<summary>
Bind TCP sockets to the ircd port.
</summary>
@@ -33649,7 +33695,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ircd_port" lineno="39630">
+<interface name="corenet_udp_bind_ircd_port" lineno="37770">
<summary>
Bind UDP sockets to the ircd port.
</summary>
@@ -33660,7 +33706,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ircd_port" lineno="39649">
+<interface name="corenet_tcp_connect_ircd_port" lineno="37789">
<summary>
Make a TCP connection to the ircd port.
</summary>
@@ -33670,7 +33716,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ircd_client_packets" lineno="39669">
+<interface name="corenet_send_ircd_client_packets" lineno="37809">
<summary>
Send ircd_client packets.
</summary>
@@ -33681,7 +33727,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="39688">
+<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="37828">
<summary>
Do not audit attempts to send ircd_client packets.
</summary>
@@ -33692,7 +33738,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ircd_client_packets" lineno="39707">
+<interface name="corenet_receive_ircd_client_packets" lineno="37847">
<summary>
Receive ircd_client packets.
</summary>
@@ -33703,7 +33749,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="39726">
+<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="37866">
<summary>
Do not audit attempts to receive ircd_client packets.
</summary>
@@ -33714,7 +33760,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ircd_client_packets" lineno="39745">
+<interface name="corenet_sendrecv_ircd_client_packets" lineno="37885">
<summary>
Send and receive ircd_client packets.
</summary>
@@ -33725,7 +33771,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="39761">
+<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="37901">
<summary>
Do not audit attempts to send and receive ircd_client packets.
</summary>
@@ -33736,7 +33782,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ircd_client_packets" lineno="39776">
+<interface name="corenet_relabelto_ircd_client_packets" lineno="37916">
<summary>
Relabel packets to ircd_client the packet type.
</summary>
@@ -33746,7 +33792,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ircd_server_packets" lineno="39796">
+<interface name="corenet_send_ircd_server_packets" lineno="37936">
<summary>
Send ircd_server packets.
</summary>
@@ -33757,7 +33803,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="39815">
+<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="37955">
<summary>
Do not audit attempts to send ircd_server packets.
</summary>
@@ -33768,7 +33814,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ircd_server_packets" lineno="39834">
+<interface name="corenet_receive_ircd_server_packets" lineno="37974">
<summary>
Receive ircd_server packets.
</summary>
@@ -33779,7 +33825,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="39853">
+<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="37993">
<summary>
Do not audit attempts to receive ircd_server packets.
</summary>
@@ -33790,7 +33836,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ircd_server_packets" lineno="39872">
+<interface name="corenet_sendrecv_ircd_server_packets" lineno="38012">
<summary>
Send and receive ircd_server packets.
</summary>
@@ -33801,7 +33847,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="39888">
+<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="38028">
<summary>
Do not audit attempts to send and receive ircd_server packets.
</summary>
@@ -33812,7 +33858,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ircd_server_packets" lineno="39903">
+<interface name="corenet_relabelto_ircd_server_packets" lineno="38043">
<summary>
Relabel packets to ircd_server the packet type.
</summary>
@@ -33822,7 +33868,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="39925">
+<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="38065">
<summary>
Send and receive TCP traffic on the isakmp port.
</summary>
@@ -33833,7 +33879,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_isakmp_port" lineno="39944">
+<interface name="corenet_udp_send_isakmp_port" lineno="38080">
<summary>
Send UDP traffic on the isakmp port.
</summary>
@@ -33844,7 +33890,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="39963">
+<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="38095">
<summary>
Do not audit attempts to send UDP traffic on the isakmp port.
</summary>
@@ -33855,7 +33901,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_isakmp_port" lineno="39982">
+<interface name="corenet_udp_receive_isakmp_port" lineno="38110">
<summary>
Receive UDP traffic on the isakmp port.
</summary>
@@ -33866,7 +33912,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="40001">
+<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="38125">
<summary>
Do not audit attempts to receive UDP traffic on the isakmp port.
</summary>
@@ -33877,7 +33923,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_isakmp_port" lineno="40020">
+<interface name="corenet_udp_sendrecv_isakmp_port" lineno="38140">
<summary>
Send and receive UDP traffic on the isakmp port.
</summary>
@@ -33888,7 +33934,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="40037">
+<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="38156">
<summary>
Do not audit attempts to send and receive
UDP traffic on the isakmp port.
@@ -33900,7 +33946,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_isakmp_port" lineno="40053">
+<interface name="corenet_tcp_bind_isakmp_port" lineno="38171">
<summary>
Bind TCP sockets to the isakmp port.
</summary>
@@ -33911,7 +33957,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_isakmp_port" lineno="40073">
+<interface name="corenet_udp_bind_isakmp_port" lineno="38191">
<summary>
Bind UDP sockets to the isakmp port.
</summary>
@@ -33922,7 +33968,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_isakmp_port" lineno="40092">
+<interface name="corenet_tcp_connect_isakmp_port" lineno="38210">
<summary>
Make a TCP connection to the isakmp port.
</summary>
@@ -33932,7 +33978,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_isakmp_client_packets" lineno="40112">
+<interface name="corenet_send_isakmp_client_packets" lineno="38230">
<summary>
Send isakmp_client packets.
</summary>
@@ -33943,7 +33989,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="40131">
+<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="38249">
<summary>
Do not audit attempts to send isakmp_client packets.
</summary>
@@ -33954,7 +34000,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_isakmp_client_packets" lineno="40150">
+<interface name="corenet_receive_isakmp_client_packets" lineno="38268">
<summary>
Receive isakmp_client packets.
</summary>
@@ -33965,7 +34011,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="40169">
+<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="38287">
<summary>
Do not audit attempts to receive isakmp_client packets.
</summary>
@@ -33976,7 +34022,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_isakmp_client_packets" lineno="40188">
+<interface name="corenet_sendrecv_isakmp_client_packets" lineno="38306">
<summary>
Send and receive isakmp_client packets.
</summary>
@@ -33987,7 +34033,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="40204">
+<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="38322">
<summary>
Do not audit attempts to send and receive isakmp_client packets.
</summary>
@@ -33998,7 +34044,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_isakmp_client_packets" lineno="40219">
+<interface name="corenet_relabelto_isakmp_client_packets" lineno="38337">
<summary>
Relabel packets to isakmp_client the packet type.
</summary>
@@ -34008,7 +34054,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_isakmp_server_packets" lineno="40239">
+<interface name="corenet_send_isakmp_server_packets" lineno="38357">
<summary>
Send isakmp_server packets.
</summary>
@@ -34019,7 +34065,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="40258">
+<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="38376">
<summary>
Do not audit attempts to send isakmp_server packets.
</summary>
@@ -34030,7 +34076,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_isakmp_server_packets" lineno="40277">
+<interface name="corenet_receive_isakmp_server_packets" lineno="38395">
<summary>
Receive isakmp_server packets.
</summary>
@@ -34041,7 +34087,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="40296">
+<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="38414">
<summary>
Do not audit attempts to receive isakmp_server packets.
</summary>
@@ -34052,7 +34098,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_isakmp_server_packets" lineno="40315">
+<interface name="corenet_sendrecv_isakmp_server_packets" lineno="38433">
<summary>
Send and receive isakmp_server packets.
</summary>
@@ -34063,7 +34109,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="40331">
+<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="38449">
<summary>
Do not audit attempts to send and receive isakmp_server packets.
</summary>
@@ -34074,7 +34120,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_isakmp_server_packets" lineno="40346">
+<interface name="corenet_relabelto_isakmp_server_packets" lineno="38464">
<summary>
Relabel packets to isakmp_server the packet type.
</summary>
@@ -34084,7 +34130,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="40368">
+<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="38486">
<summary>
Send and receive TCP traffic on the iscsi port.
</summary>
@@ -34095,7 +34141,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_iscsi_port" lineno="40387">
+<interface name="corenet_udp_send_iscsi_port" lineno="38501">
<summary>
Send UDP traffic on the iscsi port.
</summary>
@@ -34106,7 +34152,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="40406">
+<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="38516">
<summary>
Do not audit attempts to send UDP traffic on the iscsi port.
</summary>
@@ -34117,7 +34163,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_iscsi_port" lineno="40425">
+<interface name="corenet_udp_receive_iscsi_port" lineno="38531">
<summary>
Receive UDP traffic on the iscsi port.
</summary>
@@ -34128,7 +34174,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="40444">
+<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="38546">
<summary>
Do not audit attempts to receive UDP traffic on the iscsi port.
</summary>
@@ -34139,7 +34185,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_iscsi_port" lineno="40463">
+<interface name="corenet_udp_sendrecv_iscsi_port" lineno="38561">
<summary>
Send and receive UDP traffic on the iscsi port.
</summary>
@@ -34150,7 +34196,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="40480">
+<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="38577">
<summary>
Do not audit attempts to send and receive
UDP traffic on the iscsi port.
@@ -34162,7 +34208,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_iscsi_port" lineno="40496">
+<interface name="corenet_tcp_bind_iscsi_port" lineno="38592">
<summary>
Bind TCP sockets to the iscsi port.
</summary>
@@ -34173,7 +34219,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_iscsi_port" lineno="40516">
+<interface name="corenet_udp_bind_iscsi_port" lineno="38612">
<summary>
Bind UDP sockets to the iscsi port.
</summary>
@@ -34184,7 +34230,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_iscsi_port" lineno="40535">
+<interface name="corenet_tcp_connect_iscsi_port" lineno="38631">
<summary>
Make a TCP connection to the iscsi port.
</summary>
@@ -34194,7 +34240,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_iscsi_client_packets" lineno="40555">
+<interface name="corenet_send_iscsi_client_packets" lineno="38651">
<summary>
Send iscsi_client packets.
</summary>
@@ -34205,7 +34251,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="40574">
+<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="38670">
<summary>
Do not audit attempts to send iscsi_client packets.
</summary>
@@ -34216,7 +34262,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_iscsi_client_packets" lineno="40593">
+<interface name="corenet_receive_iscsi_client_packets" lineno="38689">
<summary>
Receive iscsi_client packets.
</summary>
@@ -34227,7 +34273,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="40612">
+<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="38708">
<summary>
Do not audit attempts to receive iscsi_client packets.
</summary>
@@ -34238,7 +34284,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_iscsi_client_packets" lineno="40631">
+<interface name="corenet_sendrecv_iscsi_client_packets" lineno="38727">
<summary>
Send and receive iscsi_client packets.
</summary>
@@ -34249,7 +34295,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="40647">
+<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="38743">
<summary>
Do not audit attempts to send and receive iscsi_client packets.
</summary>
@@ -34260,7 +34306,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_iscsi_client_packets" lineno="40662">
+<interface name="corenet_relabelto_iscsi_client_packets" lineno="38758">
<summary>
Relabel packets to iscsi_client the packet type.
</summary>
@@ -34270,7 +34316,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_iscsi_server_packets" lineno="40682">
+<interface name="corenet_send_iscsi_server_packets" lineno="38778">
<summary>
Send iscsi_server packets.
</summary>
@@ -34281,7 +34327,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="40701">
+<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="38797">
<summary>
Do not audit attempts to send iscsi_server packets.
</summary>
@@ -34292,7 +34338,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_iscsi_server_packets" lineno="40720">
+<interface name="corenet_receive_iscsi_server_packets" lineno="38816">
<summary>
Receive iscsi_server packets.
</summary>
@@ -34303,7 +34349,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="40739">
+<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="38835">
<summary>
Do not audit attempts to receive iscsi_server packets.
</summary>
@@ -34314,7 +34360,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_iscsi_server_packets" lineno="40758">
+<interface name="corenet_sendrecv_iscsi_server_packets" lineno="38854">
<summary>
Send and receive iscsi_server packets.
</summary>
@@ -34325,7 +34371,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="40774">
+<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="38870">
<summary>
Do not audit attempts to send and receive iscsi_server packets.
</summary>
@@ -34336,7 +34382,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_iscsi_server_packets" lineno="40789">
+<interface name="corenet_relabelto_iscsi_server_packets" lineno="38885">
<summary>
Relabel packets to iscsi_server the packet type.
</summary>
@@ -34346,7 +34392,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_isns_port" lineno="40811">
+<interface name="corenet_tcp_sendrecv_isns_port" lineno="38907">
<summary>
Send and receive TCP traffic on the isns port.
</summary>
@@ -34357,7 +34403,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_isns_port" lineno="40830">
+<interface name="corenet_udp_send_isns_port" lineno="38922">
<summary>
Send UDP traffic on the isns port.
</summary>
@@ -34368,7 +34414,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_isns_port" lineno="40849">
+<interface name="corenet_dontaudit_udp_send_isns_port" lineno="38937">
<summary>
Do not audit attempts to send UDP traffic on the isns port.
</summary>
@@ -34379,7 +34425,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_isns_port" lineno="40868">
+<interface name="corenet_udp_receive_isns_port" lineno="38952">
<summary>
Receive UDP traffic on the isns port.
</summary>
@@ -34390,7 +34436,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="40887">
+<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="38967">
<summary>
Do not audit attempts to receive UDP traffic on the isns port.
</summary>
@@ -34401,7 +34447,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_isns_port" lineno="40906">
+<interface name="corenet_udp_sendrecv_isns_port" lineno="38982">
<summary>
Send and receive UDP traffic on the isns port.
</summary>
@@ -34412,7 +34458,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="40923">
+<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="38998">
<summary>
Do not audit attempts to send and receive
UDP traffic on the isns port.
@@ -34424,7 +34470,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_isns_port" lineno="40939">
+<interface name="corenet_tcp_bind_isns_port" lineno="39013">
<summary>
Bind TCP sockets to the isns port.
</summary>
@@ -34435,7 +34481,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_isns_port" lineno="40959">
+<interface name="corenet_udp_bind_isns_port" lineno="39033">
<summary>
Bind UDP sockets to the isns port.
</summary>
@@ -34446,7 +34492,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_isns_port" lineno="40978">
+<interface name="corenet_tcp_connect_isns_port" lineno="39052">
<summary>
Make a TCP connection to the isns port.
</summary>
@@ -34456,7 +34502,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_isns_client_packets" lineno="40998">
+<interface name="corenet_send_isns_client_packets" lineno="39072">
<summary>
Send isns_client packets.
</summary>
@@ -34467,7 +34513,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_isns_client_packets" lineno="41017">
+<interface name="corenet_dontaudit_send_isns_client_packets" lineno="39091">
<summary>
Do not audit attempts to send isns_client packets.
</summary>
@@ -34478,7 +34524,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_isns_client_packets" lineno="41036">
+<interface name="corenet_receive_isns_client_packets" lineno="39110">
<summary>
Receive isns_client packets.
</summary>
@@ -34489,7 +34535,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="41055">
+<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="39129">
<summary>
Do not audit attempts to receive isns_client packets.
</summary>
@@ -34500,7 +34546,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_isns_client_packets" lineno="41074">
+<interface name="corenet_sendrecv_isns_client_packets" lineno="39148">
<summary>
Send and receive isns_client packets.
</summary>
@@ -34511,7 +34557,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="41090">
+<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="39164">
<summary>
Do not audit attempts to send and receive isns_client packets.
</summary>
@@ -34522,7 +34568,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_isns_client_packets" lineno="41105">
+<interface name="corenet_relabelto_isns_client_packets" lineno="39179">
<summary>
Relabel packets to isns_client the packet type.
</summary>
@@ -34532,7 +34578,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_isns_server_packets" lineno="41125">
+<interface name="corenet_send_isns_server_packets" lineno="39199">
<summary>
Send isns_server packets.
</summary>
@@ -34543,7 +34589,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_isns_server_packets" lineno="41144">
+<interface name="corenet_dontaudit_send_isns_server_packets" lineno="39218">
<summary>
Do not audit attempts to send isns_server packets.
</summary>
@@ -34554,7 +34600,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_isns_server_packets" lineno="41163">
+<interface name="corenet_receive_isns_server_packets" lineno="39237">
<summary>
Receive isns_server packets.
</summary>
@@ -34565,7 +34611,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="41182">
+<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="39256">
<summary>
Do not audit attempts to receive isns_server packets.
</summary>
@@ -34576,7 +34622,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_isns_server_packets" lineno="41201">
+<interface name="corenet_sendrecv_isns_server_packets" lineno="39275">
<summary>
Send and receive isns_server packets.
</summary>
@@ -34587,7 +34633,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="41217">
+<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="39291">
<summary>
Do not audit attempts to send and receive isns_server packets.
</summary>
@@ -34598,7 +34644,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_isns_server_packets" lineno="41232">
+<interface name="corenet_relabelto_isns_server_packets" lineno="39306">
<summary>
Relabel packets to isns_server the packet type.
</summary>
@@ -34608,7 +34654,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="41254">
+<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="39328">
<summary>
Send and receive TCP traffic on the jabber_client port.
</summary>
@@ -34619,7 +34665,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_jabber_client_port" lineno="41273">
+<interface name="corenet_udp_send_jabber_client_port" lineno="39343">
<summary>
Send UDP traffic on the jabber_client port.
</summary>
@@ -34630,7 +34676,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="41292">
+<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="39358">
<summary>
Do not audit attempts to send UDP traffic on the jabber_client port.
</summary>
@@ -34641,7 +34687,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_jabber_client_port" lineno="41311">
+<interface name="corenet_udp_receive_jabber_client_port" lineno="39373">
<summary>
Receive UDP traffic on the jabber_client port.
</summary>
@@ -34652,7 +34698,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="41330">
+<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="39388">
<summary>
Do not audit attempts to receive UDP traffic on the jabber_client port.
</summary>
@@ -34663,7 +34709,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="41349">
+<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="39403">
<summary>
Send and receive UDP traffic on the jabber_client port.
</summary>
@@ -34674,7 +34720,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="41366">
+<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="39419">
<summary>
Do not audit attempts to send and receive
UDP traffic on the jabber_client port.
@@ -34686,7 +34732,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_jabber_client_port" lineno="41382">
+<interface name="corenet_tcp_bind_jabber_client_port" lineno="39434">
<summary>
Bind TCP sockets to the jabber_client port.
</summary>
@@ -34697,7 +34743,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_jabber_client_port" lineno="41402">
+<interface name="corenet_udp_bind_jabber_client_port" lineno="39454">
<summary>
Bind UDP sockets to the jabber_client port.
</summary>
@@ -34708,7 +34754,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_jabber_client_port" lineno="41421">
+<interface name="corenet_tcp_connect_jabber_client_port" lineno="39473">
<summary>
Make a TCP connection to the jabber_client port.
</summary>
@@ -34718,7 +34764,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jabber_client_client_packets" lineno="41441">
+<interface name="corenet_send_jabber_client_client_packets" lineno="39493">
<summary>
Send jabber_client_client packets.
</summary>
@@ -34729,7 +34775,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="41460">
+<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="39512">
<summary>
Do not audit attempts to send jabber_client_client packets.
</summary>
@@ -34740,7 +34786,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jabber_client_client_packets" lineno="41479">
+<interface name="corenet_receive_jabber_client_client_packets" lineno="39531">
<summary>
Receive jabber_client_client packets.
</summary>
@@ -34751,7 +34797,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="41498">
+<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="39550">
<summary>
Do not audit attempts to receive jabber_client_client packets.
</summary>
@@ -34762,7 +34808,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="41517">
+<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="39569">
<summary>
Send and receive jabber_client_client packets.
</summary>
@@ -34773,7 +34819,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="41533">
+<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="39585">
<summary>
Do not audit attempts to send and receive jabber_client_client packets.
</summary>
@@ -34784,7 +34830,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jabber_client_client_packets" lineno="41548">
+<interface name="corenet_relabelto_jabber_client_client_packets" lineno="39600">
<summary>
Relabel packets to jabber_client_client the packet type.
</summary>
@@ -34794,7 +34840,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jabber_client_server_packets" lineno="41568">
+<interface name="corenet_send_jabber_client_server_packets" lineno="39620">
<summary>
Send jabber_client_server packets.
</summary>
@@ -34805,7 +34851,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="41587">
+<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="39639">
<summary>
Do not audit attempts to send jabber_client_server packets.
</summary>
@@ -34816,7 +34862,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jabber_client_server_packets" lineno="41606">
+<interface name="corenet_receive_jabber_client_server_packets" lineno="39658">
<summary>
Receive jabber_client_server packets.
</summary>
@@ -34827,7 +34873,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="41625">
+<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="39677">
<summary>
Do not audit attempts to receive jabber_client_server packets.
</summary>
@@ -34838,7 +34884,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="41644">
+<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="39696">
<summary>
Send and receive jabber_client_server packets.
</summary>
@@ -34849,7 +34895,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="41660">
+<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="39712">
<summary>
Do not audit attempts to send and receive jabber_client_server packets.
</summary>
@@ -34860,7 +34906,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jabber_client_server_packets" lineno="41675">
+<interface name="corenet_relabelto_jabber_client_server_packets" lineno="39727">
<summary>
Relabel packets to jabber_client_server the packet type.
</summary>
@@ -34870,7 +34916,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="41697">
+<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="39749">
<summary>
Send and receive TCP traffic on the jabber_interserver port.
</summary>
@@ -34881,7 +34927,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_jabber_interserver_port" lineno="41716">
+<interface name="corenet_udp_send_jabber_interserver_port" lineno="39764">
<summary>
Send UDP traffic on the jabber_interserver port.
</summary>
@@ -34892,7 +34938,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="41735">
+<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="39779">
<summary>
Do not audit attempts to send UDP traffic on the jabber_interserver port.
</summary>
@@ -34903,7 +34949,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_jabber_interserver_port" lineno="41754">
+<interface name="corenet_udp_receive_jabber_interserver_port" lineno="39794">
<summary>
Receive UDP traffic on the jabber_interserver port.
</summary>
@@ -34914,7 +34960,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="41773">
+<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="39809">
<summary>
Do not audit attempts to receive UDP traffic on the jabber_interserver port.
</summary>
@@ -34925,7 +34971,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="41792">
+<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="39824">
<summary>
Send and receive UDP traffic on the jabber_interserver port.
</summary>
@@ -34936,7 +34982,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="41809">
+<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="39840">
<summary>
Do not audit attempts to send and receive
UDP traffic on the jabber_interserver port.
@@ -34948,7 +34994,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="41825">
+<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="39855">
<summary>
Bind TCP sockets to the jabber_interserver port.
</summary>
@@ -34959,7 +35005,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_jabber_interserver_port" lineno="41845">
+<interface name="corenet_udp_bind_jabber_interserver_port" lineno="39875">
<summary>
Bind UDP sockets to the jabber_interserver port.
</summary>
@@ -34970,7 +35016,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="41864">
+<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="39894">
<summary>
Make a TCP connection to the jabber_interserver port.
</summary>
@@ -34980,7 +35026,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jabber_interserver_client_packets" lineno="41884">
+<interface name="corenet_send_jabber_interserver_client_packets" lineno="39914">
<summary>
Send jabber_interserver_client packets.
</summary>
@@ -34991,7 +35037,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="41903">
+<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="39933">
<summary>
Do not audit attempts to send jabber_interserver_client packets.
</summary>
@@ -35002,7 +35048,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jabber_interserver_client_packets" lineno="41922">
+<interface name="corenet_receive_jabber_interserver_client_packets" lineno="39952">
<summary>
Receive jabber_interserver_client packets.
</summary>
@@ -35013,7 +35059,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="41941">
+<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="39971">
<summary>
Do not audit attempts to receive jabber_interserver_client packets.
</summary>
@@ -35024,7 +35070,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="41960">
+<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="39990">
<summary>
Send and receive jabber_interserver_client packets.
</summary>
@@ -35035,7 +35081,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="41976">
+<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="40006">
<summary>
Do not audit attempts to send and receive jabber_interserver_client packets.
</summary>
@@ -35046,7 +35092,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="41991">
+<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="40021">
<summary>
Relabel packets to jabber_interserver_client the packet type.
</summary>
@@ -35056,7 +35102,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jabber_interserver_server_packets" lineno="42011">
+<interface name="corenet_send_jabber_interserver_server_packets" lineno="40041">
<summary>
Send jabber_interserver_server packets.
</summary>
@@ -35067,7 +35113,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="42030">
+<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="40060">
<summary>
Do not audit attempts to send jabber_interserver_server packets.
</summary>
@@ -35078,7 +35124,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jabber_interserver_server_packets" lineno="42049">
+<interface name="corenet_receive_jabber_interserver_server_packets" lineno="40079">
<summary>
Receive jabber_interserver_server packets.
</summary>
@@ -35089,7 +35135,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="42068">
+<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="40098">
<summary>
Do not audit attempts to receive jabber_interserver_server packets.
</summary>
@@ -35100,7 +35146,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="42087">
+<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="40117">
<summary>
Send and receive jabber_interserver_server packets.
</summary>
@@ -35111,7 +35157,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="42103">
+<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="40133">
<summary>
Do not audit attempts to send and receive jabber_interserver_server packets.
</summary>
@@ -35122,7 +35168,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="42118">
+<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="40148">
<summary>
Relabel packets to jabber_interserver_server the packet type.
</summary>
@@ -35132,7 +35178,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_jboss_iiop_port" lineno="42140">
+<interface name="corenet_tcp_sendrecv_jboss_iiop_port" lineno="40170">
<summary>
Send and receive TCP traffic on the jboss_iiop port.
</summary>
@@ -35143,7 +35189,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_jboss_iiop_port" lineno="42159">
+<interface name="corenet_udp_send_jboss_iiop_port" lineno="40185">
<summary>
Send UDP traffic on the jboss_iiop port.
</summary>
@@ -35154,7 +35200,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_jboss_iiop_port" lineno="42178">
+<interface name="corenet_dontaudit_udp_send_jboss_iiop_port" lineno="40200">
<summary>
Do not audit attempts to send UDP traffic on the jboss_iiop port.
</summary>
@@ -35165,7 +35211,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_jboss_iiop_port" lineno="42197">
+<interface name="corenet_udp_receive_jboss_iiop_port" lineno="40215">
<summary>
Receive UDP traffic on the jboss_iiop port.
</summary>
@@ -35176,7 +35222,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_jboss_iiop_port" lineno="42216">
+<interface name="corenet_dontaudit_udp_receive_jboss_iiop_port" lineno="40230">
<summary>
Do not audit attempts to receive UDP traffic on the jboss_iiop port.
</summary>
@@ -35187,7 +35233,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_jboss_iiop_port" lineno="42235">
+<interface name="corenet_udp_sendrecv_jboss_iiop_port" lineno="40245">
<summary>
Send and receive UDP traffic on the jboss_iiop port.
</summary>
@@ -35198,7 +35244,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_jboss_iiop_port" lineno="42252">
+<interface name="corenet_dontaudit_udp_sendrecv_jboss_iiop_port" lineno="40261">
<summary>
Do not audit attempts to send and receive
UDP traffic on the jboss_iiop port.
@@ -35210,7 +35256,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="42268">
+<interface name="corenet_tcp_bind_jboss_iiop_port" lineno="40276">
<summary>
Bind TCP sockets to the jboss_iiop port.
</summary>
@@ -35221,7 +35267,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_jboss_iiop_port" lineno="42288">
+<interface name="corenet_udp_bind_jboss_iiop_port" lineno="40296">
<summary>
Bind UDP sockets to the jboss_iiop port.
</summary>
@@ -35232,7 +35278,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="42307">
+<interface name="corenet_tcp_connect_jboss_iiop_port" lineno="40315">
<summary>
Make a TCP connection to the jboss_iiop port.
</summary>
@@ -35242,7 +35288,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jboss_iiop_client_packets" lineno="42327">
+<interface name="corenet_send_jboss_iiop_client_packets" lineno="40335">
<summary>
Send jboss_iiop_client packets.
</summary>
@@ -35253,7 +35299,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="42346">
+<interface name="corenet_dontaudit_send_jboss_iiop_client_packets" lineno="40354">
<summary>
Do not audit attempts to send jboss_iiop_client packets.
</summary>
@@ -35264,7 +35310,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jboss_iiop_client_packets" lineno="42365">
+<interface name="corenet_receive_jboss_iiop_client_packets" lineno="40373">
<summary>
Receive jboss_iiop_client packets.
</summary>
@@ -35275,7 +35321,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="42384">
+<interface name="corenet_dontaudit_receive_jboss_iiop_client_packets" lineno="40392">
<summary>
Do not audit attempts to receive jboss_iiop_client packets.
</summary>
@@ -35286,7 +35332,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="42403">
+<interface name="corenet_sendrecv_jboss_iiop_client_packets" lineno="40411">
<summary>
Send and receive jboss_iiop_client packets.
</summary>
@@ -35297,7 +35343,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="42419">
+<interface name="corenet_dontaudit_sendrecv_jboss_iiop_client_packets" lineno="40427">
<summary>
Do not audit attempts to send and receive jboss_iiop_client packets.
</summary>
@@ -35308,7 +35354,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="42434">
+<interface name="corenet_relabelto_jboss_iiop_client_packets" lineno="40442">
<summary>
Relabel packets to jboss_iiop_client the packet type.
</summary>
@@ -35318,7 +35364,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_jboss_iiop_server_packets" lineno="42454">
+<interface name="corenet_send_jboss_iiop_server_packets" lineno="40462">
<summary>
Send jboss_iiop_server packets.
</summary>
@@ -35329,7 +35375,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="42473">
+<interface name="corenet_dontaudit_send_jboss_iiop_server_packets" lineno="40481">
<summary>
Do not audit attempts to send jboss_iiop_server packets.
</summary>
@@ -35340,7 +35386,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_jboss_iiop_server_packets" lineno="42492">
+<interface name="corenet_receive_jboss_iiop_server_packets" lineno="40500">
<summary>
Receive jboss_iiop_server packets.
</summary>
@@ -35351,7 +35397,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="42511">
+<interface name="corenet_dontaudit_receive_jboss_iiop_server_packets" lineno="40519">
<summary>
Do not audit attempts to receive jboss_iiop_server packets.
</summary>
@@ -35362,7 +35408,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="42530">
+<interface name="corenet_sendrecv_jboss_iiop_server_packets" lineno="40538">
<summary>
Send and receive jboss_iiop_server packets.
</summary>
@@ -35373,7 +35419,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="42546">
+<interface name="corenet_dontaudit_sendrecv_jboss_iiop_server_packets" lineno="40554">
<summary>
Do not audit attempts to send and receive jboss_iiop_server packets.
</summary>
@@ -35384,7 +35430,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="42561">
+<interface name="corenet_relabelto_jboss_iiop_server_packets" lineno="40569">
<summary>
Relabel packets to jboss_iiop_server the packet type.
</summary>
@@ -35394,7 +35440,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="42583">
+<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="40591">
<summary>
Send and receive TCP traffic on the kerberos port.
</summary>
@@ -35405,7 +35451,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_kerberos_port" lineno="42602">
+<interface name="corenet_udp_send_kerberos_port" lineno="40606">
<summary>
Send UDP traffic on the kerberos port.
</summary>
@@ -35416,7 +35462,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="42621">
+<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="40621">
<summary>
Do not audit attempts to send UDP traffic on the kerberos port.
</summary>
@@ -35427,7 +35473,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_kerberos_port" lineno="42640">
+<interface name="corenet_udp_receive_kerberos_port" lineno="40636">
<summary>
Receive UDP traffic on the kerberos port.
</summary>
@@ -35438,7 +35484,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="42659">
+<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="40651">
<summary>
Do not audit attempts to receive UDP traffic on the kerberos port.
</summary>
@@ -35449,7 +35495,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_kerberos_port" lineno="42678">
+<interface name="corenet_udp_sendrecv_kerberos_port" lineno="40666">
<summary>
Send and receive UDP traffic on the kerberos port.
</summary>
@@ -35460,7 +35506,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="42695">
+<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="40682">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kerberos port.
@@ -35472,7 +35518,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_kerberos_port" lineno="42711">
+<interface name="corenet_tcp_bind_kerberos_port" lineno="40697">
<summary>
Bind TCP sockets to the kerberos port.
</summary>
@@ -35483,7 +35529,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kerberos_port" lineno="42731">
+<interface name="corenet_udp_bind_kerberos_port" lineno="40717">
<summary>
Bind UDP sockets to the kerberos port.
</summary>
@@ -35494,7 +35540,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kerberos_port" lineno="42750">
+<interface name="corenet_tcp_connect_kerberos_port" lineno="40736">
<summary>
Make a TCP connection to the kerberos port.
</summary>
@@ -35504,7 +35550,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_client_packets" lineno="42770">
+<interface name="corenet_send_kerberos_client_packets" lineno="40756">
<summary>
Send kerberos_client packets.
</summary>
@@ -35515,7 +35561,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="42789">
+<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="40775">
<summary>
Do not audit attempts to send kerberos_client packets.
</summary>
@@ -35526,7 +35572,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_client_packets" lineno="42808">
+<interface name="corenet_receive_kerberos_client_packets" lineno="40794">
<summary>
Receive kerberos_client packets.
</summary>
@@ -35537,7 +35583,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="42827">
+<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="40813">
<summary>
Do not audit attempts to receive kerberos_client packets.
</summary>
@@ -35548,7 +35594,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_client_packets" lineno="42846">
+<interface name="corenet_sendrecv_kerberos_client_packets" lineno="40832">
<summary>
Send and receive kerberos_client packets.
</summary>
@@ -35559,7 +35605,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="42862">
+<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="40848">
<summary>
Do not audit attempts to send and receive kerberos_client packets.
</summary>
@@ -35570,7 +35616,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_client_packets" lineno="42877">
+<interface name="corenet_relabelto_kerberos_client_packets" lineno="40863">
<summary>
Relabel packets to kerberos_client the packet type.
</summary>
@@ -35580,7 +35626,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_server_packets" lineno="42897">
+<interface name="corenet_send_kerberos_server_packets" lineno="40883">
<summary>
Send kerberos_server packets.
</summary>
@@ -35591,7 +35637,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="42916">
+<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="40902">
<summary>
Do not audit attempts to send kerberos_server packets.
</summary>
@@ -35602,7 +35648,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_server_packets" lineno="42935">
+<interface name="corenet_receive_kerberos_server_packets" lineno="40921">
<summary>
Receive kerberos_server packets.
</summary>
@@ -35613,7 +35659,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="42954">
+<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="40940">
<summary>
Do not audit attempts to receive kerberos_server packets.
</summary>
@@ -35624,7 +35670,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_server_packets" lineno="42973">
+<interface name="corenet_sendrecv_kerberos_server_packets" lineno="40959">
<summary>
Send and receive kerberos_server packets.
</summary>
@@ -35635,7 +35681,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="42989">
+<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="40975">
<summary>
Do not audit attempts to send and receive kerberos_server packets.
</summary>
@@ -35646,7 +35692,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_server_packets" lineno="43004">
+<interface name="corenet_relabelto_kerberos_server_packets" lineno="40990">
<summary>
Relabel packets to kerberos_server the packet type.
</summary>
@@ -35656,7 +35702,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="43026">
+<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="41012">
<summary>
Send and receive TCP traffic on the kerberos_admin port.
</summary>
@@ -35667,7 +35713,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_kerberos_admin_port" lineno="43045">
+<interface name="corenet_udp_send_kerberos_admin_port" lineno="41027">
<summary>
Send UDP traffic on the kerberos_admin port.
</summary>
@@ -35678,7 +35724,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="43064">
+<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="41042">
<summary>
Do not audit attempts to send UDP traffic on the kerberos_admin port.
</summary>
@@ -35689,7 +35735,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_kerberos_admin_port" lineno="43083">
+<interface name="corenet_udp_receive_kerberos_admin_port" lineno="41057">
<summary>
Receive UDP traffic on the kerberos_admin port.
</summary>
@@ -35700,7 +35746,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="43102">
+<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="41072">
<summary>
Do not audit attempts to receive UDP traffic on the kerberos_admin port.
</summary>
@@ -35711,7 +35757,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="43121">
+<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="41087">
<summary>
Send and receive UDP traffic on the kerberos_admin port.
</summary>
@@ -35722,7 +35768,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="43138">
+<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="41103">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kerberos_admin port.
@@ -35734,7 +35780,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="43154">
+<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="41118">
<summary>
Bind TCP sockets to the kerberos_admin port.
</summary>
@@ -35745,7 +35791,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kerberos_admin_port" lineno="43174">
+<interface name="corenet_udp_bind_kerberos_admin_port" lineno="41138">
<summary>
Bind UDP sockets to the kerberos_admin port.
</summary>
@@ -35756,7 +35802,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="43193">
+<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="41157">
<summary>
Make a TCP connection to the kerberos_admin port.
</summary>
@@ -35766,7 +35812,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_admin_client_packets" lineno="43213">
+<interface name="corenet_send_kerberos_admin_client_packets" lineno="41177">
<summary>
Send kerberos_admin_client packets.
</summary>
@@ -35777,7 +35823,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="43232">
+<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="41196">
<summary>
Do not audit attempts to send kerberos_admin_client packets.
</summary>
@@ -35788,7 +35834,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_admin_client_packets" lineno="43251">
+<interface name="corenet_receive_kerberos_admin_client_packets" lineno="41215">
<summary>
Receive kerberos_admin_client packets.
</summary>
@@ -35799,7 +35845,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="43270">
+<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="41234">
<summary>
Do not audit attempts to receive kerberos_admin_client packets.
</summary>
@@ -35810,7 +35856,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="43289">
+<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="41253">
<summary>
Send and receive kerberos_admin_client packets.
</summary>
@@ -35821,7 +35867,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="43305">
+<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="41269">
<summary>
Do not audit attempts to send and receive kerberos_admin_client packets.
</summary>
@@ -35832,7 +35878,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="43320">
+<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="41284">
<summary>
Relabel packets to kerberos_admin_client the packet type.
</summary>
@@ -35842,7 +35888,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_admin_server_packets" lineno="43340">
+<interface name="corenet_send_kerberos_admin_server_packets" lineno="41304">
<summary>
Send kerberos_admin_server packets.
</summary>
@@ -35853,7 +35899,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="43359">
+<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="41323">
<summary>
Do not audit attempts to send kerberos_admin_server packets.
</summary>
@@ -35864,7 +35910,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_admin_server_packets" lineno="43378">
+<interface name="corenet_receive_kerberos_admin_server_packets" lineno="41342">
<summary>
Receive kerberos_admin_server packets.
</summary>
@@ -35875,7 +35921,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="43397">
+<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="41361">
<summary>
Do not audit attempts to receive kerberos_admin_server packets.
</summary>
@@ -35886,7 +35932,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="43416">
+<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="41380">
<summary>
Send and receive kerberos_admin_server packets.
</summary>
@@ -35897,7 +35943,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="43432">
+<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="41396">
<summary>
Do not audit attempts to send and receive kerberos_admin_server packets.
</summary>
@@ -35908,7 +35954,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="43447">
+<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="41411">
<summary>
Relabel packets to kerberos_admin_server the packet type.
</summary>
@@ -35918,7 +35964,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="43469">
+<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="41433">
<summary>
Send and receive TCP traffic on the kerberos_master port.
</summary>
@@ -35929,7 +35975,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_kerberos_master_port" lineno="43488">
+<interface name="corenet_udp_send_kerberos_master_port" lineno="41448">
<summary>
Send UDP traffic on the kerberos_master port.
</summary>
@@ -35940,7 +35986,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="43507">
+<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="41463">
<summary>
Do not audit attempts to send UDP traffic on the kerberos_master port.
</summary>
@@ -35951,7 +35997,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_kerberos_master_port" lineno="43526">
+<interface name="corenet_udp_receive_kerberos_master_port" lineno="41478">
<summary>
Receive UDP traffic on the kerberos_master port.
</summary>
@@ -35962,7 +36008,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="43545">
+<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="41493">
<summary>
Do not audit attempts to receive UDP traffic on the kerberos_master port.
</summary>
@@ -35973,7 +36019,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="43564">
+<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="41508">
<summary>
Send and receive UDP traffic on the kerberos_master port.
</summary>
@@ -35984,7 +36030,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="43581">
+<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="41524">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kerberos_master port.
@@ -35996,7 +36042,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_kerberos_master_port" lineno="43597">
+<interface name="corenet_tcp_bind_kerberos_master_port" lineno="41539">
<summary>
Bind TCP sockets to the kerberos_master port.
</summary>
@@ -36007,7 +36053,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kerberos_master_port" lineno="43617">
+<interface name="corenet_udp_bind_kerberos_master_port" lineno="41559">
<summary>
Bind UDP sockets to the kerberos_master port.
</summary>
@@ -36018,7 +36064,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kerberos_master_port" lineno="43636">
+<interface name="corenet_tcp_connect_kerberos_master_port" lineno="41578">
<summary>
Make a TCP connection to the kerberos_master port.
</summary>
@@ -36028,7 +36074,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_master_client_packets" lineno="43656">
+<interface name="corenet_send_kerberos_master_client_packets" lineno="41598">
<summary>
Send kerberos_master_client packets.
</summary>
@@ -36039,7 +36085,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="43675">
+<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="41617">
<summary>
Do not audit attempts to send kerberos_master_client packets.
</summary>
@@ -36050,7 +36096,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_master_client_packets" lineno="43694">
+<interface name="corenet_receive_kerberos_master_client_packets" lineno="41636">
<summary>
Receive kerberos_master_client packets.
</summary>
@@ -36061,7 +36107,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="43713">
+<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="41655">
<summary>
Do not audit attempts to receive kerberos_master_client packets.
</summary>
@@ -36072,7 +36118,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="43732">
+<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="41674">
<summary>
Send and receive kerberos_master_client packets.
</summary>
@@ -36083,7 +36129,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="43748">
+<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="41690">
<summary>
Do not audit attempts to send and receive kerberos_master_client packets.
</summary>
@@ -36094,7 +36140,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="43763">
+<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="41705">
<summary>
Relabel packets to kerberos_master_client the packet type.
</summary>
@@ -36104,7 +36150,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kerberos_master_server_packets" lineno="43783">
+<interface name="corenet_send_kerberos_master_server_packets" lineno="41725">
<summary>
Send kerberos_master_server packets.
</summary>
@@ -36115,7 +36161,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="43802">
+<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="41744">
<summary>
Do not audit attempts to send kerberos_master_server packets.
</summary>
@@ -36126,7 +36172,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kerberos_master_server_packets" lineno="43821">
+<interface name="corenet_receive_kerberos_master_server_packets" lineno="41763">
<summary>
Receive kerberos_master_server packets.
</summary>
@@ -36137,7 +36183,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="43840">
+<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="41782">
<summary>
Do not audit attempts to receive kerberos_master_server packets.
</summary>
@@ -36148,7 +36194,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="43859">
+<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="41801">
<summary>
Send and receive kerberos_master_server packets.
</summary>
@@ -36159,7 +36205,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="43875">
+<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="41817">
<summary>
Do not audit attempts to send and receive kerberos_master_server packets.
</summary>
@@ -36170,7 +36216,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="43890">
+<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="41832">
<summary>
Relabel packets to kerberos_master_server the packet type.
</summary>
@@ -36180,7 +36226,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kismet_port" lineno="43912">
+<interface name="corenet_tcp_sendrecv_kismet_port" lineno="41854">
<summary>
Send and receive TCP traffic on the kismet port.
</summary>
@@ -36191,7 +36237,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_kismet_port" lineno="43931">
+<interface name="corenet_udp_send_kismet_port" lineno="41869">
<summary>
Send UDP traffic on the kismet port.
</summary>
@@ -36202,7 +36248,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="43950">
+<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="41884">
<summary>
Do not audit attempts to send UDP traffic on the kismet port.
</summary>
@@ -36213,7 +36259,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_kismet_port" lineno="43969">
+<interface name="corenet_udp_receive_kismet_port" lineno="41899">
<summary>
Receive UDP traffic on the kismet port.
</summary>
@@ -36224,7 +36270,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="43988">
+<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="41914">
<summary>
Do not audit attempts to receive UDP traffic on the kismet port.
</summary>
@@ -36235,7 +36281,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_kismet_port" lineno="44007">
+<interface name="corenet_udp_sendrecv_kismet_port" lineno="41929">
<summary>
Send and receive UDP traffic on the kismet port.
</summary>
@@ -36246,7 +36292,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="44024">
+<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="41945">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kismet port.
@@ -36258,7 +36304,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_kismet_port" lineno="44040">
+<interface name="corenet_tcp_bind_kismet_port" lineno="41960">
<summary>
Bind TCP sockets to the kismet port.
</summary>
@@ -36269,7 +36315,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kismet_port" lineno="44060">
+<interface name="corenet_udp_bind_kismet_port" lineno="41980">
<summary>
Bind UDP sockets to the kismet port.
</summary>
@@ -36280,7 +36326,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kismet_port" lineno="44079">
+<interface name="corenet_tcp_connect_kismet_port" lineno="41999">
<summary>
Make a TCP connection to the kismet port.
</summary>
@@ -36290,7 +36336,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kismet_client_packets" lineno="44099">
+<interface name="corenet_send_kismet_client_packets" lineno="42019">
<summary>
Send kismet_client packets.
</summary>
@@ -36301,7 +36347,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="44118">
+<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="42038">
<summary>
Do not audit attempts to send kismet_client packets.
</summary>
@@ -36312,7 +36358,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kismet_client_packets" lineno="44137">
+<interface name="corenet_receive_kismet_client_packets" lineno="42057">
<summary>
Receive kismet_client packets.
</summary>
@@ -36323,7 +36369,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="44156">
+<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="42076">
<summary>
Do not audit attempts to receive kismet_client packets.
</summary>
@@ -36334,7 +36380,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kismet_client_packets" lineno="44175">
+<interface name="corenet_sendrecv_kismet_client_packets" lineno="42095">
<summary>
Send and receive kismet_client packets.
</summary>
@@ -36345,7 +36391,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="44191">
+<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="42111">
<summary>
Do not audit attempts to send and receive kismet_client packets.
</summary>
@@ -36356,7 +36402,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kismet_client_packets" lineno="44206">
+<interface name="corenet_relabelto_kismet_client_packets" lineno="42126">
<summary>
Relabel packets to kismet_client the packet type.
</summary>
@@ -36366,7 +36412,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kismet_server_packets" lineno="44226">
+<interface name="corenet_send_kismet_server_packets" lineno="42146">
<summary>
Send kismet_server packets.
</summary>
@@ -36377,7 +36423,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="44245">
+<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="42165">
<summary>
Do not audit attempts to send kismet_server packets.
</summary>
@@ -36388,7 +36434,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kismet_server_packets" lineno="44264">
+<interface name="corenet_receive_kismet_server_packets" lineno="42184">
<summary>
Receive kismet_server packets.
</summary>
@@ -36399,7 +36445,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="44283">
+<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="42203">
<summary>
Do not audit attempts to receive kismet_server packets.
</summary>
@@ -36410,7 +36456,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kismet_server_packets" lineno="44302">
+<interface name="corenet_sendrecv_kismet_server_packets" lineno="42222">
<summary>
Send and receive kismet_server packets.
</summary>
@@ -36421,7 +36467,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="44318">
+<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="42238">
<summary>
Do not audit attempts to send and receive kismet_server packets.
</summary>
@@ -36432,7 +36478,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kismet_server_packets" lineno="44333">
+<interface name="corenet_relabelto_kismet_server_packets" lineno="42253">
<summary>
Relabel packets to kismet_server the packet type.
</summary>
@@ -36442,7 +36488,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kdeconnect_port" lineno="44355">
+<interface name="corenet_tcp_sendrecv_kdeconnect_port" lineno="42275">
<summary>
Send and receive TCP traffic on the kdeconnect port.
</summary>
@@ -36453,7 +36499,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_kdeconnect_port" lineno="44374">
+<interface name="corenet_udp_send_kdeconnect_port" lineno="42290">
<summary>
Send UDP traffic on the kdeconnect port.
</summary>
@@ -36464,7 +36510,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_kdeconnect_port" lineno="44393">
+<interface name="corenet_dontaudit_udp_send_kdeconnect_port" lineno="42305">
<summary>
Do not audit attempts to send UDP traffic on the kdeconnect port.
</summary>
@@ -36475,7 +36521,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_kdeconnect_port" lineno="44412">
+<interface name="corenet_udp_receive_kdeconnect_port" lineno="42320">
<summary>
Receive UDP traffic on the kdeconnect port.
</summary>
@@ -36486,7 +36532,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_kdeconnect_port" lineno="44431">
+<interface name="corenet_dontaudit_udp_receive_kdeconnect_port" lineno="42335">
<summary>
Do not audit attempts to receive UDP traffic on the kdeconnect port.
</summary>
@@ -36497,7 +36543,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_kdeconnect_port" lineno="44450">
+<interface name="corenet_udp_sendrecv_kdeconnect_port" lineno="42350">
<summary>
Send and receive UDP traffic on the kdeconnect port.
</summary>
@@ -36508,7 +36554,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kdeconnect_port" lineno="44467">
+<interface name="corenet_dontaudit_udp_sendrecv_kdeconnect_port" lineno="42366">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kdeconnect port.
@@ -36520,7 +36566,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_kdeconnect_port" lineno="44483">
+<interface name="corenet_tcp_bind_kdeconnect_port" lineno="42381">
<summary>
Bind TCP sockets to the kdeconnect port.
</summary>
@@ -36531,7 +36577,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kdeconnect_port" lineno="44503">
+<interface name="corenet_udp_bind_kdeconnect_port" lineno="42401">
<summary>
Bind UDP sockets to the kdeconnect port.
</summary>
@@ -36542,7 +36588,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kdeconnect_port" lineno="44522">
+<interface name="corenet_tcp_connect_kdeconnect_port" lineno="42420">
<summary>
Make a TCP connection to the kdeconnect port.
</summary>
@@ -36552,7 +36598,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kdeconnect_client_packets" lineno="44542">
+<interface name="corenet_send_kdeconnect_client_packets" lineno="42440">
<summary>
Send kdeconnect_client packets.
</summary>
@@ -36563,7 +36609,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="44561">
+<interface name="corenet_dontaudit_send_kdeconnect_client_packets" lineno="42459">
<summary>
Do not audit attempts to send kdeconnect_client packets.
</summary>
@@ -36574,7 +36620,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kdeconnect_client_packets" lineno="44580">
+<interface name="corenet_receive_kdeconnect_client_packets" lineno="42478">
<summary>
Receive kdeconnect_client packets.
</summary>
@@ -36585,7 +36631,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="44599">
+<interface name="corenet_dontaudit_receive_kdeconnect_client_packets" lineno="42497">
<summary>
Do not audit attempts to receive kdeconnect_client packets.
</summary>
@@ -36596,7 +36642,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="44618">
+<interface name="corenet_sendrecv_kdeconnect_client_packets" lineno="42516">
<summary>
Send and receive kdeconnect_client packets.
</summary>
@@ -36607,7 +36653,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="44634">
+<interface name="corenet_dontaudit_sendrecv_kdeconnect_client_packets" lineno="42532">
<summary>
Do not audit attempts to send and receive kdeconnect_client packets.
</summary>
@@ -36618,7 +36664,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="44649">
+<interface name="corenet_relabelto_kdeconnect_client_packets" lineno="42547">
<summary>
Relabel packets to kdeconnect_client the packet type.
</summary>
@@ -36628,7 +36674,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kdeconnect_server_packets" lineno="44669">
+<interface name="corenet_send_kdeconnect_server_packets" lineno="42567">
<summary>
Send kdeconnect_server packets.
</summary>
@@ -36639,7 +36685,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="44688">
+<interface name="corenet_dontaudit_send_kdeconnect_server_packets" lineno="42586">
<summary>
Do not audit attempts to send kdeconnect_server packets.
</summary>
@@ -36650,7 +36696,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kdeconnect_server_packets" lineno="44707">
+<interface name="corenet_receive_kdeconnect_server_packets" lineno="42605">
<summary>
Receive kdeconnect_server packets.
</summary>
@@ -36661,7 +36707,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="44726">
+<interface name="corenet_dontaudit_receive_kdeconnect_server_packets" lineno="42624">
<summary>
Do not audit attempts to receive kdeconnect_server packets.
</summary>
@@ -36672,7 +36718,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="44745">
+<interface name="corenet_sendrecv_kdeconnect_server_packets" lineno="42643">
<summary>
Send and receive kdeconnect_server packets.
</summary>
@@ -36683,7 +36729,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="44761">
+<interface name="corenet_dontaudit_sendrecv_kdeconnect_server_packets" lineno="42659">
<summary>
Do not audit attempts to send and receive kdeconnect_server packets.
</summary>
@@ -36694,7 +36740,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="44776">
+<interface name="corenet_relabelto_kdeconnect_server_packets" lineno="42674">
<summary>
Relabel packets to kdeconnect_server the packet type.
</summary>
@@ -36704,7 +36750,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_kprop_port" lineno="44798">
+<interface name="corenet_tcp_sendrecv_kprop_port" lineno="42696">
<summary>
Send and receive TCP traffic on the kprop port.
</summary>
@@ -36715,7 +36761,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_kprop_port" lineno="44817">
+<interface name="corenet_udp_send_kprop_port" lineno="42711">
<summary>
Send UDP traffic on the kprop port.
</summary>
@@ -36726,7 +36772,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="44836">
+<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="42726">
<summary>
Do not audit attempts to send UDP traffic on the kprop port.
</summary>
@@ -36737,7 +36783,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_kprop_port" lineno="44855">
+<interface name="corenet_udp_receive_kprop_port" lineno="42741">
<summary>
Receive UDP traffic on the kprop port.
</summary>
@@ -36748,7 +36794,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="44874">
+<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="42756">
<summary>
Do not audit attempts to receive UDP traffic on the kprop port.
</summary>
@@ -36759,7 +36805,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_kprop_port" lineno="44893">
+<interface name="corenet_udp_sendrecv_kprop_port" lineno="42771">
<summary>
Send and receive UDP traffic on the kprop port.
</summary>
@@ -36770,7 +36816,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="44910">
+<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="42787">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kprop port.
@@ -36782,7 +36828,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_kprop_port" lineno="44926">
+<interface name="corenet_tcp_bind_kprop_port" lineno="42802">
<summary>
Bind TCP sockets to the kprop port.
</summary>
@@ -36793,7 +36839,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_kprop_port" lineno="44946">
+<interface name="corenet_udp_bind_kprop_port" lineno="42822">
<summary>
Bind UDP sockets to the kprop port.
</summary>
@@ -36804,7 +36850,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_kprop_port" lineno="44965">
+<interface name="corenet_tcp_connect_kprop_port" lineno="42841">
<summary>
Make a TCP connection to the kprop port.
</summary>
@@ -36814,7 +36860,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kprop_client_packets" lineno="44985">
+<interface name="corenet_send_kprop_client_packets" lineno="42861">
<summary>
Send kprop_client packets.
</summary>
@@ -36825,7 +36871,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="45004">
+<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="42880">
<summary>
Do not audit attempts to send kprop_client packets.
</summary>
@@ -36836,7 +36882,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kprop_client_packets" lineno="45023">
+<interface name="corenet_receive_kprop_client_packets" lineno="42899">
<summary>
Receive kprop_client packets.
</summary>
@@ -36847,7 +36893,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="45042">
+<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="42918">
<summary>
Do not audit attempts to receive kprop_client packets.
</summary>
@@ -36858,7 +36904,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kprop_client_packets" lineno="45061">
+<interface name="corenet_sendrecv_kprop_client_packets" lineno="42937">
<summary>
Send and receive kprop_client packets.
</summary>
@@ -36869,7 +36915,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="45077">
+<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="42953">
<summary>
Do not audit attempts to send and receive kprop_client packets.
</summary>
@@ -36880,7 +36926,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kprop_client_packets" lineno="45092">
+<interface name="corenet_relabelto_kprop_client_packets" lineno="42968">
<summary>
Relabel packets to kprop_client the packet type.
</summary>
@@ -36890,7 +36936,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_kprop_server_packets" lineno="45112">
+<interface name="corenet_send_kprop_server_packets" lineno="42988">
<summary>
Send kprop_server packets.
</summary>
@@ -36901,7 +36947,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="45131">
+<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="43007">
<summary>
Do not audit attempts to send kprop_server packets.
</summary>
@@ -36912,7 +36958,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_kprop_server_packets" lineno="45150">
+<interface name="corenet_receive_kprop_server_packets" lineno="43026">
<summary>
Receive kprop_server packets.
</summary>
@@ -36923,7 +36969,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="45169">
+<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="43045">
<summary>
Do not audit attempts to receive kprop_server packets.
</summary>
@@ -36934,7 +36980,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_kprop_server_packets" lineno="45188">
+<interface name="corenet_sendrecv_kprop_server_packets" lineno="43064">
<summary>
Send and receive kprop_server packets.
</summary>
@@ -36945,7 +36991,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="45204">
+<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="43080">
<summary>
Do not audit attempts to send and receive kprop_server packets.
</summary>
@@ -36956,7 +37002,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_kprop_server_packets" lineno="45219">
+<interface name="corenet_relabelto_kprop_server_packets" lineno="43095">
<summary>
Relabel packets to kprop_server the packet type.
</summary>
@@ -36966,7 +37012,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="45241">
+<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="43117">
<summary>
Send and receive TCP traffic on the ktalkd port.
</summary>
@@ -36977,7 +37023,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ktalkd_port" lineno="45260">
+<interface name="corenet_udp_send_ktalkd_port" lineno="43132">
<summary>
Send UDP traffic on the ktalkd port.
</summary>
@@ -36988,7 +37034,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="45279">
+<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="43147">
<summary>
Do not audit attempts to send UDP traffic on the ktalkd port.
</summary>
@@ -36999,7 +37045,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ktalkd_port" lineno="45298">
+<interface name="corenet_udp_receive_ktalkd_port" lineno="43162">
<summary>
Receive UDP traffic on the ktalkd port.
</summary>
@@ -37010,7 +37056,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="45317">
+<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="43177">
<summary>
Do not audit attempts to receive UDP traffic on the ktalkd port.
</summary>
@@ -37021,7 +37067,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="45336">
+<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="43192">
<summary>
Send and receive UDP traffic on the ktalkd port.
</summary>
@@ -37032,7 +37078,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="45353">
+<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="43208">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ktalkd port.
@@ -37044,7 +37090,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ktalkd_port" lineno="45369">
+<interface name="corenet_tcp_bind_ktalkd_port" lineno="43223">
<summary>
Bind TCP sockets to the ktalkd port.
</summary>
@@ -37055,7 +37101,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ktalkd_port" lineno="45389">
+<interface name="corenet_udp_bind_ktalkd_port" lineno="43243">
<summary>
Bind UDP sockets to the ktalkd port.
</summary>
@@ -37066,7 +37112,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ktalkd_port" lineno="45408">
+<interface name="corenet_tcp_connect_ktalkd_port" lineno="43262">
<summary>
Make a TCP connection to the ktalkd port.
</summary>
@@ -37076,7 +37122,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ktalkd_client_packets" lineno="45428">
+<interface name="corenet_send_ktalkd_client_packets" lineno="43282">
<summary>
Send ktalkd_client packets.
</summary>
@@ -37087,7 +37133,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="45447">
+<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="43301">
<summary>
Do not audit attempts to send ktalkd_client packets.
</summary>
@@ -37098,7 +37144,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ktalkd_client_packets" lineno="45466">
+<interface name="corenet_receive_ktalkd_client_packets" lineno="43320">
<summary>
Receive ktalkd_client packets.
</summary>
@@ -37109,7 +37155,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="45485">
+<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="43339">
<summary>
Do not audit attempts to receive ktalkd_client packets.
</summary>
@@ -37120,7 +37166,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="45504">
+<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="43358">
<summary>
Send and receive ktalkd_client packets.
</summary>
@@ -37131,7 +37177,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="45520">
+<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="43374">
<summary>
Do not audit attempts to send and receive ktalkd_client packets.
</summary>
@@ -37142,7 +37188,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ktalkd_client_packets" lineno="45535">
+<interface name="corenet_relabelto_ktalkd_client_packets" lineno="43389">
<summary>
Relabel packets to ktalkd_client the packet type.
</summary>
@@ -37152,7 +37198,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ktalkd_server_packets" lineno="45555">
+<interface name="corenet_send_ktalkd_server_packets" lineno="43409">
<summary>
Send ktalkd_server packets.
</summary>
@@ -37163,7 +37209,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="45574">
+<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="43428">
<summary>
Do not audit attempts to send ktalkd_server packets.
</summary>
@@ -37174,7 +37220,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ktalkd_server_packets" lineno="45593">
+<interface name="corenet_receive_ktalkd_server_packets" lineno="43447">
<summary>
Receive ktalkd_server packets.
</summary>
@@ -37185,7 +37231,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="45612">
+<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="43466">
<summary>
Do not audit attempts to receive ktalkd_server packets.
</summary>
@@ -37196,7 +37242,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="45631">
+<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="43485">
<summary>
Send and receive ktalkd_server packets.
</summary>
@@ -37207,7 +37253,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="45647">
+<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="43501">
<summary>
Do not audit attempts to send and receive ktalkd_server packets.
</summary>
@@ -37218,7 +37264,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ktalkd_server_packets" lineno="45662">
+<interface name="corenet_relabelto_ktalkd_server_packets" lineno="43516">
<summary>
Relabel packets to ktalkd_server the packet type.
</summary>
@@ -37228,7 +37274,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="45684">
+<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="43538">
<summary>
Send and receive TCP traffic on the l2tp port.
</summary>
@@ -37239,7 +37285,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_l2tp_port" lineno="45703">
+<interface name="corenet_udp_send_l2tp_port" lineno="43553">
<summary>
Send UDP traffic on the l2tp port.
</summary>
@@ -37250,7 +37296,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="45722">
+<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="43568">
<summary>
Do not audit attempts to send UDP traffic on the l2tp port.
</summary>
@@ -37261,7 +37307,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_l2tp_port" lineno="45741">
+<interface name="corenet_udp_receive_l2tp_port" lineno="43583">
<summary>
Receive UDP traffic on the l2tp port.
</summary>
@@ -37272,7 +37318,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="45760">
+<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="43598">
<summary>
Do not audit attempts to receive UDP traffic on the l2tp port.
</summary>
@@ -37283,7 +37329,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_l2tp_port" lineno="45779">
+<interface name="corenet_udp_sendrecv_l2tp_port" lineno="43613">
<summary>
Send and receive UDP traffic on the l2tp port.
</summary>
@@ -37294,7 +37340,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="45796">
+<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="43629">
<summary>
Do not audit attempts to send and receive
UDP traffic on the l2tp port.
@@ -37306,7 +37352,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_l2tp_port" lineno="45812">
+<interface name="corenet_tcp_bind_l2tp_port" lineno="43644">
<summary>
Bind TCP sockets to the l2tp port.
</summary>
@@ -37317,7 +37363,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_l2tp_port" lineno="45832">
+<interface name="corenet_udp_bind_l2tp_port" lineno="43664">
<summary>
Bind UDP sockets to the l2tp port.
</summary>
@@ -37328,7 +37374,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_l2tp_port" lineno="45851">
+<interface name="corenet_tcp_connect_l2tp_port" lineno="43683">
<summary>
Make a TCP connection to the l2tp port.
</summary>
@@ -37338,7 +37384,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_l2tp_client_packets" lineno="45871">
+<interface name="corenet_send_l2tp_client_packets" lineno="43703">
<summary>
Send l2tp_client packets.
</summary>
@@ -37349,7 +37395,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="45890">
+<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="43722">
<summary>
Do not audit attempts to send l2tp_client packets.
</summary>
@@ -37360,7 +37406,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_l2tp_client_packets" lineno="45909">
+<interface name="corenet_receive_l2tp_client_packets" lineno="43741">
<summary>
Receive l2tp_client packets.
</summary>
@@ -37371,7 +37417,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="45928">
+<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="43760">
<summary>
Do not audit attempts to receive l2tp_client packets.
</summary>
@@ -37382,7 +37428,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_l2tp_client_packets" lineno="45947">
+<interface name="corenet_sendrecv_l2tp_client_packets" lineno="43779">
<summary>
Send and receive l2tp_client packets.
</summary>
@@ -37393,7 +37439,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="45963">
+<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="43795">
<summary>
Do not audit attempts to send and receive l2tp_client packets.
</summary>
@@ -37404,7 +37450,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_l2tp_client_packets" lineno="45978">
+<interface name="corenet_relabelto_l2tp_client_packets" lineno="43810">
<summary>
Relabel packets to l2tp_client the packet type.
</summary>
@@ -37414,7 +37460,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_l2tp_server_packets" lineno="45998">
+<interface name="corenet_send_l2tp_server_packets" lineno="43830">
<summary>
Send l2tp_server packets.
</summary>
@@ -37425,7 +37471,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="46017">
+<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="43849">
<summary>
Do not audit attempts to send l2tp_server packets.
</summary>
@@ -37436,7 +37482,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_l2tp_server_packets" lineno="46036">
+<interface name="corenet_receive_l2tp_server_packets" lineno="43868">
<summary>
Receive l2tp_server packets.
</summary>
@@ -37447,7 +37493,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="46055">
+<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="43887">
<summary>
Do not audit attempts to receive l2tp_server packets.
</summary>
@@ -37458,7 +37504,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_l2tp_server_packets" lineno="46074">
+<interface name="corenet_sendrecv_l2tp_server_packets" lineno="43906">
<summary>
Send and receive l2tp_server packets.
</summary>
@@ -37469,7 +37515,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="46090">
+<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="43922">
<summary>
Do not audit attempts to send and receive l2tp_server packets.
</summary>
@@ -37480,7 +37526,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_l2tp_server_packets" lineno="46105">
+<interface name="corenet_relabelto_l2tp_server_packets" lineno="43937">
<summary>
Relabel packets to l2tp_server the packet type.
</summary>
@@ -37490,7 +37536,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ldap_port" lineno="46127">
+<interface name="corenet_tcp_sendrecv_ldap_port" lineno="43959">
<summary>
Send and receive TCP traffic on the ldap port.
</summary>
@@ -37501,7 +37547,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ldap_port" lineno="46146">
+<interface name="corenet_udp_send_ldap_port" lineno="43974">
<summary>
Send UDP traffic on the ldap port.
</summary>
@@ -37512,7 +37558,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="46165">
+<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="43989">
<summary>
Do not audit attempts to send UDP traffic on the ldap port.
</summary>
@@ -37523,7 +37569,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ldap_port" lineno="46184">
+<interface name="corenet_udp_receive_ldap_port" lineno="44004">
<summary>
Receive UDP traffic on the ldap port.
</summary>
@@ -37534,7 +37580,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="46203">
+<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="44019">
<summary>
Do not audit attempts to receive UDP traffic on the ldap port.
</summary>
@@ -37545,7 +37591,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ldap_port" lineno="46222">
+<interface name="corenet_udp_sendrecv_ldap_port" lineno="44034">
<summary>
Send and receive UDP traffic on the ldap port.
</summary>
@@ -37556,7 +37602,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="46239">
+<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="44050">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ldap port.
@@ -37568,7 +37614,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ldap_port" lineno="46255">
+<interface name="corenet_tcp_bind_ldap_port" lineno="44065">
<summary>
Bind TCP sockets to the ldap port.
</summary>
@@ -37579,7 +37625,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ldap_port" lineno="46275">
+<interface name="corenet_udp_bind_ldap_port" lineno="44085">
<summary>
Bind UDP sockets to the ldap port.
</summary>
@@ -37590,7 +37636,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ldap_port" lineno="46294">
+<interface name="corenet_tcp_connect_ldap_port" lineno="44104">
<summary>
Make a TCP connection to the ldap port.
</summary>
@@ -37600,7 +37646,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ldap_client_packets" lineno="46314">
+<interface name="corenet_send_ldap_client_packets" lineno="44124">
<summary>
Send ldap_client packets.
</summary>
@@ -37611,7 +37657,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="46333">
+<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="44143">
<summary>
Do not audit attempts to send ldap_client packets.
</summary>
@@ -37622,7 +37668,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ldap_client_packets" lineno="46352">
+<interface name="corenet_receive_ldap_client_packets" lineno="44162">
<summary>
Receive ldap_client packets.
</summary>
@@ -37633,7 +37679,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="46371">
+<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="44181">
<summary>
Do not audit attempts to receive ldap_client packets.
</summary>
@@ -37644,7 +37690,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ldap_client_packets" lineno="46390">
+<interface name="corenet_sendrecv_ldap_client_packets" lineno="44200">
<summary>
Send and receive ldap_client packets.
</summary>
@@ -37655,7 +37701,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="46406">
+<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="44216">
<summary>
Do not audit attempts to send and receive ldap_client packets.
</summary>
@@ -37666,7 +37712,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ldap_client_packets" lineno="46421">
+<interface name="corenet_relabelto_ldap_client_packets" lineno="44231">
<summary>
Relabel packets to ldap_client the packet type.
</summary>
@@ -37676,7 +37722,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ldap_server_packets" lineno="46441">
+<interface name="corenet_send_ldap_server_packets" lineno="44251">
<summary>
Send ldap_server packets.
</summary>
@@ -37687,7 +37733,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="46460">
+<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="44270">
<summary>
Do not audit attempts to send ldap_server packets.
</summary>
@@ -37698,7 +37744,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ldap_server_packets" lineno="46479">
+<interface name="corenet_receive_ldap_server_packets" lineno="44289">
<summary>
Receive ldap_server packets.
</summary>
@@ -37709,7 +37755,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="46498">
+<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="44308">
<summary>
Do not audit attempts to receive ldap_server packets.
</summary>
@@ -37720,7 +37766,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ldap_server_packets" lineno="46517">
+<interface name="corenet_sendrecv_ldap_server_packets" lineno="44327">
<summary>
Send and receive ldap_server packets.
</summary>
@@ -37731,7 +37777,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="46533">
+<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="44343">
<summary>
Do not audit attempts to send and receive ldap_server packets.
</summary>
@@ -37742,7 +37788,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ldap_server_packets" lineno="46548">
+<interface name="corenet_relabelto_ldap_server_packets" lineno="44358">
<summary>
Relabel packets to ldap_server the packet type.
</summary>
@@ -37752,7 +37798,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_lirc_port" lineno="46570">
+<interface name="corenet_tcp_sendrecv_lirc_port" lineno="44380">
<summary>
Send and receive TCP traffic on the lirc port.
</summary>
@@ -37763,7 +37809,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_lirc_port" lineno="46589">
+<interface name="corenet_udp_send_lirc_port" lineno="44395">
<summary>
Send UDP traffic on the lirc port.
</summary>
@@ -37774,7 +37820,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="46608">
+<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="44410">
<summary>
Do not audit attempts to send UDP traffic on the lirc port.
</summary>
@@ -37785,7 +37831,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_lirc_port" lineno="46627">
+<interface name="corenet_udp_receive_lirc_port" lineno="44425">
<summary>
Receive UDP traffic on the lirc port.
</summary>
@@ -37796,7 +37842,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="46646">
+<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="44440">
<summary>
Do not audit attempts to receive UDP traffic on the lirc port.
</summary>
@@ -37807,7 +37853,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_lirc_port" lineno="46665">
+<interface name="corenet_udp_sendrecv_lirc_port" lineno="44455">
<summary>
Send and receive UDP traffic on the lirc port.
</summary>
@@ -37818,7 +37864,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="46682">
+<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="44471">
<summary>
Do not audit attempts to send and receive
UDP traffic on the lirc port.
@@ -37830,7 +37876,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_lirc_port" lineno="46698">
+<interface name="corenet_tcp_bind_lirc_port" lineno="44486">
<summary>
Bind TCP sockets to the lirc port.
</summary>
@@ -37841,7 +37887,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_lirc_port" lineno="46718">
+<interface name="corenet_udp_bind_lirc_port" lineno="44506">
<summary>
Bind UDP sockets to the lirc port.
</summary>
@@ -37852,7 +37898,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_lirc_port" lineno="46737">
+<interface name="corenet_tcp_connect_lirc_port" lineno="44525">
<summary>
Make a TCP connection to the lirc port.
</summary>
@@ -37862,7 +37908,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lirc_client_packets" lineno="46757">
+<interface name="corenet_send_lirc_client_packets" lineno="44545">
<summary>
Send lirc_client packets.
</summary>
@@ -37873,7 +37919,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="46776">
+<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="44564">
<summary>
Do not audit attempts to send lirc_client packets.
</summary>
@@ -37884,7 +37930,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lirc_client_packets" lineno="46795">
+<interface name="corenet_receive_lirc_client_packets" lineno="44583">
<summary>
Receive lirc_client packets.
</summary>
@@ -37895,7 +37941,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="46814">
+<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="44602">
<summary>
Do not audit attempts to receive lirc_client packets.
</summary>
@@ -37906,7 +37952,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lirc_client_packets" lineno="46833">
+<interface name="corenet_sendrecv_lirc_client_packets" lineno="44621">
<summary>
Send and receive lirc_client packets.
</summary>
@@ -37917,7 +37963,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="46849">
+<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="44637">
<summary>
Do not audit attempts to send and receive lirc_client packets.
</summary>
@@ -37928,7 +37974,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lirc_client_packets" lineno="46864">
+<interface name="corenet_relabelto_lirc_client_packets" lineno="44652">
<summary>
Relabel packets to lirc_client the packet type.
</summary>
@@ -37938,7 +37984,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lirc_server_packets" lineno="46884">
+<interface name="corenet_send_lirc_server_packets" lineno="44672">
<summary>
Send lirc_server packets.
</summary>
@@ -37949,7 +37995,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="46903">
+<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="44691">
<summary>
Do not audit attempts to send lirc_server packets.
</summary>
@@ -37960,7 +38006,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lirc_server_packets" lineno="46922">
+<interface name="corenet_receive_lirc_server_packets" lineno="44710">
<summary>
Receive lirc_server packets.
</summary>
@@ -37971,7 +38017,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="46941">
+<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="44729">
<summary>
Do not audit attempts to receive lirc_server packets.
</summary>
@@ -37982,7 +38028,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lirc_server_packets" lineno="46960">
+<interface name="corenet_sendrecv_lirc_server_packets" lineno="44748">
<summary>
Send and receive lirc_server packets.
</summary>
@@ -37993,7 +38039,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="46976">
+<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="44764">
<summary>
Do not audit attempts to send and receive lirc_server packets.
</summary>
@@ -38004,7 +38050,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lirc_server_packets" lineno="46991">
+<interface name="corenet_relabelto_lirc_server_packets" lineno="44779">
<summary>
Relabel packets to lirc_server the packet type.
</summary>
@@ -38014,7 +38060,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="47013">
+<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="44801">
<summary>
Send and receive TCP traffic on the llmnr port.
</summary>
@@ -38025,7 +38071,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_llmnr_port" lineno="47032">
+<interface name="corenet_udp_send_llmnr_port" lineno="44816">
<summary>
Send UDP traffic on the llmnr port.
</summary>
@@ -38036,7 +38082,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="47051">
+<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="44831">
<summary>
Do not audit attempts to send UDP traffic on the llmnr port.
</summary>
@@ -38047,7 +38093,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_llmnr_port" lineno="47070">
+<interface name="corenet_udp_receive_llmnr_port" lineno="44846">
<summary>
Receive UDP traffic on the llmnr port.
</summary>
@@ -38058,7 +38104,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="47089">
+<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="44861">
<summary>
Do not audit attempts to receive UDP traffic on the llmnr port.
</summary>
@@ -38069,7 +38115,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_llmnr_port" lineno="47108">
+<interface name="corenet_udp_sendrecv_llmnr_port" lineno="44876">
<summary>
Send and receive UDP traffic on the llmnr port.
</summary>
@@ -38080,7 +38126,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="47125">
+<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="44892">
<summary>
Do not audit attempts to send and receive
UDP traffic on the llmnr port.
@@ -38092,7 +38138,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_llmnr_port" lineno="47141">
+<interface name="corenet_tcp_bind_llmnr_port" lineno="44907">
<summary>
Bind TCP sockets to the llmnr port.
</summary>
@@ -38103,7 +38149,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_llmnr_port" lineno="47161">
+<interface name="corenet_udp_bind_llmnr_port" lineno="44927">
<summary>
Bind UDP sockets to the llmnr port.
</summary>
@@ -38114,7 +38160,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_llmnr_port" lineno="47180">
+<interface name="corenet_tcp_connect_llmnr_port" lineno="44946">
<summary>
Make a TCP connection to the llmnr port.
</summary>
@@ -38124,7 +38170,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_llmnr_client_packets" lineno="47200">
+<interface name="corenet_send_llmnr_client_packets" lineno="44966">
<summary>
Send llmnr_client packets.
</summary>
@@ -38135,7 +38181,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="47219">
+<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="44985">
<summary>
Do not audit attempts to send llmnr_client packets.
</summary>
@@ -38146,7 +38192,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_llmnr_client_packets" lineno="47238">
+<interface name="corenet_receive_llmnr_client_packets" lineno="45004">
<summary>
Receive llmnr_client packets.
</summary>
@@ -38157,7 +38203,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="47257">
+<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="45023">
<summary>
Do not audit attempts to receive llmnr_client packets.
</summary>
@@ -38168,7 +38214,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_llmnr_client_packets" lineno="47276">
+<interface name="corenet_sendrecv_llmnr_client_packets" lineno="45042">
<summary>
Send and receive llmnr_client packets.
</summary>
@@ -38179,7 +38225,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="47292">
+<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="45058">
<summary>
Do not audit attempts to send and receive llmnr_client packets.
</summary>
@@ -38190,7 +38236,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_llmnr_client_packets" lineno="47307">
+<interface name="corenet_relabelto_llmnr_client_packets" lineno="45073">
<summary>
Relabel packets to llmnr_client the packet type.
</summary>
@@ -38200,7 +38246,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_llmnr_server_packets" lineno="47327">
+<interface name="corenet_send_llmnr_server_packets" lineno="45093">
<summary>
Send llmnr_server packets.
</summary>
@@ -38211,7 +38257,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="47346">
+<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="45112">
<summary>
Do not audit attempts to send llmnr_server packets.
</summary>
@@ -38222,7 +38268,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_llmnr_server_packets" lineno="47365">
+<interface name="corenet_receive_llmnr_server_packets" lineno="45131">
<summary>
Receive llmnr_server packets.
</summary>
@@ -38233,7 +38279,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="47384">
+<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="45150">
<summary>
Do not audit attempts to receive llmnr_server packets.
</summary>
@@ -38244,7 +38290,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_llmnr_server_packets" lineno="47403">
+<interface name="corenet_sendrecv_llmnr_server_packets" lineno="45169">
<summary>
Send and receive llmnr_server packets.
</summary>
@@ -38255,7 +38301,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="47419">
+<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="45185">
<summary>
Do not audit attempts to send and receive llmnr_server packets.
</summary>
@@ -38266,7 +38312,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_llmnr_server_packets" lineno="47434">
+<interface name="corenet_relabelto_llmnr_server_packets" lineno="45200">
<summary>
Relabel packets to llmnr_server the packet type.
</summary>
@@ -38276,7 +38322,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="47456">
+<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="45222">
<summary>
Send and receive TCP traffic on the lmtp port.
</summary>
@@ -38287,7 +38333,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_lmtp_port" lineno="47475">
+<interface name="corenet_udp_send_lmtp_port" lineno="45237">
<summary>
Send UDP traffic on the lmtp port.
</summary>
@@ -38298,7 +38344,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="47494">
+<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="45252">
<summary>
Do not audit attempts to send UDP traffic on the lmtp port.
</summary>
@@ -38309,7 +38355,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_lmtp_port" lineno="47513">
+<interface name="corenet_udp_receive_lmtp_port" lineno="45267">
<summary>
Receive UDP traffic on the lmtp port.
</summary>
@@ -38320,7 +38366,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="47532">
+<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="45282">
<summary>
Do not audit attempts to receive UDP traffic on the lmtp port.
</summary>
@@ -38331,7 +38377,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_lmtp_port" lineno="47551">
+<interface name="corenet_udp_sendrecv_lmtp_port" lineno="45297">
<summary>
Send and receive UDP traffic on the lmtp port.
</summary>
@@ -38342,7 +38388,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="47568">
+<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="45313">
<summary>
Do not audit attempts to send and receive
UDP traffic on the lmtp port.
@@ -38354,7 +38400,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_lmtp_port" lineno="47584">
+<interface name="corenet_tcp_bind_lmtp_port" lineno="45328">
<summary>
Bind TCP sockets to the lmtp port.
</summary>
@@ -38365,7 +38411,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_lmtp_port" lineno="47604">
+<interface name="corenet_udp_bind_lmtp_port" lineno="45348">
<summary>
Bind UDP sockets to the lmtp port.
</summary>
@@ -38376,7 +38422,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_lmtp_port" lineno="47623">
+<interface name="corenet_tcp_connect_lmtp_port" lineno="45367">
<summary>
Make a TCP connection to the lmtp port.
</summary>
@@ -38386,7 +38432,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lmtp_client_packets" lineno="47643">
+<interface name="corenet_send_lmtp_client_packets" lineno="45387">
<summary>
Send lmtp_client packets.
</summary>
@@ -38397,7 +38443,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="47662">
+<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="45406">
<summary>
Do not audit attempts to send lmtp_client packets.
</summary>
@@ -38408,7 +38454,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lmtp_client_packets" lineno="47681">
+<interface name="corenet_receive_lmtp_client_packets" lineno="45425">
<summary>
Receive lmtp_client packets.
</summary>
@@ -38419,7 +38465,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="47700">
+<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="45444">
<summary>
Do not audit attempts to receive lmtp_client packets.
</summary>
@@ -38430,7 +38476,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lmtp_client_packets" lineno="47719">
+<interface name="corenet_sendrecv_lmtp_client_packets" lineno="45463">
<summary>
Send and receive lmtp_client packets.
</summary>
@@ -38441,7 +38487,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="47735">
+<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="45479">
<summary>
Do not audit attempts to send and receive lmtp_client packets.
</summary>
@@ -38452,7 +38498,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lmtp_client_packets" lineno="47750">
+<interface name="corenet_relabelto_lmtp_client_packets" lineno="45494">
<summary>
Relabel packets to lmtp_client the packet type.
</summary>
@@ -38462,7 +38508,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lmtp_server_packets" lineno="47770">
+<interface name="corenet_send_lmtp_server_packets" lineno="45514">
<summary>
Send lmtp_server packets.
</summary>
@@ -38473,7 +38519,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="47789">
+<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="45533">
<summary>
Do not audit attempts to send lmtp_server packets.
</summary>
@@ -38484,7 +38530,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lmtp_server_packets" lineno="47808">
+<interface name="corenet_receive_lmtp_server_packets" lineno="45552">
<summary>
Receive lmtp_server packets.
</summary>
@@ -38495,7 +38541,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="47827">
+<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="45571">
<summary>
Do not audit attempts to receive lmtp_server packets.
</summary>
@@ -38506,7 +38552,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lmtp_server_packets" lineno="47846">
+<interface name="corenet_sendrecv_lmtp_server_packets" lineno="45590">
<summary>
Send and receive lmtp_server packets.
</summary>
@@ -38517,7 +38563,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="47862">
+<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="45606">
<summary>
Do not audit attempts to send and receive lmtp_server packets.
</summary>
@@ -38528,7 +38574,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lmtp_server_packets" lineno="47877">
+<interface name="corenet_relabelto_lmtp_server_packets" lineno="45621">
<summary>
Relabel packets to lmtp_server the packet type.
</summary>
@@ -38538,7 +38584,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="47899">
+<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="45643">
<summary>
Send and receive TCP traffic on the lrrd port.
</summary>
@@ -38549,7 +38595,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_lrrd_port" lineno="47918">
+<interface name="corenet_udp_send_lrrd_port" lineno="45658">
<summary>
Send UDP traffic on the lrrd port.
</summary>
@@ -38560,7 +38606,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="47937">
+<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="45673">
<summary>
Do not audit attempts to send UDP traffic on the lrrd port.
</summary>
@@ -38571,7 +38617,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_lrrd_port" lineno="47956">
+<interface name="corenet_udp_receive_lrrd_port" lineno="45688">
<summary>
Receive UDP traffic on the lrrd port.
</summary>
@@ -38582,7 +38628,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="47975">
+<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="45703">
<summary>
Do not audit attempts to receive UDP traffic on the lrrd port.
</summary>
@@ -38593,7 +38639,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_lrrd_port" lineno="47994">
+<interface name="corenet_udp_sendrecv_lrrd_port" lineno="45718">
<summary>
Send and receive UDP traffic on the lrrd port.
</summary>
@@ -38604,7 +38650,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="48011">
+<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="45734">
<summary>
Do not audit attempts to send and receive
UDP traffic on the lrrd port.
@@ -38616,7 +38662,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_lrrd_port" lineno="48027">
+<interface name="corenet_tcp_bind_lrrd_port" lineno="45749">
<summary>
Bind TCP sockets to the lrrd port.
</summary>
@@ -38627,7 +38673,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_lrrd_port" lineno="48047">
+<interface name="corenet_udp_bind_lrrd_port" lineno="45769">
<summary>
Bind UDP sockets to the lrrd port.
</summary>
@@ -38638,7 +38684,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_lrrd_port" lineno="48066">
+<interface name="corenet_tcp_connect_lrrd_port" lineno="45788">
<summary>
Make a TCP connection to the lrrd port.
</summary>
@@ -38648,7 +38694,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lrrd_client_packets" lineno="48086">
+<interface name="corenet_send_lrrd_client_packets" lineno="45808">
<summary>
Send lrrd_client packets.
</summary>
@@ -38659,7 +38705,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="48105">
+<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="45827">
<summary>
Do not audit attempts to send lrrd_client packets.
</summary>
@@ -38670,7 +38716,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lrrd_client_packets" lineno="48124">
+<interface name="corenet_receive_lrrd_client_packets" lineno="45846">
<summary>
Receive lrrd_client packets.
</summary>
@@ -38681,7 +38727,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="48143">
+<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="45865">
<summary>
Do not audit attempts to receive lrrd_client packets.
</summary>
@@ -38692,7 +38738,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lrrd_client_packets" lineno="48162">
+<interface name="corenet_sendrecv_lrrd_client_packets" lineno="45884">
<summary>
Send and receive lrrd_client packets.
</summary>
@@ -38703,7 +38749,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="48178">
+<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="45900">
<summary>
Do not audit attempts to send and receive lrrd_client packets.
</summary>
@@ -38714,7 +38760,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lrrd_client_packets" lineno="48193">
+<interface name="corenet_relabelto_lrrd_client_packets" lineno="45915">
<summary>
Relabel packets to lrrd_client the packet type.
</summary>
@@ -38724,7 +38770,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_lrrd_server_packets" lineno="48213">
+<interface name="corenet_send_lrrd_server_packets" lineno="45935">
<summary>
Send lrrd_server packets.
</summary>
@@ -38735,7 +38781,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="48232">
+<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="45954">
<summary>
Do not audit attempts to send lrrd_server packets.
</summary>
@@ -38746,7 +38792,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_lrrd_server_packets" lineno="48251">
+<interface name="corenet_receive_lrrd_server_packets" lineno="45973">
<summary>
Receive lrrd_server packets.
</summary>
@@ -38757,7 +38803,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="48270">
+<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="45992">
<summary>
Do not audit attempts to receive lrrd_server packets.
</summary>
@@ -38768,7 +38814,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_lrrd_server_packets" lineno="48289">
+<interface name="corenet_sendrecv_lrrd_server_packets" lineno="46011">
<summary>
Send and receive lrrd_server packets.
</summary>
@@ -38779,7 +38825,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="48305">
+<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="46027">
<summary>
Do not audit attempts to send and receive lrrd_server packets.
</summary>
@@ -38790,7 +38836,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_lrrd_server_packets" lineno="48320">
+<interface name="corenet_relabelto_lrrd_server_packets" lineno="46042">
<summary>
Relabel packets to lrrd_server the packet type.
</summary>
@@ -38800,7 +38846,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mail_port" lineno="48342">
+<interface name="corenet_tcp_sendrecv_mail_port" lineno="46064">
<summary>
Send and receive TCP traffic on the mail port.
</summary>
@@ -38811,7 +38857,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mail_port" lineno="48361">
+<interface name="corenet_udp_send_mail_port" lineno="46079">
<summary>
Send UDP traffic on the mail port.
</summary>
@@ -38822,7 +38868,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mail_port" lineno="48380">
+<interface name="corenet_dontaudit_udp_send_mail_port" lineno="46094">
<summary>
Do not audit attempts to send UDP traffic on the mail port.
</summary>
@@ -38833,7 +38879,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mail_port" lineno="48399">
+<interface name="corenet_udp_receive_mail_port" lineno="46109">
<summary>
Receive UDP traffic on the mail port.
</summary>
@@ -38844,7 +38890,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="48418">
+<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="46124">
<summary>
Do not audit attempts to receive UDP traffic on the mail port.
</summary>
@@ -38855,7 +38901,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mail_port" lineno="48437">
+<interface name="corenet_udp_sendrecv_mail_port" lineno="46139">
<summary>
Send and receive UDP traffic on the mail port.
</summary>
@@ -38866,7 +38912,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="48454">
+<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="46155">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mail port.
@@ -38878,7 +38924,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mail_port" lineno="48470">
+<interface name="corenet_tcp_bind_mail_port" lineno="46170">
<summary>
Bind TCP sockets to the mail port.
</summary>
@@ -38889,7 +38935,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mail_port" lineno="48490">
+<interface name="corenet_udp_bind_mail_port" lineno="46190">
<summary>
Bind UDP sockets to the mail port.
</summary>
@@ -38900,7 +38946,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mail_port" lineno="48509">
+<interface name="corenet_tcp_connect_mail_port" lineno="46209">
<summary>
Make a TCP connection to the mail port.
</summary>
@@ -38910,7 +38956,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mail_client_packets" lineno="48529">
+<interface name="corenet_send_mail_client_packets" lineno="46229">
<summary>
Send mail_client packets.
</summary>
@@ -38921,7 +38967,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mail_client_packets" lineno="48548">
+<interface name="corenet_dontaudit_send_mail_client_packets" lineno="46248">
<summary>
Do not audit attempts to send mail_client packets.
</summary>
@@ -38932,7 +38978,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mail_client_packets" lineno="48567">
+<interface name="corenet_receive_mail_client_packets" lineno="46267">
<summary>
Receive mail_client packets.
</summary>
@@ -38943,7 +38989,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="48586">
+<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="46286">
<summary>
Do not audit attempts to receive mail_client packets.
</summary>
@@ -38954,7 +39000,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mail_client_packets" lineno="48605">
+<interface name="corenet_sendrecv_mail_client_packets" lineno="46305">
<summary>
Send and receive mail_client packets.
</summary>
@@ -38965,7 +39011,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="48621">
+<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="46321">
<summary>
Do not audit attempts to send and receive mail_client packets.
</summary>
@@ -38976,7 +39022,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mail_client_packets" lineno="48636">
+<interface name="corenet_relabelto_mail_client_packets" lineno="46336">
<summary>
Relabel packets to mail_client the packet type.
</summary>
@@ -38986,7 +39032,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mail_server_packets" lineno="48656">
+<interface name="corenet_send_mail_server_packets" lineno="46356">
<summary>
Send mail_server packets.
</summary>
@@ -38997,7 +39043,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mail_server_packets" lineno="48675">
+<interface name="corenet_dontaudit_send_mail_server_packets" lineno="46375">
<summary>
Do not audit attempts to send mail_server packets.
</summary>
@@ -39008,7 +39054,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mail_server_packets" lineno="48694">
+<interface name="corenet_receive_mail_server_packets" lineno="46394">
<summary>
Receive mail_server packets.
</summary>
@@ -39019,7 +39065,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="48713">
+<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="46413">
<summary>
Do not audit attempts to receive mail_server packets.
</summary>
@@ -39030,7 +39076,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mail_server_packets" lineno="48732">
+<interface name="corenet_sendrecv_mail_server_packets" lineno="46432">
<summary>
Send and receive mail_server packets.
</summary>
@@ -39041,7 +39087,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="48748">
+<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="46448">
<summary>
Do not audit attempts to send and receive mail_server packets.
</summary>
@@ -39052,7 +39098,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mail_server_packets" lineno="48763">
+<interface name="corenet_relabelto_mail_server_packets" lineno="46463">
<summary>
Relabel packets to mail_server the packet type.
</summary>
@@ -39062,7 +39108,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_matahari_port" lineno="48785">
+<interface name="corenet_tcp_sendrecv_matahari_port" lineno="46485">
<summary>
Send and receive TCP traffic on the matahari port.
</summary>
@@ -39073,7 +39119,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_matahari_port" lineno="48804">
+<interface name="corenet_udp_send_matahari_port" lineno="46500">
<summary>
Send UDP traffic on the matahari port.
</summary>
@@ -39084,7 +39130,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="48823">
+<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="46515">
<summary>
Do not audit attempts to send UDP traffic on the matahari port.
</summary>
@@ -39095,7 +39141,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_matahari_port" lineno="48842">
+<interface name="corenet_udp_receive_matahari_port" lineno="46530">
<summary>
Receive UDP traffic on the matahari port.
</summary>
@@ -39106,7 +39152,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="48861">
+<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="46545">
<summary>
Do not audit attempts to receive UDP traffic on the matahari port.
</summary>
@@ -39117,7 +39163,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_matahari_port" lineno="48880">
+<interface name="corenet_udp_sendrecv_matahari_port" lineno="46560">
<summary>
Send and receive UDP traffic on the matahari port.
</summary>
@@ -39128,7 +39174,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="48897">
+<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="46576">
<summary>
Do not audit attempts to send and receive
UDP traffic on the matahari port.
@@ -39140,7 +39186,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_matahari_port" lineno="48913">
+<interface name="corenet_tcp_bind_matahari_port" lineno="46591">
<summary>
Bind TCP sockets to the matahari port.
</summary>
@@ -39151,7 +39197,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_matahari_port" lineno="48933">
+<interface name="corenet_udp_bind_matahari_port" lineno="46611">
<summary>
Bind UDP sockets to the matahari port.
</summary>
@@ -39162,7 +39208,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_matahari_port" lineno="48952">
+<interface name="corenet_tcp_connect_matahari_port" lineno="46630">
<summary>
Make a TCP connection to the matahari port.
</summary>
@@ -39172,7 +39218,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_matahari_client_packets" lineno="48972">
+<interface name="corenet_send_matahari_client_packets" lineno="46650">
<summary>
Send matahari_client packets.
</summary>
@@ -39183,7 +39229,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="48991">
+<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="46669">
<summary>
Do not audit attempts to send matahari_client packets.
</summary>
@@ -39194,7 +39240,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_matahari_client_packets" lineno="49010">
+<interface name="corenet_receive_matahari_client_packets" lineno="46688">
<summary>
Receive matahari_client packets.
</summary>
@@ -39205,7 +39251,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="49029">
+<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="46707">
<summary>
Do not audit attempts to receive matahari_client packets.
</summary>
@@ -39216,7 +39262,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_matahari_client_packets" lineno="49048">
+<interface name="corenet_sendrecv_matahari_client_packets" lineno="46726">
<summary>
Send and receive matahari_client packets.
</summary>
@@ -39227,7 +39273,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="49064">
+<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="46742">
<summary>
Do not audit attempts to send and receive matahari_client packets.
</summary>
@@ -39238,7 +39284,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_matahari_client_packets" lineno="49079">
+<interface name="corenet_relabelto_matahari_client_packets" lineno="46757">
<summary>
Relabel packets to matahari_client the packet type.
</summary>
@@ -39248,7 +39294,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_matahari_server_packets" lineno="49099">
+<interface name="corenet_send_matahari_server_packets" lineno="46777">
<summary>
Send matahari_server packets.
</summary>
@@ -39259,7 +39305,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="49118">
+<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="46796">
<summary>
Do not audit attempts to send matahari_server packets.
</summary>
@@ -39270,7 +39316,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_matahari_server_packets" lineno="49137">
+<interface name="corenet_receive_matahari_server_packets" lineno="46815">
<summary>
Receive matahari_server packets.
</summary>
@@ -39281,7 +39327,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="49156">
+<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="46834">
<summary>
Do not audit attempts to receive matahari_server packets.
</summary>
@@ -39292,7 +39338,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_matahari_server_packets" lineno="49175">
+<interface name="corenet_sendrecv_matahari_server_packets" lineno="46853">
<summary>
Send and receive matahari_server packets.
</summary>
@@ -39303,7 +39349,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="49191">
+<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="46869">
<summary>
Do not audit attempts to send and receive matahari_server packets.
</summary>
@@ -39314,7 +39360,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_matahari_server_packets" lineno="49206">
+<interface name="corenet_relabelto_matahari_server_packets" lineno="46884">
<summary>
Relabel packets to matahari_server the packet type.
</summary>
@@ -39324,7 +39370,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_memcache_port" lineno="49228">
+<interface name="corenet_tcp_sendrecv_memcache_port" lineno="46906">
<summary>
Send and receive TCP traffic on the memcache port.
</summary>
@@ -39335,7 +39381,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_memcache_port" lineno="49247">
+<interface name="corenet_udp_send_memcache_port" lineno="46921">
<summary>
Send UDP traffic on the memcache port.
</summary>
@@ -39346,7 +39392,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="49266">
+<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="46936">
<summary>
Do not audit attempts to send UDP traffic on the memcache port.
</summary>
@@ -39357,7 +39403,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_memcache_port" lineno="49285">
+<interface name="corenet_udp_receive_memcache_port" lineno="46951">
<summary>
Receive UDP traffic on the memcache port.
</summary>
@@ -39368,7 +39414,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="49304">
+<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="46966">
<summary>
Do not audit attempts to receive UDP traffic on the memcache port.
</summary>
@@ -39379,7 +39425,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_memcache_port" lineno="49323">
+<interface name="corenet_udp_sendrecv_memcache_port" lineno="46981">
<summary>
Send and receive UDP traffic on the memcache port.
</summary>
@@ -39390,7 +39436,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="49340">
+<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="46997">
<summary>
Do not audit attempts to send and receive
UDP traffic on the memcache port.
@@ -39402,7 +39448,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_memcache_port" lineno="49356">
+<interface name="corenet_tcp_bind_memcache_port" lineno="47012">
<summary>
Bind TCP sockets to the memcache port.
</summary>
@@ -39413,7 +39459,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_memcache_port" lineno="49376">
+<interface name="corenet_udp_bind_memcache_port" lineno="47032">
<summary>
Bind UDP sockets to the memcache port.
</summary>
@@ -39424,7 +39470,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_memcache_port" lineno="49395">
+<interface name="corenet_tcp_connect_memcache_port" lineno="47051">
<summary>
Make a TCP connection to the memcache port.
</summary>
@@ -39434,7 +39480,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_memcache_client_packets" lineno="49415">
+<interface name="corenet_send_memcache_client_packets" lineno="47071">
<summary>
Send memcache_client packets.
</summary>
@@ -39445,7 +39491,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="49434">
+<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="47090">
<summary>
Do not audit attempts to send memcache_client packets.
</summary>
@@ -39456,7 +39502,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_memcache_client_packets" lineno="49453">
+<interface name="corenet_receive_memcache_client_packets" lineno="47109">
<summary>
Receive memcache_client packets.
</summary>
@@ -39467,7 +39513,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="49472">
+<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="47128">
<summary>
Do not audit attempts to receive memcache_client packets.
</summary>
@@ -39478,7 +39524,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_memcache_client_packets" lineno="49491">
+<interface name="corenet_sendrecv_memcache_client_packets" lineno="47147">
<summary>
Send and receive memcache_client packets.
</summary>
@@ -39489,7 +39535,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="49507">
+<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="47163">
<summary>
Do not audit attempts to send and receive memcache_client packets.
</summary>
@@ -39500,7 +39546,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_memcache_client_packets" lineno="49522">
+<interface name="corenet_relabelto_memcache_client_packets" lineno="47178">
<summary>
Relabel packets to memcache_client the packet type.
</summary>
@@ -39510,7 +39556,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_memcache_server_packets" lineno="49542">
+<interface name="corenet_send_memcache_server_packets" lineno="47198">
<summary>
Send memcache_server packets.
</summary>
@@ -39521,7 +39567,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="49561">
+<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="47217">
<summary>
Do not audit attempts to send memcache_server packets.
</summary>
@@ -39532,7 +39578,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_memcache_server_packets" lineno="49580">
+<interface name="corenet_receive_memcache_server_packets" lineno="47236">
<summary>
Receive memcache_server packets.
</summary>
@@ -39543,7 +39589,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="49599">
+<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="47255">
<summary>
Do not audit attempts to receive memcache_server packets.
</summary>
@@ -39554,7 +39600,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_memcache_server_packets" lineno="49618">
+<interface name="corenet_sendrecv_memcache_server_packets" lineno="47274">
<summary>
Send and receive memcache_server packets.
</summary>
@@ -39565,7 +39611,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="49634">
+<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="47290">
<summary>
Do not audit attempts to send and receive memcache_server packets.
</summary>
@@ -39576,7 +39622,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_memcache_server_packets" lineno="49649">
+<interface name="corenet_relabelto_memcache_server_packets" lineno="47305">
<summary>
Relabel packets to memcache_server the packet type.
</summary>
@@ -39586,7 +39632,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_milter_port" lineno="49671">
+<interface name="corenet_tcp_sendrecv_milter_port" lineno="47327">
<summary>
Send and receive TCP traffic on the milter port.
</summary>
@@ -39597,7 +39643,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_milter_port" lineno="49690">
+<interface name="corenet_udp_send_milter_port" lineno="47342">
<summary>
Send UDP traffic on the milter port.
</summary>
@@ -39608,7 +39654,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_milter_port" lineno="49709">
+<interface name="corenet_dontaudit_udp_send_milter_port" lineno="47357">
<summary>
Do not audit attempts to send UDP traffic on the milter port.
</summary>
@@ -39619,7 +39665,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_milter_port" lineno="49728">
+<interface name="corenet_udp_receive_milter_port" lineno="47372">
<summary>
Receive UDP traffic on the milter port.
</summary>
@@ -39630,7 +39676,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="49747">
+<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="47387">
<summary>
Do not audit attempts to receive UDP traffic on the milter port.
</summary>
@@ -39641,7 +39687,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_milter_port" lineno="49766">
+<interface name="corenet_udp_sendrecv_milter_port" lineno="47402">
<summary>
Send and receive UDP traffic on the milter port.
</summary>
@@ -39652,7 +39698,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="49783">
+<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="47418">
<summary>
Do not audit attempts to send and receive
UDP traffic on the milter port.
@@ -39664,7 +39710,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_milter_port" lineno="49799">
+<interface name="corenet_tcp_bind_milter_port" lineno="47433">
<summary>
Bind TCP sockets to the milter port.
</summary>
@@ -39675,7 +39721,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_milter_port" lineno="49819">
+<interface name="corenet_udp_bind_milter_port" lineno="47453">
<summary>
Bind UDP sockets to the milter port.
</summary>
@@ -39686,7 +39732,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_milter_port" lineno="49838">
+<interface name="corenet_tcp_connect_milter_port" lineno="47472">
<summary>
Make a TCP connection to the milter port.
</summary>
@@ -39696,7 +39742,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_milter_client_packets" lineno="49858">
+<interface name="corenet_send_milter_client_packets" lineno="47492">
<summary>
Send milter_client packets.
</summary>
@@ -39707,7 +39753,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_milter_client_packets" lineno="49877">
+<interface name="corenet_dontaudit_send_milter_client_packets" lineno="47511">
<summary>
Do not audit attempts to send milter_client packets.
</summary>
@@ -39718,7 +39764,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_milter_client_packets" lineno="49896">
+<interface name="corenet_receive_milter_client_packets" lineno="47530">
<summary>
Receive milter_client packets.
</summary>
@@ -39729,7 +39775,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="49915">
+<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="47549">
<summary>
Do not audit attempts to receive milter_client packets.
</summary>
@@ -39740,7 +39786,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_milter_client_packets" lineno="49934">
+<interface name="corenet_sendrecv_milter_client_packets" lineno="47568">
<summary>
Send and receive milter_client packets.
</summary>
@@ -39751,7 +39797,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="49950">
+<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="47584">
<summary>
Do not audit attempts to send and receive milter_client packets.
</summary>
@@ -39762,7 +39808,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_milter_client_packets" lineno="49965">
+<interface name="corenet_relabelto_milter_client_packets" lineno="47599">
<summary>
Relabel packets to milter_client the packet type.
</summary>
@@ -39772,7 +39818,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_milter_server_packets" lineno="49985">
+<interface name="corenet_send_milter_server_packets" lineno="47619">
<summary>
Send milter_server packets.
</summary>
@@ -39783,7 +39829,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_milter_server_packets" lineno="50004">
+<interface name="corenet_dontaudit_send_milter_server_packets" lineno="47638">
<summary>
Do not audit attempts to send milter_server packets.
</summary>
@@ -39794,7 +39840,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_milter_server_packets" lineno="50023">
+<interface name="corenet_receive_milter_server_packets" lineno="47657">
<summary>
Receive milter_server packets.
</summary>
@@ -39805,7 +39851,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="50042">
+<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="47676">
<summary>
Do not audit attempts to receive milter_server packets.
</summary>
@@ -39816,7 +39862,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_milter_server_packets" lineno="50061">
+<interface name="corenet_sendrecv_milter_server_packets" lineno="47695">
<summary>
Send and receive milter_server packets.
</summary>
@@ -39827,7 +39873,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="50077">
+<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="47711">
<summary>
Do not audit attempts to send and receive milter_server packets.
</summary>
@@ -39838,7 +39884,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_milter_server_packets" lineno="50092">
+<interface name="corenet_relabelto_milter_server_packets" lineno="47726">
<summary>
Relabel packets to milter_server the packet type.
</summary>
@@ -39848,7 +39894,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="50114">
+<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="47748">
<summary>
Send and receive TCP traffic on the mmcc port.
</summary>
@@ -39859,7 +39905,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mmcc_port" lineno="50133">
+<interface name="corenet_udp_send_mmcc_port" lineno="47763">
<summary>
Send UDP traffic on the mmcc port.
</summary>
@@ -39870,7 +39916,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="50152">
+<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="47778">
<summary>
Do not audit attempts to send UDP traffic on the mmcc port.
</summary>
@@ -39881,7 +39927,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mmcc_port" lineno="50171">
+<interface name="corenet_udp_receive_mmcc_port" lineno="47793">
<summary>
Receive UDP traffic on the mmcc port.
</summary>
@@ -39892,7 +39938,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="50190">
+<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="47808">
<summary>
Do not audit attempts to receive UDP traffic on the mmcc port.
</summary>
@@ -39903,7 +39949,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mmcc_port" lineno="50209">
+<interface name="corenet_udp_sendrecv_mmcc_port" lineno="47823">
<summary>
Send and receive UDP traffic on the mmcc port.
</summary>
@@ -39914,7 +39960,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="50226">
+<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="47839">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mmcc port.
@@ -39926,7 +39972,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mmcc_port" lineno="50242">
+<interface name="corenet_tcp_bind_mmcc_port" lineno="47854">
<summary>
Bind TCP sockets to the mmcc port.
</summary>
@@ -39937,7 +39983,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mmcc_port" lineno="50262">
+<interface name="corenet_udp_bind_mmcc_port" lineno="47874">
<summary>
Bind UDP sockets to the mmcc port.
</summary>
@@ -39948,7 +39994,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mmcc_port" lineno="50281">
+<interface name="corenet_tcp_connect_mmcc_port" lineno="47893">
<summary>
Make a TCP connection to the mmcc port.
</summary>
@@ -39958,7 +40004,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mmcc_client_packets" lineno="50301">
+<interface name="corenet_send_mmcc_client_packets" lineno="47913">
<summary>
Send mmcc_client packets.
</summary>
@@ -39969,7 +40015,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="50320">
+<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="47932">
<summary>
Do not audit attempts to send mmcc_client packets.
</summary>
@@ -39980,7 +40026,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mmcc_client_packets" lineno="50339">
+<interface name="corenet_receive_mmcc_client_packets" lineno="47951">
<summary>
Receive mmcc_client packets.
</summary>
@@ -39991,7 +40037,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="50358">
+<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="47970">
<summary>
Do not audit attempts to receive mmcc_client packets.
</summary>
@@ -40002,7 +40048,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mmcc_client_packets" lineno="50377">
+<interface name="corenet_sendrecv_mmcc_client_packets" lineno="47989">
<summary>
Send and receive mmcc_client packets.
</summary>
@@ -40013,7 +40059,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="50393">
+<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="48005">
<summary>
Do not audit attempts to send and receive mmcc_client packets.
</summary>
@@ -40024,7 +40070,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mmcc_client_packets" lineno="50408">
+<interface name="corenet_relabelto_mmcc_client_packets" lineno="48020">
<summary>
Relabel packets to mmcc_client the packet type.
</summary>
@@ -40034,7 +40080,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mmcc_server_packets" lineno="50428">
+<interface name="corenet_send_mmcc_server_packets" lineno="48040">
<summary>
Send mmcc_server packets.
</summary>
@@ -40045,7 +40091,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="50447">
+<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="48059">
<summary>
Do not audit attempts to send mmcc_server packets.
</summary>
@@ -40056,7 +40102,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mmcc_server_packets" lineno="50466">
+<interface name="corenet_receive_mmcc_server_packets" lineno="48078">
<summary>
Receive mmcc_server packets.
</summary>
@@ -40067,7 +40113,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="50485">
+<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="48097">
<summary>
Do not audit attempts to receive mmcc_server packets.
</summary>
@@ -40078,7 +40124,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mmcc_server_packets" lineno="50504">
+<interface name="corenet_sendrecv_mmcc_server_packets" lineno="48116">
<summary>
Send and receive mmcc_server packets.
</summary>
@@ -40089,7 +40135,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="50520">
+<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="48132">
<summary>
Do not audit attempts to send and receive mmcc_server packets.
</summary>
@@ -40100,7 +40146,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mmcc_server_packets" lineno="50535">
+<interface name="corenet_relabelto_mmcc_server_packets" lineno="48147">
<summary>
Relabel packets to mmcc_server the packet type.
</summary>
@@ -40110,7 +40156,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mon_port" lineno="50557">
+<interface name="corenet_tcp_sendrecv_mon_port" lineno="48169">
<summary>
Send and receive TCP traffic on the mon port.
</summary>
@@ -40121,7 +40167,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mon_port" lineno="50576">
+<interface name="corenet_udp_send_mon_port" lineno="48184">
<summary>
Send UDP traffic on the mon port.
</summary>
@@ -40132,7 +40178,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mon_port" lineno="50595">
+<interface name="corenet_dontaudit_udp_send_mon_port" lineno="48199">
<summary>
Do not audit attempts to send UDP traffic on the mon port.
</summary>
@@ -40143,7 +40189,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mon_port" lineno="50614">
+<interface name="corenet_udp_receive_mon_port" lineno="48214">
<summary>
Receive UDP traffic on the mon port.
</summary>
@@ -40154,7 +40200,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mon_port" lineno="50633">
+<interface name="corenet_dontaudit_udp_receive_mon_port" lineno="48229">
<summary>
Do not audit attempts to receive UDP traffic on the mon port.
</summary>
@@ -40165,7 +40211,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mon_port" lineno="50652">
+<interface name="corenet_udp_sendrecv_mon_port" lineno="48244">
<summary>
Send and receive UDP traffic on the mon port.
</summary>
@@ -40176,7 +40222,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mon_port" lineno="50669">
+<interface name="corenet_dontaudit_udp_sendrecv_mon_port" lineno="48260">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mon port.
@@ -40188,7 +40234,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mon_port" lineno="50685">
+<interface name="corenet_tcp_bind_mon_port" lineno="48275">
<summary>
Bind TCP sockets to the mon port.
</summary>
@@ -40199,7 +40245,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mon_port" lineno="50705">
+<interface name="corenet_udp_bind_mon_port" lineno="48295">
<summary>
Bind UDP sockets to the mon port.
</summary>
@@ -40210,7 +40256,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mon_port" lineno="50724">
+<interface name="corenet_tcp_connect_mon_port" lineno="48314">
<summary>
Make a TCP connection to the mon port.
</summary>
@@ -40220,7 +40266,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mon_client_packets" lineno="50744">
+<interface name="corenet_send_mon_client_packets" lineno="48334">
<summary>
Send mon_client packets.
</summary>
@@ -40231,7 +40277,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mon_client_packets" lineno="50763">
+<interface name="corenet_dontaudit_send_mon_client_packets" lineno="48353">
<summary>
Do not audit attempts to send mon_client packets.
</summary>
@@ -40242,7 +40288,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mon_client_packets" lineno="50782">
+<interface name="corenet_receive_mon_client_packets" lineno="48372">
<summary>
Receive mon_client packets.
</summary>
@@ -40253,7 +40299,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="50801">
+<interface name="corenet_dontaudit_receive_mon_client_packets" lineno="48391">
<summary>
Do not audit attempts to receive mon_client packets.
</summary>
@@ -40264,7 +40310,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mon_client_packets" lineno="50820">
+<interface name="corenet_sendrecv_mon_client_packets" lineno="48410">
<summary>
Send and receive mon_client packets.
</summary>
@@ -40275,7 +40321,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="50836">
+<interface name="corenet_dontaudit_sendrecv_mon_client_packets" lineno="48426">
<summary>
Do not audit attempts to send and receive mon_client packets.
</summary>
@@ -40286,7 +40332,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mon_client_packets" lineno="50851">
+<interface name="corenet_relabelto_mon_client_packets" lineno="48441">
<summary>
Relabel packets to mon_client the packet type.
</summary>
@@ -40296,7 +40342,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mon_server_packets" lineno="50871">
+<interface name="corenet_send_mon_server_packets" lineno="48461">
<summary>
Send mon_server packets.
</summary>
@@ -40307,7 +40353,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mon_server_packets" lineno="50890">
+<interface name="corenet_dontaudit_send_mon_server_packets" lineno="48480">
<summary>
Do not audit attempts to send mon_server packets.
</summary>
@@ -40318,7 +40364,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mon_server_packets" lineno="50909">
+<interface name="corenet_receive_mon_server_packets" lineno="48499">
<summary>
Receive mon_server packets.
</summary>
@@ -40329,7 +40375,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="50928">
+<interface name="corenet_dontaudit_receive_mon_server_packets" lineno="48518">
<summary>
Do not audit attempts to receive mon_server packets.
</summary>
@@ -40340,7 +40386,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mon_server_packets" lineno="50947">
+<interface name="corenet_sendrecv_mon_server_packets" lineno="48537">
<summary>
Send and receive mon_server packets.
</summary>
@@ -40351,7 +40397,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="50963">
+<interface name="corenet_dontaudit_sendrecv_mon_server_packets" lineno="48553">
<summary>
Do not audit attempts to send and receive mon_server packets.
</summary>
@@ -40362,7 +40408,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mon_server_packets" lineno="50978">
+<interface name="corenet_relabelto_mon_server_packets" lineno="48568">
<summary>
Relabel packets to mon_server the packet type.
</summary>
@@ -40372,7 +40418,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_monit_port" lineno="51000">
+<interface name="corenet_tcp_sendrecv_monit_port" lineno="48590">
<summary>
Send and receive TCP traffic on the monit port.
</summary>
@@ -40383,7 +40429,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_monit_port" lineno="51019">
+<interface name="corenet_udp_send_monit_port" lineno="48605">
<summary>
Send UDP traffic on the monit port.
</summary>
@@ -40394,7 +40440,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_monit_port" lineno="51038">
+<interface name="corenet_dontaudit_udp_send_monit_port" lineno="48620">
<summary>
Do not audit attempts to send UDP traffic on the monit port.
</summary>
@@ -40405,7 +40451,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_monit_port" lineno="51057">
+<interface name="corenet_udp_receive_monit_port" lineno="48635">
<summary>
Receive UDP traffic on the monit port.
</summary>
@@ -40416,7 +40462,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_monit_port" lineno="51076">
+<interface name="corenet_dontaudit_udp_receive_monit_port" lineno="48650">
<summary>
Do not audit attempts to receive UDP traffic on the monit port.
</summary>
@@ -40427,7 +40473,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_monit_port" lineno="51095">
+<interface name="corenet_udp_sendrecv_monit_port" lineno="48665">
<summary>
Send and receive UDP traffic on the monit port.
</summary>
@@ -40438,7 +40484,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_monit_port" lineno="51112">
+<interface name="corenet_dontaudit_udp_sendrecv_monit_port" lineno="48681">
<summary>
Do not audit attempts to send and receive
UDP traffic on the monit port.
@@ -40450,7 +40496,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_monit_port" lineno="51128">
+<interface name="corenet_tcp_bind_monit_port" lineno="48696">
<summary>
Bind TCP sockets to the monit port.
</summary>
@@ -40461,7 +40507,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_monit_port" lineno="51148">
+<interface name="corenet_udp_bind_monit_port" lineno="48716">
<summary>
Bind UDP sockets to the monit port.
</summary>
@@ -40472,7 +40518,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_monit_port" lineno="51167">
+<interface name="corenet_tcp_connect_monit_port" lineno="48735">
<summary>
Make a TCP connection to the monit port.
</summary>
@@ -40482,7 +40528,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_monit_client_packets" lineno="51187">
+<interface name="corenet_send_monit_client_packets" lineno="48755">
<summary>
Send monit_client packets.
</summary>
@@ -40493,7 +40539,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_monit_client_packets" lineno="51206">
+<interface name="corenet_dontaudit_send_monit_client_packets" lineno="48774">
<summary>
Do not audit attempts to send monit_client packets.
</summary>
@@ -40504,7 +40550,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_monit_client_packets" lineno="51225">
+<interface name="corenet_receive_monit_client_packets" lineno="48793">
<summary>
Receive monit_client packets.
</summary>
@@ -40515,7 +40561,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="51244">
+<interface name="corenet_dontaudit_receive_monit_client_packets" lineno="48812">
<summary>
Do not audit attempts to receive monit_client packets.
</summary>
@@ -40526,7 +40572,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_monit_client_packets" lineno="51263">
+<interface name="corenet_sendrecv_monit_client_packets" lineno="48831">
<summary>
Send and receive monit_client packets.
</summary>
@@ -40537,7 +40583,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="51279">
+<interface name="corenet_dontaudit_sendrecv_monit_client_packets" lineno="48847">
<summary>
Do not audit attempts to send and receive monit_client packets.
</summary>
@@ -40548,7 +40594,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_monit_client_packets" lineno="51294">
+<interface name="corenet_relabelto_monit_client_packets" lineno="48862">
<summary>
Relabel packets to monit_client the packet type.
</summary>
@@ -40558,7 +40604,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_monit_server_packets" lineno="51314">
+<interface name="corenet_send_monit_server_packets" lineno="48882">
<summary>
Send monit_server packets.
</summary>
@@ -40569,7 +40615,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_monit_server_packets" lineno="51333">
+<interface name="corenet_dontaudit_send_monit_server_packets" lineno="48901">
<summary>
Do not audit attempts to send monit_server packets.
</summary>
@@ -40580,7 +40626,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_monit_server_packets" lineno="51352">
+<interface name="corenet_receive_monit_server_packets" lineno="48920">
<summary>
Receive monit_server packets.
</summary>
@@ -40591,7 +40637,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="51371">
+<interface name="corenet_dontaudit_receive_monit_server_packets" lineno="48939">
<summary>
Do not audit attempts to receive monit_server packets.
</summary>
@@ -40602,7 +40648,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_monit_server_packets" lineno="51390">
+<interface name="corenet_sendrecv_monit_server_packets" lineno="48958">
<summary>
Send and receive monit_server packets.
</summary>
@@ -40613,7 +40659,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="51406">
+<interface name="corenet_dontaudit_sendrecv_monit_server_packets" lineno="48974">
<summary>
Do not audit attempts to send and receive monit_server packets.
</summary>
@@ -40624,7 +40670,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_monit_server_packets" lineno="51421">
+<interface name="corenet_relabelto_monit_server_packets" lineno="48989">
<summary>
Relabel packets to monit_server the packet type.
</summary>
@@ -40634,7 +40680,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_monopd_port" lineno="51443">
+<interface name="corenet_tcp_sendrecv_monopd_port" lineno="49011">
<summary>
Send and receive TCP traffic on the monopd port.
</summary>
@@ -40645,7 +40691,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_monopd_port" lineno="51462">
+<interface name="corenet_udp_send_monopd_port" lineno="49026">
<summary>
Send UDP traffic on the monopd port.
</summary>
@@ -40656,7 +40702,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="51481">
+<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="49041">
<summary>
Do not audit attempts to send UDP traffic on the monopd port.
</summary>
@@ -40667,7 +40713,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_monopd_port" lineno="51500">
+<interface name="corenet_udp_receive_monopd_port" lineno="49056">
<summary>
Receive UDP traffic on the monopd port.
</summary>
@@ -40678,7 +40724,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="51519">
+<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="49071">
<summary>
Do not audit attempts to receive UDP traffic on the monopd port.
</summary>
@@ -40689,7 +40735,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_monopd_port" lineno="51538">
+<interface name="corenet_udp_sendrecv_monopd_port" lineno="49086">
<summary>
Send and receive UDP traffic on the monopd port.
</summary>
@@ -40700,7 +40746,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="51555">
+<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="49102">
<summary>
Do not audit attempts to send and receive
UDP traffic on the monopd port.
@@ -40712,7 +40758,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_monopd_port" lineno="51571">
+<interface name="corenet_tcp_bind_monopd_port" lineno="49117">
<summary>
Bind TCP sockets to the monopd port.
</summary>
@@ -40723,7 +40769,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_monopd_port" lineno="51591">
+<interface name="corenet_udp_bind_monopd_port" lineno="49137">
<summary>
Bind UDP sockets to the monopd port.
</summary>
@@ -40734,7 +40780,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_monopd_port" lineno="51610">
+<interface name="corenet_tcp_connect_monopd_port" lineno="49156">
<summary>
Make a TCP connection to the monopd port.
</summary>
@@ -40744,7 +40790,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_monopd_client_packets" lineno="51630">
+<interface name="corenet_send_monopd_client_packets" lineno="49176">
<summary>
Send monopd_client packets.
</summary>
@@ -40755,7 +40801,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="51649">
+<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="49195">
<summary>
Do not audit attempts to send monopd_client packets.
</summary>
@@ -40766,7 +40812,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_monopd_client_packets" lineno="51668">
+<interface name="corenet_receive_monopd_client_packets" lineno="49214">
<summary>
Receive monopd_client packets.
</summary>
@@ -40777,7 +40823,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="51687">
+<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="49233">
<summary>
Do not audit attempts to receive monopd_client packets.
</summary>
@@ -40788,7 +40834,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_monopd_client_packets" lineno="51706">
+<interface name="corenet_sendrecv_monopd_client_packets" lineno="49252">
<summary>
Send and receive monopd_client packets.
</summary>
@@ -40799,7 +40845,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="51722">
+<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="49268">
<summary>
Do not audit attempts to send and receive monopd_client packets.
</summary>
@@ -40810,7 +40856,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_monopd_client_packets" lineno="51737">
+<interface name="corenet_relabelto_monopd_client_packets" lineno="49283">
<summary>
Relabel packets to monopd_client the packet type.
</summary>
@@ -40820,7 +40866,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_monopd_server_packets" lineno="51757">
+<interface name="corenet_send_monopd_server_packets" lineno="49303">
<summary>
Send monopd_server packets.
</summary>
@@ -40831,7 +40877,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="51776">
+<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="49322">
<summary>
Do not audit attempts to send monopd_server packets.
</summary>
@@ -40842,7 +40888,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_monopd_server_packets" lineno="51795">
+<interface name="corenet_receive_monopd_server_packets" lineno="49341">
<summary>
Receive monopd_server packets.
</summary>
@@ -40853,7 +40899,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="51814">
+<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="49360">
<summary>
Do not audit attempts to receive monopd_server packets.
</summary>
@@ -40864,7 +40910,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_monopd_server_packets" lineno="51833">
+<interface name="corenet_sendrecv_monopd_server_packets" lineno="49379">
<summary>
Send and receive monopd_server packets.
</summary>
@@ -40875,7 +40921,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="51849">
+<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="49395">
<summary>
Do not audit attempts to send and receive monopd_server packets.
</summary>
@@ -40886,7 +40932,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_monopd_server_packets" lineno="51864">
+<interface name="corenet_relabelto_monopd_server_packets" lineno="49410">
<summary>
Relabel packets to monopd_server the packet type.
</summary>
@@ -40896,7 +40942,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mountd_port" lineno="51886">
+<interface name="corenet_tcp_sendrecv_mountd_port" lineno="49432">
<summary>
Send and receive TCP traffic on the mountd port.
</summary>
@@ -40907,7 +40953,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mountd_port" lineno="51905">
+<interface name="corenet_udp_send_mountd_port" lineno="49447">
<summary>
Send UDP traffic on the mountd port.
</summary>
@@ -40918,7 +40964,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="51924">
+<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="49462">
<summary>
Do not audit attempts to send UDP traffic on the mountd port.
</summary>
@@ -40929,7 +40975,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mountd_port" lineno="51943">
+<interface name="corenet_udp_receive_mountd_port" lineno="49477">
<summary>
Receive UDP traffic on the mountd port.
</summary>
@@ -40940,7 +40986,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="51962">
+<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="49492">
<summary>
Do not audit attempts to receive UDP traffic on the mountd port.
</summary>
@@ -40951,7 +40997,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mountd_port" lineno="51981">
+<interface name="corenet_udp_sendrecv_mountd_port" lineno="49507">
<summary>
Send and receive UDP traffic on the mountd port.
</summary>
@@ -40962,7 +41008,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="51998">
+<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="49523">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mountd port.
@@ -40974,7 +41020,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mountd_port" lineno="52014">
+<interface name="corenet_tcp_bind_mountd_port" lineno="49538">
<summary>
Bind TCP sockets to the mountd port.
</summary>
@@ -40985,7 +41031,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mountd_port" lineno="52034">
+<interface name="corenet_udp_bind_mountd_port" lineno="49558">
<summary>
Bind UDP sockets to the mountd port.
</summary>
@@ -40996,7 +41042,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mountd_port" lineno="52053">
+<interface name="corenet_tcp_connect_mountd_port" lineno="49577">
<summary>
Make a TCP connection to the mountd port.
</summary>
@@ -41006,7 +41052,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mountd_client_packets" lineno="52073">
+<interface name="corenet_send_mountd_client_packets" lineno="49597">
<summary>
Send mountd_client packets.
</summary>
@@ -41017,7 +41063,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="52092">
+<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="49616">
<summary>
Do not audit attempts to send mountd_client packets.
</summary>
@@ -41028,7 +41074,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mountd_client_packets" lineno="52111">
+<interface name="corenet_receive_mountd_client_packets" lineno="49635">
<summary>
Receive mountd_client packets.
</summary>
@@ -41039,7 +41085,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="52130">
+<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="49654">
<summary>
Do not audit attempts to receive mountd_client packets.
</summary>
@@ -41050,7 +41096,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mountd_client_packets" lineno="52149">
+<interface name="corenet_sendrecv_mountd_client_packets" lineno="49673">
<summary>
Send and receive mountd_client packets.
</summary>
@@ -41061,7 +41107,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="52165">
+<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="49689">
<summary>
Do not audit attempts to send and receive mountd_client packets.
</summary>
@@ -41072,7 +41118,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mountd_client_packets" lineno="52180">
+<interface name="corenet_relabelto_mountd_client_packets" lineno="49704">
<summary>
Relabel packets to mountd_client the packet type.
</summary>
@@ -41082,7 +41128,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mountd_server_packets" lineno="52200">
+<interface name="corenet_send_mountd_server_packets" lineno="49724">
<summary>
Send mountd_server packets.
</summary>
@@ -41093,7 +41139,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="52219">
+<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="49743">
<summary>
Do not audit attempts to send mountd_server packets.
</summary>
@@ -41104,7 +41150,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mountd_server_packets" lineno="52238">
+<interface name="corenet_receive_mountd_server_packets" lineno="49762">
<summary>
Receive mountd_server packets.
</summary>
@@ -41115,7 +41161,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="52257">
+<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="49781">
<summary>
Do not audit attempts to receive mountd_server packets.
</summary>
@@ -41126,7 +41172,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mountd_server_packets" lineno="52276">
+<interface name="corenet_sendrecv_mountd_server_packets" lineno="49800">
<summary>
Send and receive mountd_server packets.
</summary>
@@ -41137,7 +41183,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="52292">
+<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="49816">
<summary>
Do not audit attempts to send and receive mountd_server packets.
</summary>
@@ -41148,7 +41194,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mountd_server_packets" lineno="52307">
+<interface name="corenet_relabelto_mountd_server_packets" lineno="49831">
<summary>
Relabel packets to mountd_server the packet type.
</summary>
@@ -41158,7 +41204,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="52329">
+<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="49853">
<summary>
Send and receive TCP traffic on the movaz_ssc port.
</summary>
@@ -41169,7 +41215,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_movaz_ssc_port" lineno="52348">
+<interface name="corenet_udp_send_movaz_ssc_port" lineno="49868">
<summary>
Send UDP traffic on the movaz_ssc port.
</summary>
@@ -41180,7 +41226,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="52367">
+<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="49883">
<summary>
Do not audit attempts to send UDP traffic on the movaz_ssc port.
</summary>
@@ -41191,7 +41237,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_movaz_ssc_port" lineno="52386">
+<interface name="corenet_udp_receive_movaz_ssc_port" lineno="49898">
<summary>
Receive UDP traffic on the movaz_ssc port.
</summary>
@@ -41202,7 +41248,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="52405">
+<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="49913">
<summary>
Do not audit attempts to receive UDP traffic on the movaz_ssc port.
</summary>
@@ -41213,7 +41259,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="52424">
+<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="49928">
<summary>
Send and receive UDP traffic on the movaz_ssc port.
</summary>
@@ -41224,7 +41270,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="52441">
+<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="49944">
<summary>
Do not audit attempts to send and receive
UDP traffic on the movaz_ssc port.
@@ -41236,7 +41282,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="52457">
+<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="49959">
<summary>
Bind TCP sockets to the movaz_ssc port.
</summary>
@@ -41247,7 +41293,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_movaz_ssc_port" lineno="52477">
+<interface name="corenet_udp_bind_movaz_ssc_port" lineno="49979">
<summary>
Bind UDP sockets to the movaz_ssc port.
</summary>
@@ -41258,7 +41304,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="52496">
+<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="49998">
<summary>
Make a TCP connection to the movaz_ssc port.
</summary>
@@ -41268,7 +41314,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_movaz_ssc_client_packets" lineno="52516">
+<interface name="corenet_send_movaz_ssc_client_packets" lineno="50018">
<summary>
Send movaz_ssc_client packets.
</summary>
@@ -41279,7 +41325,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="52535">
+<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="50037">
<summary>
Do not audit attempts to send movaz_ssc_client packets.
</summary>
@@ -41290,7 +41336,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_movaz_ssc_client_packets" lineno="52554">
+<interface name="corenet_receive_movaz_ssc_client_packets" lineno="50056">
<summary>
Receive movaz_ssc_client packets.
</summary>
@@ -41301,7 +41347,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="52573">
+<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="50075">
<summary>
Do not audit attempts to receive movaz_ssc_client packets.
</summary>
@@ -41312,7 +41358,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="52592">
+<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="50094">
<summary>
Send and receive movaz_ssc_client packets.
</summary>
@@ -41323,7 +41369,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="52608">
+<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="50110">
<summary>
Do not audit attempts to send and receive movaz_ssc_client packets.
</summary>
@@ -41334,7 +41380,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="52623">
+<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="50125">
<summary>
Relabel packets to movaz_ssc_client the packet type.
</summary>
@@ -41344,7 +41390,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_movaz_ssc_server_packets" lineno="52643">
+<interface name="corenet_send_movaz_ssc_server_packets" lineno="50145">
<summary>
Send movaz_ssc_server packets.
</summary>
@@ -41355,7 +41401,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="52662">
+<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="50164">
<summary>
Do not audit attempts to send movaz_ssc_server packets.
</summary>
@@ -41366,7 +41412,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_movaz_ssc_server_packets" lineno="52681">
+<interface name="corenet_receive_movaz_ssc_server_packets" lineno="50183">
<summary>
Receive movaz_ssc_server packets.
</summary>
@@ -41377,7 +41423,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="52700">
+<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="50202">
<summary>
Do not audit attempts to receive movaz_ssc_server packets.
</summary>
@@ -41388,7 +41434,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="52719">
+<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="50221">
<summary>
Send and receive movaz_ssc_server packets.
</summary>
@@ -41399,7 +41445,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="52735">
+<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="50237">
<summary>
Do not audit attempts to send and receive movaz_ssc_server packets.
</summary>
@@ -41410,7 +41456,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="52750">
+<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="50252">
<summary>
Relabel packets to movaz_ssc_server the packet type.
</summary>
@@ -41420,7 +41466,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mpd_port" lineno="52772">
+<interface name="corenet_tcp_sendrecv_mpd_port" lineno="50274">
<summary>
Send and receive TCP traffic on the mpd port.
</summary>
@@ -41431,7 +41477,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mpd_port" lineno="52791">
+<interface name="corenet_udp_send_mpd_port" lineno="50289">
<summary>
Send UDP traffic on the mpd port.
</summary>
@@ -41442,7 +41488,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="52810">
+<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="50304">
<summary>
Do not audit attempts to send UDP traffic on the mpd port.
</summary>
@@ -41453,7 +41499,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mpd_port" lineno="52829">
+<interface name="corenet_udp_receive_mpd_port" lineno="50319">
<summary>
Receive UDP traffic on the mpd port.
</summary>
@@ -41464,7 +41510,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="52848">
+<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="50334">
<summary>
Do not audit attempts to receive UDP traffic on the mpd port.
</summary>
@@ -41475,7 +41521,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mpd_port" lineno="52867">
+<interface name="corenet_udp_sendrecv_mpd_port" lineno="50349">
<summary>
Send and receive UDP traffic on the mpd port.
</summary>
@@ -41486,7 +41532,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="52884">
+<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="50365">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mpd port.
@@ -41498,7 +41544,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mpd_port" lineno="52900">
+<interface name="corenet_tcp_bind_mpd_port" lineno="50380">
<summary>
Bind TCP sockets to the mpd port.
</summary>
@@ -41509,7 +41555,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mpd_port" lineno="52920">
+<interface name="corenet_udp_bind_mpd_port" lineno="50400">
<summary>
Bind UDP sockets to the mpd port.
</summary>
@@ -41520,7 +41566,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mpd_port" lineno="52939">
+<interface name="corenet_tcp_connect_mpd_port" lineno="50419">
<summary>
Make a TCP connection to the mpd port.
</summary>
@@ -41530,7 +41576,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mpd_client_packets" lineno="52959">
+<interface name="corenet_send_mpd_client_packets" lineno="50439">
<summary>
Send mpd_client packets.
</summary>
@@ -41541,7 +41587,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="52978">
+<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="50458">
<summary>
Do not audit attempts to send mpd_client packets.
</summary>
@@ -41552,7 +41598,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mpd_client_packets" lineno="52997">
+<interface name="corenet_receive_mpd_client_packets" lineno="50477">
<summary>
Receive mpd_client packets.
</summary>
@@ -41563,7 +41609,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="53016">
+<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="50496">
<summary>
Do not audit attempts to receive mpd_client packets.
</summary>
@@ -41574,7 +41620,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mpd_client_packets" lineno="53035">
+<interface name="corenet_sendrecv_mpd_client_packets" lineno="50515">
<summary>
Send and receive mpd_client packets.
</summary>
@@ -41585,7 +41631,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="53051">
+<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="50531">
<summary>
Do not audit attempts to send and receive mpd_client packets.
</summary>
@@ -41596,7 +41642,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mpd_client_packets" lineno="53066">
+<interface name="corenet_relabelto_mpd_client_packets" lineno="50546">
<summary>
Relabel packets to mpd_client the packet type.
</summary>
@@ -41606,7 +41652,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mpd_server_packets" lineno="53086">
+<interface name="corenet_send_mpd_server_packets" lineno="50566">
<summary>
Send mpd_server packets.
</summary>
@@ -41617,7 +41663,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="53105">
+<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="50585">
<summary>
Do not audit attempts to send mpd_server packets.
</summary>
@@ -41628,7 +41674,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mpd_server_packets" lineno="53124">
+<interface name="corenet_receive_mpd_server_packets" lineno="50604">
<summary>
Receive mpd_server packets.
</summary>
@@ -41639,7 +41685,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="53143">
+<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="50623">
<summary>
Do not audit attempts to receive mpd_server packets.
</summary>
@@ -41650,7 +41696,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mpd_server_packets" lineno="53162">
+<interface name="corenet_sendrecv_mpd_server_packets" lineno="50642">
<summary>
Send and receive mpd_server packets.
</summary>
@@ -41661,7 +41707,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="53178">
+<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="50658">
<summary>
Do not audit attempts to send and receive mpd_server packets.
</summary>
@@ -41672,7 +41718,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mpd_server_packets" lineno="53193">
+<interface name="corenet_relabelto_mpd_server_packets" lineno="50673">
<summary>
Relabel packets to mpd_server the packet type.
</summary>
@@ -41682,7 +41728,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_msgsrvr_port" lineno="53215">
+<interface name="corenet_tcp_sendrecv_msgsrvr_port" lineno="50695">
<summary>
Send and receive TCP traffic on the msgsrvr port.
</summary>
@@ -41693,7 +41739,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_msgsrvr_port" lineno="53234">
+<interface name="corenet_udp_send_msgsrvr_port" lineno="50710">
<summary>
Send UDP traffic on the msgsrvr port.
</summary>
@@ -41704,7 +41750,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_msgsrvr_port" lineno="53253">
+<interface name="corenet_dontaudit_udp_send_msgsrvr_port" lineno="50725">
<summary>
Do not audit attempts to send UDP traffic on the msgsrvr port.
</summary>
@@ -41715,7 +41761,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_msgsrvr_port" lineno="53272">
+<interface name="corenet_udp_receive_msgsrvr_port" lineno="50740">
<summary>
Receive UDP traffic on the msgsrvr port.
</summary>
@@ -41726,7 +41772,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_msgsrvr_port" lineno="53291">
+<interface name="corenet_dontaudit_udp_receive_msgsrvr_port" lineno="50755">
<summary>
Do not audit attempts to receive UDP traffic on the msgsrvr port.
</summary>
@@ -41737,7 +41783,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_msgsrvr_port" lineno="53310">
+<interface name="corenet_udp_sendrecv_msgsrvr_port" lineno="50770">
<summary>
Send and receive UDP traffic on the msgsrvr port.
</summary>
@@ -41748,7 +41794,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_msgsrvr_port" lineno="53327">
+<interface name="corenet_dontaudit_udp_sendrecv_msgsrvr_port" lineno="50786">
<summary>
Do not audit attempts to send and receive
UDP traffic on the msgsrvr port.
@@ -41760,7 +41806,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_msgsrvr_port" lineno="53343">
+<interface name="corenet_tcp_bind_msgsrvr_port" lineno="50801">
<summary>
Bind TCP sockets to the msgsrvr port.
</summary>
@@ -41771,7 +41817,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_msgsrvr_port" lineno="53363">
+<interface name="corenet_udp_bind_msgsrvr_port" lineno="50821">
<summary>
Bind UDP sockets to the msgsrvr port.
</summary>
@@ -41782,7 +41828,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_msgsrvr_port" lineno="53382">
+<interface name="corenet_tcp_connect_msgsrvr_port" lineno="50840">
<summary>
Make a TCP connection to the msgsrvr port.
</summary>
@@ -41792,7 +41838,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_msgsrvr_client_packets" lineno="53402">
+<interface name="corenet_send_msgsrvr_client_packets" lineno="50860">
<summary>
Send msgsrvr_client packets.
</summary>
@@ -41803,7 +41849,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="53421">
+<interface name="corenet_dontaudit_send_msgsrvr_client_packets" lineno="50879">
<summary>
Do not audit attempts to send msgsrvr_client packets.
</summary>
@@ -41814,7 +41860,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_msgsrvr_client_packets" lineno="53440">
+<interface name="corenet_receive_msgsrvr_client_packets" lineno="50898">
<summary>
Receive msgsrvr_client packets.
</summary>
@@ -41825,7 +41871,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="53459">
+<interface name="corenet_dontaudit_receive_msgsrvr_client_packets" lineno="50917">
<summary>
Do not audit attempts to receive msgsrvr_client packets.
</summary>
@@ -41836,7 +41882,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="53478">
+<interface name="corenet_sendrecv_msgsrvr_client_packets" lineno="50936">
<summary>
Send and receive msgsrvr_client packets.
</summary>
@@ -41847,7 +41893,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="53494">
+<interface name="corenet_dontaudit_sendrecv_msgsrvr_client_packets" lineno="50952">
<summary>
Do not audit attempts to send and receive msgsrvr_client packets.
</summary>
@@ -41858,7 +41904,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="53509">
+<interface name="corenet_relabelto_msgsrvr_client_packets" lineno="50967">
<summary>
Relabel packets to msgsrvr_client the packet type.
</summary>
@@ -41868,7 +41914,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_msgsrvr_server_packets" lineno="53529">
+<interface name="corenet_send_msgsrvr_server_packets" lineno="50987">
<summary>
Send msgsrvr_server packets.
</summary>
@@ -41879,7 +41925,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="53548">
+<interface name="corenet_dontaudit_send_msgsrvr_server_packets" lineno="51006">
<summary>
Do not audit attempts to send msgsrvr_server packets.
</summary>
@@ -41890,7 +41936,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_msgsrvr_server_packets" lineno="53567">
+<interface name="corenet_receive_msgsrvr_server_packets" lineno="51025">
<summary>
Receive msgsrvr_server packets.
</summary>
@@ -41901,7 +41947,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="53586">
+<interface name="corenet_dontaudit_receive_msgsrvr_server_packets" lineno="51044">
<summary>
Do not audit attempts to receive msgsrvr_server packets.
</summary>
@@ -41912,7 +41958,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="53605">
+<interface name="corenet_sendrecv_msgsrvr_server_packets" lineno="51063">
<summary>
Send and receive msgsrvr_server packets.
</summary>
@@ -41923,7 +41969,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="53621">
+<interface name="corenet_dontaudit_sendrecv_msgsrvr_server_packets" lineno="51079">
<summary>
Do not audit attempts to send and receive msgsrvr_server packets.
</summary>
@@ -41934,7 +41980,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="53636">
+<interface name="corenet_relabelto_msgsrvr_server_packets" lineno="51094">
<summary>
Relabel packets to msgsrvr_server the packet type.
</summary>
@@ -41944,7 +41990,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_msnp_port" lineno="53658">
+<interface name="corenet_tcp_sendrecv_msnp_port" lineno="51116">
<summary>
Send and receive TCP traffic on the msnp port.
</summary>
@@ -41955,7 +42001,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_msnp_port" lineno="53677">
+<interface name="corenet_udp_send_msnp_port" lineno="51131">
<summary>
Send UDP traffic on the msnp port.
</summary>
@@ -41966,7 +42012,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="53696">
+<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="51146">
<summary>
Do not audit attempts to send UDP traffic on the msnp port.
</summary>
@@ -41977,7 +42023,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_msnp_port" lineno="53715">
+<interface name="corenet_udp_receive_msnp_port" lineno="51161">
<summary>
Receive UDP traffic on the msnp port.
</summary>
@@ -41988,7 +42034,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="53734">
+<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="51176">
<summary>
Do not audit attempts to receive UDP traffic on the msnp port.
</summary>
@@ -41999,7 +42045,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_msnp_port" lineno="53753">
+<interface name="corenet_udp_sendrecv_msnp_port" lineno="51191">
<summary>
Send and receive UDP traffic on the msnp port.
</summary>
@@ -42010,7 +42056,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="53770">
+<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="51207">
<summary>
Do not audit attempts to send and receive
UDP traffic on the msnp port.
@@ -42022,7 +42068,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_msnp_port" lineno="53786">
+<interface name="corenet_tcp_bind_msnp_port" lineno="51222">
<summary>
Bind TCP sockets to the msnp port.
</summary>
@@ -42033,7 +42079,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_msnp_port" lineno="53806">
+<interface name="corenet_udp_bind_msnp_port" lineno="51242">
<summary>
Bind UDP sockets to the msnp port.
</summary>
@@ -42044,7 +42090,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_msnp_port" lineno="53825">
+<interface name="corenet_tcp_connect_msnp_port" lineno="51261">
<summary>
Make a TCP connection to the msnp port.
</summary>
@@ -42054,7 +42100,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_msnp_client_packets" lineno="53845">
+<interface name="corenet_send_msnp_client_packets" lineno="51281">
<summary>
Send msnp_client packets.
</summary>
@@ -42065,7 +42111,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="53864">
+<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="51300">
<summary>
Do not audit attempts to send msnp_client packets.
</summary>
@@ -42076,7 +42122,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_msnp_client_packets" lineno="53883">
+<interface name="corenet_receive_msnp_client_packets" lineno="51319">
<summary>
Receive msnp_client packets.
</summary>
@@ -42087,7 +42133,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="53902">
+<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="51338">
<summary>
Do not audit attempts to receive msnp_client packets.
</summary>
@@ -42098,7 +42144,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_msnp_client_packets" lineno="53921">
+<interface name="corenet_sendrecv_msnp_client_packets" lineno="51357">
<summary>
Send and receive msnp_client packets.
</summary>
@@ -42109,7 +42155,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="53937">
+<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="51373">
<summary>
Do not audit attempts to send and receive msnp_client packets.
</summary>
@@ -42120,7 +42166,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_msnp_client_packets" lineno="53952">
+<interface name="corenet_relabelto_msnp_client_packets" lineno="51388">
<summary>
Relabel packets to msnp_client the packet type.
</summary>
@@ -42130,7 +42176,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_msnp_server_packets" lineno="53972">
+<interface name="corenet_send_msnp_server_packets" lineno="51408">
<summary>
Send msnp_server packets.
</summary>
@@ -42141,7 +42187,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="53991">
+<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="51427">
<summary>
Do not audit attempts to send msnp_server packets.
</summary>
@@ -42152,7 +42198,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_msnp_server_packets" lineno="54010">
+<interface name="corenet_receive_msnp_server_packets" lineno="51446">
<summary>
Receive msnp_server packets.
</summary>
@@ -42163,7 +42209,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="54029">
+<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="51465">
<summary>
Do not audit attempts to receive msnp_server packets.
</summary>
@@ -42174,7 +42220,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_msnp_server_packets" lineno="54048">
+<interface name="corenet_sendrecv_msnp_server_packets" lineno="51484">
<summary>
Send and receive msnp_server packets.
</summary>
@@ -42185,7 +42231,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="54064">
+<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="51500">
<summary>
Do not audit attempts to send and receive msnp_server packets.
</summary>
@@ -42196,7 +42242,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_msnp_server_packets" lineno="54079">
+<interface name="corenet_relabelto_msnp_server_packets" lineno="51515">
<summary>
Relabel packets to msnp_server the packet type.
</summary>
@@ -42206,7 +42252,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mssql_port" lineno="54101">
+<interface name="corenet_tcp_sendrecv_mssql_port" lineno="51537">
<summary>
Send and receive TCP traffic on the mssql port.
</summary>
@@ -42217,7 +42263,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mssql_port" lineno="54120">
+<interface name="corenet_udp_send_mssql_port" lineno="51552">
<summary>
Send UDP traffic on the mssql port.
</summary>
@@ -42228,7 +42274,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="54139">
+<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="51567">
<summary>
Do not audit attempts to send UDP traffic on the mssql port.
</summary>
@@ -42239,7 +42285,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mssql_port" lineno="54158">
+<interface name="corenet_udp_receive_mssql_port" lineno="51582">
<summary>
Receive UDP traffic on the mssql port.
</summary>
@@ -42250,7 +42296,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="54177">
+<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="51597">
<summary>
Do not audit attempts to receive UDP traffic on the mssql port.
</summary>
@@ -42261,7 +42307,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mssql_port" lineno="54196">
+<interface name="corenet_udp_sendrecv_mssql_port" lineno="51612">
<summary>
Send and receive UDP traffic on the mssql port.
</summary>
@@ -42272,7 +42318,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="54213">
+<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="51628">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mssql port.
@@ -42284,7 +42330,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mssql_port" lineno="54229">
+<interface name="corenet_tcp_bind_mssql_port" lineno="51643">
<summary>
Bind TCP sockets to the mssql port.
</summary>
@@ -42295,7 +42341,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mssql_port" lineno="54249">
+<interface name="corenet_udp_bind_mssql_port" lineno="51663">
<summary>
Bind UDP sockets to the mssql port.
</summary>
@@ -42306,7 +42352,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mssql_port" lineno="54268">
+<interface name="corenet_tcp_connect_mssql_port" lineno="51682">
<summary>
Make a TCP connection to the mssql port.
</summary>
@@ -42316,7 +42362,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mssql_client_packets" lineno="54288">
+<interface name="corenet_send_mssql_client_packets" lineno="51702">
<summary>
Send mssql_client packets.
</summary>
@@ -42327,7 +42373,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="54307">
+<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="51721">
<summary>
Do not audit attempts to send mssql_client packets.
</summary>
@@ -42338,7 +42384,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mssql_client_packets" lineno="54326">
+<interface name="corenet_receive_mssql_client_packets" lineno="51740">
<summary>
Receive mssql_client packets.
</summary>
@@ -42349,7 +42395,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="54345">
+<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="51759">
<summary>
Do not audit attempts to receive mssql_client packets.
</summary>
@@ -42360,7 +42406,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mssql_client_packets" lineno="54364">
+<interface name="corenet_sendrecv_mssql_client_packets" lineno="51778">
<summary>
Send and receive mssql_client packets.
</summary>
@@ -42371,7 +42417,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="54380">
+<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="51794">
<summary>
Do not audit attempts to send and receive mssql_client packets.
</summary>
@@ -42382,7 +42428,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mssql_client_packets" lineno="54395">
+<interface name="corenet_relabelto_mssql_client_packets" lineno="51809">
<summary>
Relabel packets to mssql_client the packet type.
</summary>
@@ -42392,7 +42438,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mssql_server_packets" lineno="54415">
+<interface name="corenet_send_mssql_server_packets" lineno="51829">
<summary>
Send mssql_server packets.
</summary>
@@ -42403,7 +42449,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="54434">
+<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="51848">
<summary>
Do not audit attempts to send mssql_server packets.
</summary>
@@ -42414,7 +42460,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mssql_server_packets" lineno="54453">
+<interface name="corenet_receive_mssql_server_packets" lineno="51867">
<summary>
Receive mssql_server packets.
</summary>
@@ -42425,7 +42471,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="54472">
+<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="51886">
<summary>
Do not audit attempts to receive mssql_server packets.
</summary>
@@ -42436,7 +42482,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mssql_server_packets" lineno="54491">
+<interface name="corenet_sendrecv_mssql_server_packets" lineno="51905">
<summary>
Send and receive mssql_server packets.
</summary>
@@ -42447,7 +42493,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="54507">
+<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="51921">
<summary>
Do not audit attempts to send and receive mssql_server packets.
</summary>
@@ -42458,7 +42504,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mssql_server_packets" lineno="54522">
+<interface name="corenet_relabelto_mssql_server_packets" lineno="51936">
<summary>
Relabel packets to mssql_server the packet type.
</summary>
@@ -42468,7 +42514,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="54544">
+<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="51958">
<summary>
Send and receive TCP traffic on the ms_streaming port.
</summary>
@@ -42479,7 +42525,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ms_streaming_port" lineno="54563">
+<interface name="corenet_udp_send_ms_streaming_port" lineno="51973">
<summary>
Send UDP traffic on the ms_streaming port.
</summary>
@@ -42490,7 +42536,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="54582">
+<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="51988">
<summary>
Do not audit attempts to send UDP traffic on the ms_streaming port.
</summary>
@@ -42501,7 +42547,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ms_streaming_port" lineno="54601">
+<interface name="corenet_udp_receive_ms_streaming_port" lineno="52003">
<summary>
Receive UDP traffic on the ms_streaming port.
</summary>
@@ -42512,7 +42558,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="54620">
+<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="52018">
<summary>
Do not audit attempts to receive UDP traffic on the ms_streaming port.
</summary>
@@ -42523,7 +42569,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="54639">
+<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="52033">
<summary>
Send and receive UDP traffic on the ms_streaming port.
</summary>
@@ -42534,7 +42580,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="54656">
+<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="52049">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ms_streaming port.
@@ -42546,7 +42592,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ms_streaming_port" lineno="54672">
+<interface name="corenet_tcp_bind_ms_streaming_port" lineno="52064">
<summary>
Bind TCP sockets to the ms_streaming port.
</summary>
@@ -42557,7 +42603,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ms_streaming_port" lineno="54692">
+<interface name="corenet_udp_bind_ms_streaming_port" lineno="52084">
<summary>
Bind UDP sockets to the ms_streaming port.
</summary>
@@ -42568,7 +42614,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ms_streaming_port" lineno="54711">
+<interface name="corenet_tcp_connect_ms_streaming_port" lineno="52103">
<summary>
Make a TCP connection to the ms_streaming port.
</summary>
@@ -42578,7 +42624,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ms_streaming_client_packets" lineno="54731">
+<interface name="corenet_send_ms_streaming_client_packets" lineno="52123">
<summary>
Send ms_streaming_client packets.
</summary>
@@ -42589,7 +42635,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="54750">
+<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="52142">
<summary>
Do not audit attempts to send ms_streaming_client packets.
</summary>
@@ -42600,7 +42646,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ms_streaming_client_packets" lineno="54769">
+<interface name="corenet_receive_ms_streaming_client_packets" lineno="52161">
<summary>
Receive ms_streaming_client packets.
</summary>
@@ -42611,7 +42657,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="54788">
+<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="52180">
<summary>
Do not audit attempts to receive ms_streaming_client packets.
</summary>
@@ -42622,7 +42668,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="54807">
+<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="52199">
<summary>
Send and receive ms_streaming_client packets.
</summary>
@@ -42633,7 +42679,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="54823">
+<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="52215">
<summary>
Do not audit attempts to send and receive ms_streaming_client packets.
</summary>
@@ -42644,7 +42690,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="54838">
+<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="52230">
<summary>
Relabel packets to ms_streaming_client the packet type.
</summary>
@@ -42654,7 +42700,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ms_streaming_server_packets" lineno="54858">
+<interface name="corenet_send_ms_streaming_server_packets" lineno="52250">
<summary>
Send ms_streaming_server packets.
</summary>
@@ -42665,7 +42711,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="54877">
+<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="52269">
<summary>
Do not audit attempts to send ms_streaming_server packets.
</summary>
@@ -42676,7 +42722,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ms_streaming_server_packets" lineno="54896">
+<interface name="corenet_receive_ms_streaming_server_packets" lineno="52288">
<summary>
Receive ms_streaming_server packets.
</summary>
@@ -42687,7 +42733,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="54915">
+<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="52307">
<summary>
Do not audit attempts to receive ms_streaming_server packets.
</summary>
@@ -42698,7 +42744,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="54934">
+<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="52326">
<summary>
Send and receive ms_streaming_server packets.
</summary>
@@ -42709,7 +42755,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="54950">
+<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="52342">
<summary>
Do not audit attempts to send and receive ms_streaming_server packets.
</summary>
@@ -42720,7 +42766,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="54965">
+<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="52357">
<summary>
Relabel packets to ms_streaming_server the packet type.
</summary>
@@ -42730,7 +42776,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_munin_port" lineno="54987">
+<interface name="corenet_tcp_sendrecv_munin_port" lineno="52379">
<summary>
Send and receive TCP traffic on the munin port.
</summary>
@@ -42741,7 +42787,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_munin_port" lineno="55006">
+<interface name="corenet_udp_send_munin_port" lineno="52394">
<summary>
Send UDP traffic on the munin port.
</summary>
@@ -42752,7 +42798,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_munin_port" lineno="55025">
+<interface name="corenet_dontaudit_udp_send_munin_port" lineno="52409">
<summary>
Do not audit attempts to send UDP traffic on the munin port.
</summary>
@@ -42763,7 +42809,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_munin_port" lineno="55044">
+<interface name="corenet_udp_receive_munin_port" lineno="52424">
<summary>
Receive UDP traffic on the munin port.
</summary>
@@ -42774,7 +42820,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="55063">
+<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="52439">
<summary>
Do not audit attempts to receive UDP traffic on the munin port.
</summary>
@@ -42785,7 +42831,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_munin_port" lineno="55082">
+<interface name="corenet_udp_sendrecv_munin_port" lineno="52454">
<summary>
Send and receive UDP traffic on the munin port.
</summary>
@@ -42796,7 +42842,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="55099">
+<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="52470">
<summary>
Do not audit attempts to send and receive
UDP traffic on the munin port.
@@ -42808,7 +42854,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_munin_port" lineno="55115">
+<interface name="corenet_tcp_bind_munin_port" lineno="52485">
<summary>
Bind TCP sockets to the munin port.
</summary>
@@ -42819,7 +42865,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_munin_port" lineno="55135">
+<interface name="corenet_udp_bind_munin_port" lineno="52505">
<summary>
Bind UDP sockets to the munin port.
</summary>
@@ -42830,7 +42876,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_munin_port" lineno="55154">
+<interface name="corenet_tcp_connect_munin_port" lineno="52524">
<summary>
Make a TCP connection to the munin port.
</summary>
@@ -42840,7 +42886,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_munin_client_packets" lineno="55174">
+<interface name="corenet_send_munin_client_packets" lineno="52544">
<summary>
Send munin_client packets.
</summary>
@@ -42851,7 +42897,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_munin_client_packets" lineno="55193">
+<interface name="corenet_dontaudit_send_munin_client_packets" lineno="52563">
<summary>
Do not audit attempts to send munin_client packets.
</summary>
@@ -42862,7 +42908,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_munin_client_packets" lineno="55212">
+<interface name="corenet_receive_munin_client_packets" lineno="52582">
<summary>
Receive munin_client packets.
</summary>
@@ -42873,7 +42919,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="55231">
+<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="52601">
<summary>
Do not audit attempts to receive munin_client packets.
</summary>
@@ -42884,7 +42930,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_munin_client_packets" lineno="55250">
+<interface name="corenet_sendrecv_munin_client_packets" lineno="52620">
<summary>
Send and receive munin_client packets.
</summary>
@@ -42895,7 +42941,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="55266">
+<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="52636">
<summary>
Do not audit attempts to send and receive munin_client packets.
</summary>
@@ -42906,7 +42952,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_munin_client_packets" lineno="55281">
+<interface name="corenet_relabelto_munin_client_packets" lineno="52651">
<summary>
Relabel packets to munin_client the packet type.
</summary>
@@ -42916,7 +42962,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_munin_server_packets" lineno="55301">
+<interface name="corenet_send_munin_server_packets" lineno="52671">
<summary>
Send munin_server packets.
</summary>
@@ -42927,7 +42973,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_munin_server_packets" lineno="55320">
+<interface name="corenet_dontaudit_send_munin_server_packets" lineno="52690">
<summary>
Do not audit attempts to send munin_server packets.
</summary>
@@ -42938,7 +42984,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_munin_server_packets" lineno="55339">
+<interface name="corenet_receive_munin_server_packets" lineno="52709">
<summary>
Receive munin_server packets.
</summary>
@@ -42949,7 +42995,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="55358">
+<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="52728">
<summary>
Do not audit attempts to receive munin_server packets.
</summary>
@@ -42960,7 +43006,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_munin_server_packets" lineno="55377">
+<interface name="corenet_sendrecv_munin_server_packets" lineno="52747">
<summary>
Send and receive munin_server packets.
</summary>
@@ -42971,7 +43017,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="55393">
+<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="52763">
<summary>
Do not audit attempts to send and receive munin_server packets.
</summary>
@@ -42982,7 +43028,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_munin_server_packets" lineno="55408">
+<interface name="corenet_relabelto_munin_server_packets" lineno="52778">
<summary>
Relabel packets to munin_server the packet type.
</summary>
@@ -42992,7 +43038,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mxi_port" lineno="55430">
+<interface name="corenet_tcp_sendrecv_mxi_port" lineno="52800">
<summary>
Send and receive TCP traffic on the mxi port.
</summary>
@@ -43003,7 +43049,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mxi_port" lineno="55449">
+<interface name="corenet_udp_send_mxi_port" lineno="52815">
<summary>
Send UDP traffic on the mxi port.
</summary>
@@ -43014,7 +43060,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="55468">
+<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="52830">
<summary>
Do not audit attempts to send UDP traffic on the mxi port.
</summary>
@@ -43025,7 +43071,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mxi_port" lineno="55487">
+<interface name="corenet_udp_receive_mxi_port" lineno="52845">
<summary>
Receive UDP traffic on the mxi port.
</summary>
@@ -43036,7 +43082,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="55506">
+<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="52860">
<summary>
Do not audit attempts to receive UDP traffic on the mxi port.
</summary>
@@ -43047,7 +43093,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mxi_port" lineno="55525">
+<interface name="corenet_udp_sendrecv_mxi_port" lineno="52875">
<summary>
Send and receive UDP traffic on the mxi port.
</summary>
@@ -43058,7 +43104,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="55542">
+<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="52891">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mxi port.
@@ -43070,7 +43116,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mxi_port" lineno="55558">
+<interface name="corenet_tcp_bind_mxi_port" lineno="52906">
<summary>
Bind TCP sockets to the mxi port.
</summary>
@@ -43081,7 +43127,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mxi_port" lineno="55578">
+<interface name="corenet_udp_bind_mxi_port" lineno="52926">
<summary>
Bind UDP sockets to the mxi port.
</summary>
@@ -43092,7 +43138,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mxi_port" lineno="55597">
+<interface name="corenet_tcp_connect_mxi_port" lineno="52945">
<summary>
Make a TCP connection to the mxi port.
</summary>
@@ -43102,7 +43148,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mxi_client_packets" lineno="55617">
+<interface name="corenet_send_mxi_client_packets" lineno="52965">
<summary>
Send mxi_client packets.
</summary>
@@ -43113,7 +43159,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="55636">
+<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="52984">
<summary>
Do not audit attempts to send mxi_client packets.
</summary>
@@ -43124,7 +43170,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mxi_client_packets" lineno="55655">
+<interface name="corenet_receive_mxi_client_packets" lineno="53003">
<summary>
Receive mxi_client packets.
</summary>
@@ -43135,7 +43181,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="55674">
+<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="53022">
<summary>
Do not audit attempts to receive mxi_client packets.
</summary>
@@ -43146,7 +43192,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mxi_client_packets" lineno="55693">
+<interface name="corenet_sendrecv_mxi_client_packets" lineno="53041">
<summary>
Send and receive mxi_client packets.
</summary>
@@ -43157,7 +43203,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="55709">
+<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="53057">
<summary>
Do not audit attempts to send and receive mxi_client packets.
</summary>
@@ -43168,7 +43214,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mxi_client_packets" lineno="55724">
+<interface name="corenet_relabelto_mxi_client_packets" lineno="53072">
<summary>
Relabel packets to mxi_client the packet type.
</summary>
@@ -43178,7 +43224,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mxi_server_packets" lineno="55744">
+<interface name="corenet_send_mxi_server_packets" lineno="53092">
<summary>
Send mxi_server packets.
</summary>
@@ -43189,7 +43235,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="55763">
+<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="53111">
<summary>
Do not audit attempts to send mxi_server packets.
</summary>
@@ -43200,7 +43246,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mxi_server_packets" lineno="55782">
+<interface name="corenet_receive_mxi_server_packets" lineno="53130">
<summary>
Receive mxi_server packets.
</summary>
@@ -43211,7 +43257,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="55801">
+<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="53149">
<summary>
Do not audit attempts to receive mxi_server packets.
</summary>
@@ -43222,7 +43268,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mxi_server_packets" lineno="55820">
+<interface name="corenet_sendrecv_mxi_server_packets" lineno="53168">
<summary>
Send and receive mxi_server packets.
</summary>
@@ -43233,7 +43279,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="55836">
+<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="53184">
<summary>
Do not audit attempts to send and receive mxi_server packets.
</summary>
@@ -43244,7 +43290,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mxi_server_packets" lineno="55851">
+<interface name="corenet_relabelto_mxi_server_packets" lineno="53199">
<summary>
Relabel packets to mxi_server the packet type.
</summary>
@@ -43254,7 +43300,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="55873">
+<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="53221">
<summary>
Send and receive TCP traffic on the mysqld port.
</summary>
@@ -43265,7 +43311,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mysqld_port" lineno="55892">
+<interface name="corenet_udp_send_mysqld_port" lineno="53236">
<summary>
Send UDP traffic on the mysqld port.
</summary>
@@ -43276,7 +43322,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="55911">
+<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="53251">
<summary>
Do not audit attempts to send UDP traffic on the mysqld port.
</summary>
@@ -43287,7 +43333,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mysqld_port" lineno="55930">
+<interface name="corenet_udp_receive_mysqld_port" lineno="53266">
<summary>
Receive UDP traffic on the mysqld port.
</summary>
@@ -43298,7 +43344,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="55949">
+<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="53281">
<summary>
Do not audit attempts to receive UDP traffic on the mysqld port.
</summary>
@@ -43309,7 +43355,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mysqld_port" lineno="55968">
+<interface name="corenet_udp_sendrecv_mysqld_port" lineno="53296">
<summary>
Send and receive UDP traffic on the mysqld port.
</summary>
@@ -43320,7 +43366,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="55985">
+<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="53312">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mysqld port.
@@ -43332,7 +43378,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mysqld_port" lineno="56001">
+<interface name="corenet_tcp_bind_mysqld_port" lineno="53327">
<summary>
Bind TCP sockets to the mysqld port.
</summary>
@@ -43343,7 +43389,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mysqld_port" lineno="56021">
+<interface name="corenet_udp_bind_mysqld_port" lineno="53347">
<summary>
Bind UDP sockets to the mysqld port.
</summary>
@@ -43354,7 +43400,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mysqld_port" lineno="56040">
+<interface name="corenet_tcp_connect_mysqld_port" lineno="53366">
<summary>
Make a TCP connection to the mysqld port.
</summary>
@@ -43364,7 +43410,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mysqld_client_packets" lineno="56060">
+<interface name="corenet_send_mysqld_client_packets" lineno="53386">
<summary>
Send mysqld_client packets.
</summary>
@@ -43375,7 +43421,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="56079">
+<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="53405">
<summary>
Do not audit attempts to send mysqld_client packets.
</summary>
@@ -43386,7 +43432,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mysqld_client_packets" lineno="56098">
+<interface name="corenet_receive_mysqld_client_packets" lineno="53424">
<summary>
Receive mysqld_client packets.
</summary>
@@ -43397,7 +43443,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="56117">
+<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="53443">
<summary>
Do not audit attempts to receive mysqld_client packets.
</summary>
@@ -43408,7 +43454,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mysqld_client_packets" lineno="56136">
+<interface name="corenet_sendrecv_mysqld_client_packets" lineno="53462">
<summary>
Send and receive mysqld_client packets.
</summary>
@@ -43419,7 +43465,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="56152">
+<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="53478">
<summary>
Do not audit attempts to send and receive mysqld_client packets.
</summary>
@@ -43430,7 +43476,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mysqld_client_packets" lineno="56167">
+<interface name="corenet_relabelto_mysqld_client_packets" lineno="53493">
<summary>
Relabel packets to mysqld_client the packet type.
</summary>
@@ -43440,7 +43486,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mysqld_server_packets" lineno="56187">
+<interface name="corenet_send_mysqld_server_packets" lineno="53513">
<summary>
Send mysqld_server packets.
</summary>
@@ -43451,7 +43497,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="56206">
+<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="53532">
<summary>
Do not audit attempts to send mysqld_server packets.
</summary>
@@ -43462,7 +43508,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mysqld_server_packets" lineno="56225">
+<interface name="corenet_receive_mysqld_server_packets" lineno="53551">
<summary>
Receive mysqld_server packets.
</summary>
@@ -43473,7 +43519,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="56244">
+<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="53570">
<summary>
Do not audit attempts to receive mysqld_server packets.
</summary>
@@ -43484,7 +43530,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mysqld_server_packets" lineno="56263">
+<interface name="corenet_sendrecv_mysqld_server_packets" lineno="53589">
<summary>
Send and receive mysqld_server packets.
</summary>
@@ -43495,7 +43541,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="56279">
+<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="53605">
<summary>
Do not audit attempts to send and receive mysqld_server packets.
</summary>
@@ -43506,7 +43552,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mysqld_server_packets" lineno="56294">
+<interface name="corenet_relabelto_mysqld_server_packets" lineno="53620">
<summary>
Relabel packets to mysqld_server the packet type.
</summary>
@@ -43516,7 +43562,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="56316">
+<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="53642">
<summary>
Send and receive TCP traffic on the mysqlmanagerd port.
</summary>
@@ -43527,7 +43573,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="56335">
+<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="53657">
<summary>
Send UDP traffic on the mysqlmanagerd port.
</summary>
@@ -43538,7 +43584,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="56354">
+<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="53672">
<summary>
Do not audit attempts to send UDP traffic on the mysqlmanagerd port.
</summary>
@@ -43549,7 +43595,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="56373">
+<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="53687">
<summary>
Receive UDP traffic on the mysqlmanagerd port.
</summary>
@@ -43560,7 +43606,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="56392">
+<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="53702">
<summary>
Do not audit attempts to receive UDP traffic on the mysqlmanagerd port.
</summary>
@@ -43571,7 +43617,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="56411">
+<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="53717">
<summary>
Send and receive UDP traffic on the mysqlmanagerd port.
</summary>
@@ -43582,7 +43628,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="56428">
+<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="53733">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mysqlmanagerd port.
@@ -43594,7 +43640,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="56444">
+<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="53748">
<summary>
Bind TCP sockets to the mysqlmanagerd port.
</summary>
@@ -43605,7 +43651,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="56464">
+<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="53768">
<summary>
Bind UDP sockets to the mysqlmanagerd port.
</summary>
@@ -43616,7 +43662,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="56483">
+<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="53787">
<summary>
Make a TCP connection to the mysqlmanagerd port.
</summary>
@@ -43626,7 +43672,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="56503">
+<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="53807">
<summary>
Send mysqlmanagerd_client packets.
</summary>
@@ -43637,7 +43683,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="56522">
+<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="53826">
<summary>
Do not audit attempts to send mysqlmanagerd_client packets.
</summary>
@@ -43648,7 +43694,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="56541">
+<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="53845">
<summary>
Receive mysqlmanagerd_client packets.
</summary>
@@ -43659,7 +43705,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="56560">
+<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="53864">
<summary>
Do not audit attempts to receive mysqlmanagerd_client packets.
</summary>
@@ -43670,7 +43716,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="56579">
+<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="53883">
<summary>
Send and receive mysqlmanagerd_client packets.
</summary>
@@ -43681,7 +43727,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="56595">
+<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="53899">
<summary>
Do not audit attempts to send and receive mysqlmanagerd_client packets.
</summary>
@@ -43692,7 +43738,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="56610">
+<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="53914">
<summary>
Relabel packets to mysqlmanagerd_client the packet type.
</summary>
@@ -43702,7 +43748,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="56630">
+<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="53934">
<summary>
Send mysqlmanagerd_server packets.
</summary>
@@ -43713,7 +43759,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="56649">
+<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="53953">
<summary>
Do not audit attempts to send mysqlmanagerd_server packets.
</summary>
@@ -43724,7 +43770,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="56668">
+<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="53972">
<summary>
Receive mysqlmanagerd_server packets.
</summary>
@@ -43735,7 +43781,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="56687">
+<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="53991">
<summary>
Do not audit attempts to receive mysqlmanagerd_server packets.
</summary>
@@ -43746,7 +43792,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="56706">
+<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="54010">
<summary>
Send and receive mysqlmanagerd_server packets.
</summary>
@@ -43757,7 +43803,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="56722">
+<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="54026">
<summary>
Do not audit attempts to send and receive mysqlmanagerd_server packets.
</summary>
@@ -43768,7 +43814,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="56737">
+<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="54041">
<summary>
Relabel packets to mysqlmanagerd_server the packet type.
</summary>
@@ -43778,7 +43824,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_nessus_port" lineno="56759">
+<interface name="corenet_tcp_sendrecv_nessus_port" lineno="54063">
<summary>
Send and receive TCP traffic on the nessus port.
</summary>
@@ -43789,7 +43835,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_nessus_port" lineno="56778">
+<interface name="corenet_udp_send_nessus_port" lineno="54078">
<summary>
Send UDP traffic on the nessus port.
</summary>
@@ -43800,7 +43846,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="56797">
+<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="54093">
<summary>
Do not audit attempts to send UDP traffic on the nessus port.
</summary>
@@ -43811,7 +43857,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_nessus_port" lineno="56816">
+<interface name="corenet_udp_receive_nessus_port" lineno="54108">
<summary>
Receive UDP traffic on the nessus port.
</summary>
@@ -43822,7 +43868,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="56835">
+<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="54123">
<summary>
Do not audit attempts to receive UDP traffic on the nessus port.
</summary>
@@ -43833,7 +43879,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_nessus_port" lineno="56854">
+<interface name="corenet_udp_sendrecv_nessus_port" lineno="54138">
<summary>
Send and receive UDP traffic on the nessus port.
</summary>
@@ -43844,7 +43890,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="56871">
+<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="54154">
<summary>
Do not audit attempts to send and receive
UDP traffic on the nessus port.
@@ -43856,7 +43902,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_nessus_port" lineno="56887">
+<interface name="corenet_tcp_bind_nessus_port" lineno="54169">
<summary>
Bind TCP sockets to the nessus port.
</summary>
@@ -43867,7 +43913,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_nessus_port" lineno="56907">
+<interface name="corenet_udp_bind_nessus_port" lineno="54189">
<summary>
Bind UDP sockets to the nessus port.
</summary>
@@ -43878,7 +43924,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_nessus_port" lineno="56926">
+<interface name="corenet_tcp_connect_nessus_port" lineno="54208">
<summary>
Make a TCP connection to the nessus port.
</summary>
@@ -43888,7 +43934,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nessus_client_packets" lineno="56946">
+<interface name="corenet_send_nessus_client_packets" lineno="54228">
<summary>
Send nessus_client packets.
</summary>
@@ -43899,7 +43945,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="56965">
+<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="54247">
<summary>
Do not audit attempts to send nessus_client packets.
</summary>
@@ -43910,7 +43956,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nessus_client_packets" lineno="56984">
+<interface name="corenet_receive_nessus_client_packets" lineno="54266">
<summary>
Receive nessus_client packets.
</summary>
@@ -43921,7 +43967,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="57003">
+<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="54285">
<summary>
Do not audit attempts to receive nessus_client packets.
</summary>
@@ -43932,7 +43978,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nessus_client_packets" lineno="57022">
+<interface name="corenet_sendrecv_nessus_client_packets" lineno="54304">
<summary>
Send and receive nessus_client packets.
</summary>
@@ -43943,7 +43989,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="57038">
+<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="54320">
<summary>
Do not audit attempts to send and receive nessus_client packets.
</summary>
@@ -43954,7 +44000,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nessus_client_packets" lineno="57053">
+<interface name="corenet_relabelto_nessus_client_packets" lineno="54335">
<summary>
Relabel packets to nessus_client the packet type.
</summary>
@@ -43964,7 +44010,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nessus_server_packets" lineno="57073">
+<interface name="corenet_send_nessus_server_packets" lineno="54355">
<summary>
Send nessus_server packets.
</summary>
@@ -43975,7 +44021,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="57092">
+<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="54374">
<summary>
Do not audit attempts to send nessus_server packets.
</summary>
@@ -43986,7 +44032,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nessus_server_packets" lineno="57111">
+<interface name="corenet_receive_nessus_server_packets" lineno="54393">
<summary>
Receive nessus_server packets.
</summary>
@@ -43997,7 +44043,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="57130">
+<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="54412">
<summary>
Do not audit attempts to receive nessus_server packets.
</summary>
@@ -44008,7 +44054,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nessus_server_packets" lineno="57149">
+<interface name="corenet_sendrecv_nessus_server_packets" lineno="54431">
<summary>
Send and receive nessus_server packets.
</summary>
@@ -44019,7 +44065,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="57165">
+<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="54447">
<summary>
Do not audit attempts to send and receive nessus_server packets.
</summary>
@@ -44030,7 +44076,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nessus_server_packets" lineno="57180">
+<interface name="corenet_relabelto_nessus_server_packets" lineno="54462">
<summary>
Relabel packets to nessus_server the packet type.
</summary>
@@ -44040,7 +44086,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_netport_port" lineno="57202">
+<interface name="corenet_tcp_sendrecv_netport_port" lineno="54484">
<summary>
Send and receive TCP traffic on the netport port.
</summary>
@@ -44051,7 +44097,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_netport_port" lineno="57221">
+<interface name="corenet_udp_send_netport_port" lineno="54499">
<summary>
Send UDP traffic on the netport port.
</summary>
@@ -44062,7 +44108,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_netport_port" lineno="57240">
+<interface name="corenet_dontaudit_udp_send_netport_port" lineno="54514">
<summary>
Do not audit attempts to send UDP traffic on the netport port.
</summary>
@@ -44073,7 +44119,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_netport_port" lineno="57259">
+<interface name="corenet_udp_receive_netport_port" lineno="54529">
<summary>
Receive UDP traffic on the netport port.
</summary>
@@ -44084,7 +44130,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="57278">
+<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="54544">
<summary>
Do not audit attempts to receive UDP traffic on the netport port.
</summary>
@@ -44095,7 +44141,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_netport_port" lineno="57297">
+<interface name="corenet_udp_sendrecv_netport_port" lineno="54559">
<summary>
Send and receive UDP traffic on the netport port.
</summary>
@@ -44106,7 +44152,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="57314">
+<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="54575">
<summary>
Do not audit attempts to send and receive
UDP traffic on the netport port.
@@ -44118,7 +44164,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_netport_port" lineno="57330">
+<interface name="corenet_tcp_bind_netport_port" lineno="54590">
<summary>
Bind TCP sockets to the netport port.
</summary>
@@ -44129,7 +44175,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_netport_port" lineno="57350">
+<interface name="corenet_udp_bind_netport_port" lineno="54610">
<summary>
Bind UDP sockets to the netport port.
</summary>
@@ -44140,7 +44186,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_netport_port" lineno="57369">
+<interface name="corenet_tcp_connect_netport_port" lineno="54629">
<summary>
Make a TCP connection to the netport port.
</summary>
@@ -44150,7 +44196,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_netport_client_packets" lineno="57389">
+<interface name="corenet_send_netport_client_packets" lineno="54649">
<summary>
Send netport_client packets.
</summary>
@@ -44161,7 +44207,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_netport_client_packets" lineno="57408">
+<interface name="corenet_dontaudit_send_netport_client_packets" lineno="54668">
<summary>
Do not audit attempts to send netport_client packets.
</summary>
@@ -44172,7 +44218,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_netport_client_packets" lineno="57427">
+<interface name="corenet_receive_netport_client_packets" lineno="54687">
<summary>
Receive netport_client packets.
</summary>
@@ -44183,7 +44229,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="57446">
+<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="54706">
<summary>
Do not audit attempts to receive netport_client packets.
</summary>
@@ -44194,7 +44240,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_netport_client_packets" lineno="57465">
+<interface name="corenet_sendrecv_netport_client_packets" lineno="54725">
<summary>
Send and receive netport_client packets.
</summary>
@@ -44205,7 +44251,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="57481">
+<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="54741">
<summary>
Do not audit attempts to send and receive netport_client packets.
</summary>
@@ -44216,7 +44262,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_netport_client_packets" lineno="57496">
+<interface name="corenet_relabelto_netport_client_packets" lineno="54756">
<summary>
Relabel packets to netport_client the packet type.
</summary>
@@ -44226,7 +44272,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_netport_server_packets" lineno="57516">
+<interface name="corenet_send_netport_server_packets" lineno="54776">
<summary>
Send netport_server packets.
</summary>
@@ -44237,7 +44283,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_netport_server_packets" lineno="57535">
+<interface name="corenet_dontaudit_send_netport_server_packets" lineno="54795">
<summary>
Do not audit attempts to send netport_server packets.
</summary>
@@ -44248,7 +44294,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_netport_server_packets" lineno="57554">
+<interface name="corenet_receive_netport_server_packets" lineno="54814">
<summary>
Receive netport_server packets.
</summary>
@@ -44259,7 +44305,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="57573">
+<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="54833">
<summary>
Do not audit attempts to receive netport_server packets.
</summary>
@@ -44270,7 +44316,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_netport_server_packets" lineno="57592">
+<interface name="corenet_sendrecv_netport_server_packets" lineno="54852">
<summary>
Send and receive netport_server packets.
</summary>
@@ -44281,7 +44327,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="57608">
+<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="54868">
<summary>
Do not audit attempts to send and receive netport_server packets.
</summary>
@@ -44292,7 +44338,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_netport_server_packets" lineno="57623">
+<interface name="corenet_relabelto_netport_server_packets" lineno="54883">
<summary>
Relabel packets to netport_server the packet type.
</summary>
@@ -44302,7 +44348,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="57645">
+<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="54905">
<summary>
Send and receive TCP traffic on the netsupport port.
</summary>
@@ -44313,7 +44359,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_netsupport_port" lineno="57664">
+<interface name="corenet_udp_send_netsupport_port" lineno="54920">
<summary>
Send UDP traffic on the netsupport port.
</summary>
@@ -44324,7 +44370,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="57683">
+<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="54935">
<summary>
Do not audit attempts to send UDP traffic on the netsupport port.
</summary>
@@ -44335,7 +44381,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_netsupport_port" lineno="57702">
+<interface name="corenet_udp_receive_netsupport_port" lineno="54950">
<summary>
Receive UDP traffic on the netsupport port.
</summary>
@@ -44346,7 +44392,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="57721">
+<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="54965">
<summary>
Do not audit attempts to receive UDP traffic on the netsupport port.
</summary>
@@ -44357,7 +44403,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_netsupport_port" lineno="57740">
+<interface name="corenet_udp_sendrecv_netsupport_port" lineno="54980">
<summary>
Send and receive UDP traffic on the netsupport port.
</summary>
@@ -44368,7 +44414,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="57757">
+<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="54996">
<summary>
Do not audit attempts to send and receive
UDP traffic on the netsupport port.
@@ -44380,7 +44426,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_netsupport_port" lineno="57773">
+<interface name="corenet_tcp_bind_netsupport_port" lineno="55011">
<summary>
Bind TCP sockets to the netsupport port.
</summary>
@@ -44391,7 +44437,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_netsupport_port" lineno="57793">
+<interface name="corenet_udp_bind_netsupport_port" lineno="55031">
<summary>
Bind UDP sockets to the netsupport port.
</summary>
@@ -44402,7 +44448,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_netsupport_port" lineno="57812">
+<interface name="corenet_tcp_connect_netsupport_port" lineno="55050">
<summary>
Make a TCP connection to the netsupport port.
</summary>
@@ -44412,7 +44458,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_netsupport_client_packets" lineno="57832">
+<interface name="corenet_send_netsupport_client_packets" lineno="55070">
<summary>
Send netsupport_client packets.
</summary>
@@ -44423,7 +44469,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="57851">
+<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="55089">
<summary>
Do not audit attempts to send netsupport_client packets.
</summary>
@@ -44434,7 +44480,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_netsupport_client_packets" lineno="57870">
+<interface name="corenet_receive_netsupport_client_packets" lineno="55108">
<summary>
Receive netsupport_client packets.
</summary>
@@ -44445,7 +44491,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="57889">
+<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="55127">
<summary>
Do not audit attempts to receive netsupport_client packets.
</summary>
@@ -44456,7 +44502,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_netsupport_client_packets" lineno="57908">
+<interface name="corenet_sendrecv_netsupport_client_packets" lineno="55146">
<summary>
Send and receive netsupport_client packets.
</summary>
@@ -44467,7 +44513,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="57924">
+<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="55162">
<summary>
Do not audit attempts to send and receive netsupport_client packets.
</summary>
@@ -44478,7 +44524,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_netsupport_client_packets" lineno="57939">
+<interface name="corenet_relabelto_netsupport_client_packets" lineno="55177">
<summary>
Relabel packets to netsupport_client the packet type.
</summary>
@@ -44488,7 +44534,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_netsupport_server_packets" lineno="57959">
+<interface name="corenet_send_netsupport_server_packets" lineno="55197">
<summary>
Send netsupport_server packets.
</summary>
@@ -44499,7 +44545,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="57978">
+<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="55216">
<summary>
Do not audit attempts to send netsupport_server packets.
</summary>
@@ -44510,7 +44556,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_netsupport_server_packets" lineno="57997">
+<interface name="corenet_receive_netsupport_server_packets" lineno="55235">
<summary>
Receive netsupport_server packets.
</summary>
@@ -44521,7 +44567,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="58016">
+<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="55254">
<summary>
Do not audit attempts to receive netsupport_server packets.
</summary>
@@ -44532,7 +44578,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_netsupport_server_packets" lineno="58035">
+<interface name="corenet_sendrecv_netsupport_server_packets" lineno="55273">
<summary>
Send and receive netsupport_server packets.
</summary>
@@ -44543,7 +44589,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="58051">
+<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="55289">
<summary>
Do not audit attempts to send and receive netsupport_server packets.
</summary>
@@ -44554,7 +44600,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_netsupport_server_packets" lineno="58066">
+<interface name="corenet_relabelto_netsupport_server_packets" lineno="55304">
<summary>
Relabel packets to netsupport_server the packet type.
</summary>
@@ -44564,7 +44610,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_nfs_port" lineno="58088">
+<interface name="corenet_tcp_sendrecv_nfs_port" lineno="55326">
<summary>
Send and receive TCP traffic on the nfs port.
</summary>
@@ -44575,7 +44621,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_nfs_port" lineno="58107">
+<interface name="corenet_udp_send_nfs_port" lineno="55341">
<summary>
Send UDP traffic on the nfs port.
</summary>
@@ -44586,7 +44632,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="58126">
+<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="55356">
<summary>
Do not audit attempts to send UDP traffic on the nfs port.
</summary>
@@ -44597,7 +44643,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_nfs_port" lineno="58145">
+<interface name="corenet_udp_receive_nfs_port" lineno="55371">
<summary>
Receive UDP traffic on the nfs port.
</summary>
@@ -44608,7 +44654,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="58164">
+<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="55386">
<summary>
Do not audit attempts to receive UDP traffic on the nfs port.
</summary>
@@ -44619,7 +44665,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_nfs_port" lineno="58183">
+<interface name="corenet_udp_sendrecv_nfs_port" lineno="55401">
<summary>
Send and receive UDP traffic on the nfs port.
</summary>
@@ -44630,7 +44676,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="58200">
+<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="55417">
<summary>
Do not audit attempts to send and receive
UDP traffic on the nfs port.
@@ -44642,7 +44688,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_nfs_port" lineno="58216">
+<interface name="corenet_tcp_bind_nfs_port" lineno="55432">
<summary>
Bind TCP sockets to the nfs port.
</summary>
@@ -44653,7 +44699,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_nfs_port" lineno="58236">
+<interface name="corenet_udp_bind_nfs_port" lineno="55452">
<summary>
Bind UDP sockets to the nfs port.
</summary>
@@ -44664,7 +44710,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_nfs_port" lineno="58255">
+<interface name="corenet_tcp_connect_nfs_port" lineno="55471">
<summary>
Make a TCP connection to the nfs port.
</summary>
@@ -44674,7 +44720,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nfs_client_packets" lineno="58275">
+<interface name="corenet_send_nfs_client_packets" lineno="55491">
<summary>
Send nfs_client packets.
</summary>
@@ -44685,7 +44731,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="58294">
+<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="55510">
<summary>
Do not audit attempts to send nfs_client packets.
</summary>
@@ -44696,7 +44742,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nfs_client_packets" lineno="58313">
+<interface name="corenet_receive_nfs_client_packets" lineno="55529">
<summary>
Receive nfs_client packets.
</summary>
@@ -44707,7 +44753,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="58332">
+<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="55548">
<summary>
Do not audit attempts to receive nfs_client packets.
</summary>
@@ -44718,7 +44764,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nfs_client_packets" lineno="58351">
+<interface name="corenet_sendrecv_nfs_client_packets" lineno="55567">
<summary>
Send and receive nfs_client packets.
</summary>
@@ -44729,7 +44775,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="58367">
+<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="55583">
<summary>
Do not audit attempts to send and receive nfs_client packets.
</summary>
@@ -44740,7 +44786,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nfs_client_packets" lineno="58382">
+<interface name="corenet_relabelto_nfs_client_packets" lineno="55598">
<summary>
Relabel packets to nfs_client the packet type.
</summary>
@@ -44750,7 +44796,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nfs_server_packets" lineno="58402">
+<interface name="corenet_send_nfs_server_packets" lineno="55618">
<summary>
Send nfs_server packets.
</summary>
@@ -44761,7 +44807,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="58421">
+<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="55637">
<summary>
Do not audit attempts to send nfs_server packets.
</summary>
@@ -44772,7 +44818,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nfs_server_packets" lineno="58440">
+<interface name="corenet_receive_nfs_server_packets" lineno="55656">
<summary>
Receive nfs_server packets.
</summary>
@@ -44783,7 +44829,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="58459">
+<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="55675">
<summary>
Do not audit attempts to receive nfs_server packets.
</summary>
@@ -44794,7 +44840,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nfs_server_packets" lineno="58478">
+<interface name="corenet_sendrecv_nfs_server_packets" lineno="55694">
<summary>
Send and receive nfs_server packets.
</summary>
@@ -44805,7 +44851,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="58494">
+<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="55710">
<summary>
Do not audit attempts to send and receive nfs_server packets.
</summary>
@@ -44816,7 +44862,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nfs_server_packets" lineno="58509">
+<interface name="corenet_relabelto_nfs_server_packets" lineno="55725">
<summary>
Relabel packets to nfs_server the packet type.
</summary>
@@ -44826,7 +44872,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_nfsrdma_port" lineno="58531">
+<interface name="corenet_tcp_sendrecv_nfsrdma_port" lineno="55747">
<summary>
Send and receive TCP traffic on the nfsrdma port.
</summary>
@@ -44837,7 +44883,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_nfsrdma_port" lineno="58550">
+<interface name="corenet_udp_send_nfsrdma_port" lineno="55762">
<summary>
Send UDP traffic on the nfsrdma port.
</summary>
@@ -44848,7 +44894,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_nfsrdma_port" lineno="58569">
+<interface name="corenet_dontaudit_udp_send_nfsrdma_port" lineno="55777">
<summary>
Do not audit attempts to send UDP traffic on the nfsrdma port.
</summary>
@@ -44859,7 +44905,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_nfsrdma_port" lineno="58588">
+<interface name="corenet_udp_receive_nfsrdma_port" lineno="55792">
<summary>
Receive UDP traffic on the nfsrdma port.
</summary>
@@ -44870,7 +44916,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_nfsrdma_port" lineno="58607">
+<interface name="corenet_dontaudit_udp_receive_nfsrdma_port" lineno="55807">
<summary>
Do not audit attempts to receive UDP traffic on the nfsrdma port.
</summary>
@@ -44881,7 +44927,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_nfsrdma_port" lineno="58626">
+<interface name="corenet_udp_sendrecv_nfsrdma_port" lineno="55822">
<summary>
Send and receive UDP traffic on the nfsrdma port.
</summary>
@@ -44892,7 +44938,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nfsrdma_port" lineno="58643">
+<interface name="corenet_dontaudit_udp_sendrecv_nfsrdma_port" lineno="55838">
<summary>
Do not audit attempts to send and receive
UDP traffic on the nfsrdma port.
@@ -44904,7 +44950,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_nfsrdma_port" lineno="58659">
+<interface name="corenet_tcp_bind_nfsrdma_port" lineno="55853">
<summary>
Bind TCP sockets to the nfsrdma port.
</summary>
@@ -44915,7 +44961,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_nfsrdma_port" lineno="58679">
+<interface name="corenet_udp_bind_nfsrdma_port" lineno="55873">
<summary>
Bind UDP sockets to the nfsrdma port.
</summary>
@@ -44926,7 +44972,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_nfsrdma_port" lineno="58698">
+<interface name="corenet_tcp_connect_nfsrdma_port" lineno="55892">
<summary>
Make a TCP connection to the nfsrdma port.
</summary>
@@ -44936,7 +44982,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nfsrdma_client_packets" lineno="58718">
+<interface name="corenet_send_nfsrdma_client_packets" lineno="55912">
<summary>
Send nfsrdma_client packets.
</summary>
@@ -44947,7 +44993,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="58737">
+<interface name="corenet_dontaudit_send_nfsrdma_client_packets" lineno="55931">
<summary>
Do not audit attempts to send nfsrdma_client packets.
</summary>
@@ -44958,7 +45004,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nfsrdma_client_packets" lineno="58756">
+<interface name="corenet_receive_nfsrdma_client_packets" lineno="55950">
<summary>
Receive nfsrdma_client packets.
</summary>
@@ -44969,7 +45015,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="58775">
+<interface name="corenet_dontaudit_receive_nfsrdma_client_packets" lineno="55969">
<summary>
Do not audit attempts to receive nfsrdma_client packets.
</summary>
@@ -44980,7 +45026,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="58794">
+<interface name="corenet_sendrecv_nfsrdma_client_packets" lineno="55988">
<summary>
Send and receive nfsrdma_client packets.
</summary>
@@ -44991,7 +45037,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="58810">
+<interface name="corenet_dontaudit_sendrecv_nfsrdma_client_packets" lineno="56004">
<summary>
Do not audit attempts to send and receive nfsrdma_client packets.
</summary>
@@ -45002,7 +45048,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="58825">
+<interface name="corenet_relabelto_nfsrdma_client_packets" lineno="56019">
<summary>
Relabel packets to nfsrdma_client the packet type.
</summary>
@@ -45012,7 +45058,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nfsrdma_server_packets" lineno="58845">
+<interface name="corenet_send_nfsrdma_server_packets" lineno="56039">
<summary>
Send nfsrdma_server packets.
</summary>
@@ -45023,7 +45069,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="58864">
+<interface name="corenet_dontaudit_send_nfsrdma_server_packets" lineno="56058">
<summary>
Do not audit attempts to send nfsrdma_server packets.
</summary>
@@ -45034,7 +45080,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nfsrdma_server_packets" lineno="58883">
+<interface name="corenet_receive_nfsrdma_server_packets" lineno="56077">
<summary>
Receive nfsrdma_server packets.
</summary>
@@ -45045,7 +45091,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="58902">
+<interface name="corenet_dontaudit_receive_nfsrdma_server_packets" lineno="56096">
<summary>
Do not audit attempts to receive nfsrdma_server packets.
</summary>
@@ -45056,7 +45102,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="58921">
+<interface name="corenet_sendrecv_nfsrdma_server_packets" lineno="56115">
<summary>
Send and receive nfsrdma_server packets.
</summary>
@@ -45067,7 +45113,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="58937">
+<interface name="corenet_dontaudit_sendrecv_nfsrdma_server_packets" lineno="56131">
<summary>
Do not audit attempts to send and receive nfsrdma_server packets.
</summary>
@@ -45078,7 +45124,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="58952">
+<interface name="corenet_relabelto_nfsrdma_server_packets" lineno="56146">
<summary>
Relabel packets to nfsrdma_server the packet type.
</summary>
@@ -45088,7 +45134,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="58974">
+<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="56168">
<summary>
Send and receive TCP traffic on the nmbd port.
</summary>
@@ -45099,7 +45145,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_nmbd_port" lineno="58993">
+<interface name="corenet_udp_send_nmbd_port" lineno="56183">
<summary>
Send UDP traffic on the nmbd port.
</summary>
@@ -45110,7 +45156,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="59012">
+<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="56198">
<summary>
Do not audit attempts to send UDP traffic on the nmbd port.
</summary>
@@ -45121,7 +45167,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_nmbd_port" lineno="59031">
+<interface name="corenet_udp_receive_nmbd_port" lineno="56213">
<summary>
Receive UDP traffic on the nmbd port.
</summary>
@@ -45132,7 +45178,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="59050">
+<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="56228">
<summary>
Do not audit attempts to receive UDP traffic on the nmbd port.
</summary>
@@ -45143,7 +45189,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_nmbd_port" lineno="59069">
+<interface name="corenet_udp_sendrecv_nmbd_port" lineno="56243">
<summary>
Send and receive UDP traffic on the nmbd port.
</summary>
@@ -45154,7 +45200,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="59086">
+<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="56259">
<summary>
Do not audit attempts to send and receive
UDP traffic on the nmbd port.
@@ -45166,7 +45212,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_nmbd_port" lineno="59102">
+<interface name="corenet_tcp_bind_nmbd_port" lineno="56274">
<summary>
Bind TCP sockets to the nmbd port.
</summary>
@@ -45177,7 +45223,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_nmbd_port" lineno="59122">
+<interface name="corenet_udp_bind_nmbd_port" lineno="56294">
<summary>
Bind UDP sockets to the nmbd port.
</summary>
@@ -45188,7 +45234,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_nmbd_port" lineno="59141">
+<interface name="corenet_tcp_connect_nmbd_port" lineno="56313">
<summary>
Make a TCP connection to the nmbd port.
</summary>
@@ -45198,7 +45244,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nmbd_client_packets" lineno="59161">
+<interface name="corenet_send_nmbd_client_packets" lineno="56333">
<summary>
Send nmbd_client packets.
</summary>
@@ -45209,7 +45255,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="59180">
+<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="56352">
<summary>
Do not audit attempts to send nmbd_client packets.
</summary>
@@ -45220,7 +45266,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nmbd_client_packets" lineno="59199">
+<interface name="corenet_receive_nmbd_client_packets" lineno="56371">
<summary>
Receive nmbd_client packets.
</summary>
@@ -45231,7 +45277,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="59218">
+<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="56390">
<summary>
Do not audit attempts to receive nmbd_client packets.
</summary>
@@ -45242,7 +45288,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nmbd_client_packets" lineno="59237">
+<interface name="corenet_sendrecv_nmbd_client_packets" lineno="56409">
<summary>
Send and receive nmbd_client packets.
</summary>
@@ -45253,7 +45299,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="59253">
+<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="56425">
<summary>
Do not audit attempts to send and receive nmbd_client packets.
</summary>
@@ -45264,7 +45310,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nmbd_client_packets" lineno="59268">
+<interface name="corenet_relabelto_nmbd_client_packets" lineno="56440">
<summary>
Relabel packets to nmbd_client the packet type.
</summary>
@@ -45274,7 +45320,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_nmbd_server_packets" lineno="59288">
+<interface name="corenet_send_nmbd_server_packets" lineno="56460">
<summary>
Send nmbd_server packets.
</summary>
@@ -45285,7 +45331,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="59307">
+<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="56479">
<summary>
Do not audit attempts to send nmbd_server packets.
</summary>
@@ -45296,7 +45342,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_nmbd_server_packets" lineno="59326">
+<interface name="corenet_receive_nmbd_server_packets" lineno="56498">
<summary>
Receive nmbd_server packets.
</summary>
@@ -45307,7 +45353,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="59345">
+<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="56517">
<summary>
Do not audit attempts to receive nmbd_server packets.
</summary>
@@ -45318,7 +45364,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_nmbd_server_packets" lineno="59364">
+<interface name="corenet_sendrecv_nmbd_server_packets" lineno="56536">
<summary>
Send and receive nmbd_server packets.
</summary>
@@ -45329,7 +45375,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="59380">
+<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="56552">
<summary>
Do not audit attempts to send and receive nmbd_server packets.
</summary>
@@ -45340,7 +45386,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_nmbd_server_packets" lineno="59395">
+<interface name="corenet_relabelto_nmbd_server_packets" lineno="56567">
<summary>
Relabel packets to nmbd_server the packet type.
</summary>
@@ -45350,7 +45396,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ntop_port" lineno="59417">
+<interface name="corenet_tcp_sendrecv_ntop_port" lineno="56589">
<summary>
Send and receive TCP traffic on the ntop port.
</summary>
@@ -45361,7 +45407,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ntop_port" lineno="59436">
+<interface name="corenet_udp_send_ntop_port" lineno="56604">
<summary>
Send UDP traffic on the ntop port.
</summary>
@@ -45372,7 +45418,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="59455">
+<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="56619">
<summary>
Do not audit attempts to send UDP traffic on the ntop port.
</summary>
@@ -45383,7 +45429,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ntop_port" lineno="59474">
+<interface name="corenet_udp_receive_ntop_port" lineno="56634">
<summary>
Receive UDP traffic on the ntop port.
</summary>
@@ -45394,7 +45440,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="59493">
+<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="56649">
<summary>
Do not audit attempts to receive UDP traffic on the ntop port.
</summary>
@@ -45405,7 +45451,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ntop_port" lineno="59512">
+<interface name="corenet_udp_sendrecv_ntop_port" lineno="56664">
<summary>
Send and receive UDP traffic on the ntop port.
</summary>
@@ -45416,7 +45462,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="59529">
+<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="56680">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ntop port.
@@ -45428,7 +45474,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ntop_port" lineno="59545">
+<interface name="corenet_tcp_bind_ntop_port" lineno="56695">
<summary>
Bind TCP sockets to the ntop port.
</summary>
@@ -45439,7 +45485,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ntop_port" lineno="59565">
+<interface name="corenet_udp_bind_ntop_port" lineno="56715">
<summary>
Bind UDP sockets to the ntop port.
</summary>
@@ -45450,7 +45496,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ntop_port" lineno="59584">
+<interface name="corenet_tcp_connect_ntop_port" lineno="56734">
<summary>
Make a TCP connection to the ntop port.
</summary>
@@ -45460,7 +45506,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ntop_client_packets" lineno="59604">
+<interface name="corenet_send_ntop_client_packets" lineno="56754">
<summary>
Send ntop_client packets.
</summary>
@@ -45471,7 +45517,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="59623">
+<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="56773">
<summary>
Do not audit attempts to send ntop_client packets.
</summary>
@@ -45482,7 +45528,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ntop_client_packets" lineno="59642">
+<interface name="corenet_receive_ntop_client_packets" lineno="56792">
<summary>
Receive ntop_client packets.
</summary>
@@ -45493,7 +45539,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="59661">
+<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="56811">
<summary>
Do not audit attempts to receive ntop_client packets.
</summary>
@@ -45504,7 +45550,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ntop_client_packets" lineno="59680">
+<interface name="corenet_sendrecv_ntop_client_packets" lineno="56830">
<summary>
Send and receive ntop_client packets.
</summary>
@@ -45515,7 +45561,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="59696">
+<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="56846">
<summary>
Do not audit attempts to send and receive ntop_client packets.
</summary>
@@ -45526,7 +45572,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ntop_client_packets" lineno="59711">
+<interface name="corenet_relabelto_ntop_client_packets" lineno="56861">
<summary>
Relabel packets to ntop_client the packet type.
</summary>
@@ -45536,7 +45582,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ntop_server_packets" lineno="59731">
+<interface name="corenet_send_ntop_server_packets" lineno="56881">
<summary>
Send ntop_server packets.
</summary>
@@ -45547,7 +45593,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="59750">
+<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="56900">
<summary>
Do not audit attempts to send ntop_server packets.
</summary>
@@ -45558,7 +45604,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ntop_server_packets" lineno="59769">
+<interface name="corenet_receive_ntop_server_packets" lineno="56919">
<summary>
Receive ntop_server packets.
</summary>
@@ -45569,7 +45615,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="59788">
+<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="56938">
<summary>
Do not audit attempts to receive ntop_server packets.
</summary>
@@ -45580,7 +45626,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ntop_server_packets" lineno="59807">
+<interface name="corenet_sendrecv_ntop_server_packets" lineno="56957">
<summary>
Send and receive ntop_server packets.
</summary>
@@ -45591,7 +45637,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="59823">
+<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="56973">
<summary>
Do not audit attempts to send and receive ntop_server packets.
</summary>
@@ -45602,7 +45648,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ntop_server_packets" lineno="59838">
+<interface name="corenet_relabelto_ntop_server_packets" lineno="56988">
<summary>
Relabel packets to ntop_server the packet type.
</summary>
@@ -45612,7 +45658,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ntp_port" lineno="59860">
+<interface name="corenet_tcp_sendrecv_ntp_port" lineno="57010">
<summary>
Send and receive TCP traffic on the ntp port.
</summary>
@@ -45623,7 +45669,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ntp_port" lineno="59879">
+<interface name="corenet_udp_send_ntp_port" lineno="57025">
<summary>
Send UDP traffic on the ntp port.
</summary>
@@ -45634,7 +45680,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="59898">
+<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="57040">
<summary>
Do not audit attempts to send UDP traffic on the ntp port.
</summary>
@@ -45645,7 +45691,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ntp_port" lineno="59917">
+<interface name="corenet_udp_receive_ntp_port" lineno="57055">
<summary>
Receive UDP traffic on the ntp port.
</summary>
@@ -45656,7 +45702,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="59936">
+<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="57070">
<summary>
Do not audit attempts to receive UDP traffic on the ntp port.
</summary>
@@ -45667,7 +45713,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ntp_port" lineno="59955">
+<interface name="corenet_udp_sendrecv_ntp_port" lineno="57085">
<summary>
Send and receive UDP traffic on the ntp port.
</summary>
@@ -45678,7 +45724,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="59972">
+<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="57101">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ntp port.
@@ -45690,7 +45736,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ntp_port" lineno="59988">
+<interface name="corenet_tcp_bind_ntp_port" lineno="57116">
<summary>
Bind TCP sockets to the ntp port.
</summary>
@@ -45701,7 +45747,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ntp_port" lineno="60008">
+<interface name="corenet_udp_bind_ntp_port" lineno="57136">
<summary>
Bind UDP sockets to the ntp port.
</summary>
@@ -45712,7 +45758,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ntp_port" lineno="60027">
+<interface name="corenet_tcp_connect_ntp_port" lineno="57155">
<summary>
Make a TCP connection to the ntp port.
</summary>
@@ -45722,7 +45768,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ntp_client_packets" lineno="60047">
+<interface name="corenet_send_ntp_client_packets" lineno="57175">
<summary>
Send ntp_client packets.
</summary>
@@ -45733,7 +45779,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="60066">
+<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="57194">
<summary>
Do not audit attempts to send ntp_client packets.
</summary>
@@ -45744,7 +45790,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ntp_client_packets" lineno="60085">
+<interface name="corenet_receive_ntp_client_packets" lineno="57213">
<summary>
Receive ntp_client packets.
</summary>
@@ -45755,7 +45801,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="60104">
+<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="57232">
<summary>
Do not audit attempts to receive ntp_client packets.
</summary>
@@ -45766,7 +45812,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ntp_client_packets" lineno="60123">
+<interface name="corenet_sendrecv_ntp_client_packets" lineno="57251">
<summary>
Send and receive ntp_client packets.
</summary>
@@ -45777,7 +45823,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="60139">
+<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="57267">
<summary>
Do not audit attempts to send and receive ntp_client packets.
</summary>
@@ -45788,7 +45834,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ntp_client_packets" lineno="60154">
+<interface name="corenet_relabelto_ntp_client_packets" lineno="57282">
<summary>
Relabel packets to ntp_client the packet type.
</summary>
@@ -45798,7 +45844,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ntp_server_packets" lineno="60174">
+<interface name="corenet_send_ntp_server_packets" lineno="57302">
<summary>
Send ntp_server packets.
</summary>
@@ -45809,7 +45855,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="60193">
+<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="57321">
<summary>
Do not audit attempts to send ntp_server packets.
</summary>
@@ -45820,7 +45866,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ntp_server_packets" lineno="60212">
+<interface name="corenet_receive_ntp_server_packets" lineno="57340">
<summary>
Receive ntp_server packets.
</summary>
@@ -45831,7 +45877,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="60231">
+<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="57359">
<summary>
Do not audit attempts to receive ntp_server packets.
</summary>
@@ -45842,7 +45888,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ntp_server_packets" lineno="60250">
+<interface name="corenet_sendrecv_ntp_server_packets" lineno="57378">
<summary>
Send and receive ntp_server packets.
</summary>
@@ -45853,7 +45899,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="60266">
+<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="57394">
<summary>
Do not audit attempts to send and receive ntp_server packets.
</summary>
@@ -45864,7 +45910,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ntp_server_packets" lineno="60281">
+<interface name="corenet_relabelto_ntp_server_packets" lineno="57409">
<summary>
Relabel packets to ntp_server the packet type.
</summary>
@@ -45874,7 +45920,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="60303">
+<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="57431">
<summary>
Send and receive TCP traffic on the oa_system port.
</summary>
@@ -45885,7 +45931,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_oa_system_port" lineno="60322">
+<interface name="corenet_udp_send_oa_system_port" lineno="57446">
<summary>
Send UDP traffic on the oa_system port.
</summary>
@@ -45896,7 +45942,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="60341">
+<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="57461">
<summary>
Do not audit attempts to send UDP traffic on the oa_system port.
</summary>
@@ -45907,7 +45953,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_oa_system_port" lineno="60360">
+<interface name="corenet_udp_receive_oa_system_port" lineno="57476">
<summary>
Receive UDP traffic on the oa_system port.
</summary>
@@ -45918,7 +45964,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="60379">
+<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="57491">
<summary>
Do not audit attempts to receive UDP traffic on the oa_system port.
</summary>
@@ -45929,7 +45975,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_oa_system_port" lineno="60398">
+<interface name="corenet_udp_sendrecv_oa_system_port" lineno="57506">
<summary>
Send and receive UDP traffic on the oa_system port.
</summary>
@@ -45940,7 +45986,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="60415">
+<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="57522">
<summary>
Do not audit attempts to send and receive
UDP traffic on the oa_system port.
@@ -45952,7 +45998,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_oa_system_port" lineno="60431">
+<interface name="corenet_tcp_bind_oa_system_port" lineno="57537">
<summary>
Bind TCP sockets to the oa_system port.
</summary>
@@ -45963,7 +46009,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_oa_system_port" lineno="60451">
+<interface name="corenet_udp_bind_oa_system_port" lineno="57557">
<summary>
Bind UDP sockets to the oa_system port.
</summary>
@@ -45974,7 +46020,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_oa_system_port" lineno="60470">
+<interface name="corenet_tcp_connect_oa_system_port" lineno="57576">
<summary>
Make a TCP connection to the oa_system port.
</summary>
@@ -45984,7 +46030,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_oa_system_client_packets" lineno="60490">
+<interface name="corenet_send_oa_system_client_packets" lineno="57596">
<summary>
Send oa_system_client packets.
</summary>
@@ -45995,7 +46041,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="60509">
+<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="57615">
<summary>
Do not audit attempts to send oa_system_client packets.
</summary>
@@ -46006,7 +46052,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_oa_system_client_packets" lineno="60528">
+<interface name="corenet_receive_oa_system_client_packets" lineno="57634">
<summary>
Receive oa_system_client packets.
</summary>
@@ -46017,7 +46063,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="60547">
+<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="57653">
<summary>
Do not audit attempts to receive oa_system_client packets.
</summary>
@@ -46028,7 +46074,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_oa_system_client_packets" lineno="60566">
+<interface name="corenet_sendrecv_oa_system_client_packets" lineno="57672">
<summary>
Send and receive oa_system_client packets.
</summary>
@@ -46039,7 +46085,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="60582">
+<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="57688">
<summary>
Do not audit attempts to send and receive oa_system_client packets.
</summary>
@@ -46050,7 +46096,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_oa_system_client_packets" lineno="60597">
+<interface name="corenet_relabelto_oa_system_client_packets" lineno="57703">
<summary>
Relabel packets to oa_system_client the packet type.
</summary>
@@ -46060,7 +46106,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_oa_system_server_packets" lineno="60617">
+<interface name="corenet_send_oa_system_server_packets" lineno="57723">
<summary>
Send oa_system_server packets.
</summary>
@@ -46071,7 +46117,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="60636">
+<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="57742">
<summary>
Do not audit attempts to send oa_system_server packets.
</summary>
@@ -46082,7 +46128,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_oa_system_server_packets" lineno="60655">
+<interface name="corenet_receive_oa_system_server_packets" lineno="57761">
<summary>
Receive oa_system_server packets.
</summary>
@@ -46093,7 +46139,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="60674">
+<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="57780">
<summary>
Do not audit attempts to receive oa_system_server packets.
</summary>
@@ -46104,7 +46150,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_oa_system_server_packets" lineno="60693">
+<interface name="corenet_sendrecv_oa_system_server_packets" lineno="57799">
<summary>
Send and receive oa_system_server packets.
</summary>
@@ -46115,7 +46161,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="60709">
+<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="57815">
<summary>
Do not audit attempts to send and receive oa_system_server packets.
</summary>
@@ -46126,7 +46172,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_oa_system_server_packets" lineno="60724">
+<interface name="corenet_relabelto_oa_system_server_packets" lineno="57830">
<summary>
Relabel packets to oa_system_server the packet type.
</summary>
@@ -46136,7 +46182,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="60746">
+<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="57852">
<summary>
Send and receive TCP traffic on the oracledb port.
</summary>
@@ -46147,7 +46193,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_oracledb_port" lineno="60765">
+<interface name="corenet_udp_send_oracledb_port" lineno="57867">
<summary>
Send UDP traffic on the oracledb port.
</summary>
@@ -46158,7 +46204,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="60784">
+<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="57882">
<summary>
Do not audit attempts to send UDP traffic on the oracledb port.
</summary>
@@ -46169,7 +46215,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_oracledb_port" lineno="60803">
+<interface name="corenet_udp_receive_oracledb_port" lineno="57897">
<summary>
Receive UDP traffic on the oracledb port.
</summary>
@@ -46180,7 +46226,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="60822">
+<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="57912">
<summary>
Do not audit attempts to receive UDP traffic on the oracledb port.
</summary>
@@ -46191,7 +46237,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_oracledb_port" lineno="60841">
+<interface name="corenet_udp_sendrecv_oracledb_port" lineno="57927">
<summary>
Send and receive UDP traffic on the oracledb port.
</summary>
@@ -46202,7 +46248,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="60858">
+<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="57943">
<summary>
Do not audit attempts to send and receive
UDP traffic on the oracledb port.
@@ -46214,7 +46260,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_oracledb_port" lineno="60874">
+<interface name="corenet_tcp_bind_oracledb_port" lineno="57958">
<summary>
Bind TCP sockets to the oracledb port.
</summary>
@@ -46225,7 +46271,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_oracledb_port" lineno="60894">
+<interface name="corenet_udp_bind_oracledb_port" lineno="57978">
<summary>
Bind UDP sockets to the oracledb port.
</summary>
@@ -46236,7 +46282,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_oracledb_port" lineno="60913">
+<interface name="corenet_tcp_connect_oracledb_port" lineno="57997">
<summary>
Make a TCP connection to the oracledb port.
</summary>
@@ -46246,7 +46292,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_oracledb_client_packets" lineno="60933">
+<interface name="corenet_send_oracledb_client_packets" lineno="58017">
<summary>
Send oracledb_client packets.
</summary>
@@ -46257,7 +46303,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="60952">
+<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="58036">
<summary>
Do not audit attempts to send oracledb_client packets.
</summary>
@@ -46268,7 +46314,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_oracledb_client_packets" lineno="60971">
+<interface name="corenet_receive_oracledb_client_packets" lineno="58055">
<summary>
Receive oracledb_client packets.
</summary>
@@ -46279,7 +46325,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="60990">
+<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="58074">
<summary>
Do not audit attempts to receive oracledb_client packets.
</summary>
@@ -46290,7 +46336,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_oracledb_client_packets" lineno="61009">
+<interface name="corenet_sendrecv_oracledb_client_packets" lineno="58093">
<summary>
Send and receive oracledb_client packets.
</summary>
@@ -46301,7 +46347,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="61025">
+<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="58109">
<summary>
Do not audit attempts to send and receive oracledb_client packets.
</summary>
@@ -46312,7 +46358,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_oracledb_client_packets" lineno="61040">
+<interface name="corenet_relabelto_oracledb_client_packets" lineno="58124">
<summary>
Relabel packets to oracledb_client the packet type.
</summary>
@@ -46322,7 +46368,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_oracledb_server_packets" lineno="61060">
+<interface name="corenet_send_oracledb_server_packets" lineno="58144">
<summary>
Send oracledb_server packets.
</summary>
@@ -46333,7 +46379,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="61079">
+<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="58163">
<summary>
Do not audit attempts to send oracledb_server packets.
</summary>
@@ -46344,7 +46390,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_oracledb_server_packets" lineno="61098">
+<interface name="corenet_receive_oracledb_server_packets" lineno="58182">
<summary>
Receive oracledb_server packets.
</summary>
@@ -46355,7 +46401,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="61117">
+<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="58201">
<summary>
Do not audit attempts to receive oracledb_server packets.
</summary>
@@ -46366,7 +46412,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_oracledb_server_packets" lineno="61136">
+<interface name="corenet_sendrecv_oracledb_server_packets" lineno="58220">
<summary>
Send and receive oracledb_server packets.
</summary>
@@ -46377,7 +46423,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="61152">
+<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="58236">
<summary>
Do not audit attempts to send and receive oracledb_server packets.
</summary>
@@ -46388,7 +46434,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_oracledb_server_packets" lineno="61167">
+<interface name="corenet_relabelto_oracledb_server_packets" lineno="58251">
<summary>
Relabel packets to oracledb_server the packet type.
</summary>
@@ -46398,7 +46444,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="61189">
+<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58273">
<summary>
Send and receive TCP traffic on the ocsp port.
</summary>
@@ -46409,7 +46455,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ocsp_port" lineno="61208">
+<interface name="corenet_udp_send_ocsp_port" lineno="58288">
<summary>
Send UDP traffic on the ocsp port.
</summary>
@@ -46420,7 +46466,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="61227">
+<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58303">
<summary>
Do not audit attempts to send UDP traffic on the ocsp port.
</summary>
@@ -46431,7 +46477,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ocsp_port" lineno="61246">
+<interface name="corenet_udp_receive_ocsp_port" lineno="58318">
<summary>
Receive UDP traffic on the ocsp port.
</summary>
@@ -46442,7 +46488,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="61265">
+<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58333">
<summary>
Do not audit attempts to receive UDP traffic on the ocsp port.
</summary>
@@ -46453,7 +46499,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ocsp_port" lineno="61284">
+<interface name="corenet_udp_sendrecv_ocsp_port" lineno="58348">
<summary>
Send and receive UDP traffic on the ocsp port.
</summary>
@@ -46464,7 +46510,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="61301">
+<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58364">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ocsp port.
@@ -46476,7 +46522,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ocsp_port" lineno="61317">
+<interface name="corenet_tcp_bind_ocsp_port" lineno="58379">
<summary>
Bind TCP sockets to the ocsp port.
</summary>
@@ -46487,7 +46533,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ocsp_port" lineno="61337">
+<interface name="corenet_udp_bind_ocsp_port" lineno="58399">
<summary>
Bind UDP sockets to the ocsp port.
</summary>
@@ -46498,7 +46544,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ocsp_port" lineno="61356">
+<interface name="corenet_tcp_connect_ocsp_port" lineno="58418">
<summary>
Make a TCP connection to the ocsp port.
</summary>
@@ -46508,7 +46554,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ocsp_client_packets" lineno="61376">
+<interface name="corenet_send_ocsp_client_packets" lineno="58438">
<summary>
Send ocsp_client packets.
</summary>
@@ -46519,7 +46565,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="61395">
+<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="58457">
<summary>
Do not audit attempts to send ocsp_client packets.
</summary>
@@ -46530,7 +46576,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ocsp_client_packets" lineno="61414">
+<interface name="corenet_receive_ocsp_client_packets" lineno="58476">
<summary>
Receive ocsp_client packets.
</summary>
@@ -46541,7 +46587,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="61433">
+<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="58495">
<summary>
Do not audit attempts to receive ocsp_client packets.
</summary>
@@ -46552,7 +46598,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ocsp_client_packets" lineno="61452">
+<interface name="corenet_sendrecv_ocsp_client_packets" lineno="58514">
<summary>
Send and receive ocsp_client packets.
</summary>
@@ -46563,7 +46609,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="61468">
+<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="58530">
<summary>
Do not audit attempts to send and receive ocsp_client packets.
</summary>
@@ -46574,7 +46620,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ocsp_client_packets" lineno="61483">
+<interface name="corenet_relabelto_ocsp_client_packets" lineno="58545">
<summary>
Relabel packets to ocsp_client the packet type.
</summary>
@@ -46584,7 +46630,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ocsp_server_packets" lineno="61503">
+<interface name="corenet_send_ocsp_server_packets" lineno="58565">
<summary>
Send ocsp_server packets.
</summary>
@@ -46595,7 +46641,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="61522">
+<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="58584">
<summary>
Do not audit attempts to send ocsp_server packets.
</summary>
@@ -46606,7 +46652,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ocsp_server_packets" lineno="61541">
+<interface name="corenet_receive_ocsp_server_packets" lineno="58603">
<summary>
Receive ocsp_server packets.
</summary>
@@ -46617,7 +46663,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="61560">
+<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="58622">
<summary>
Do not audit attempts to receive ocsp_server packets.
</summary>
@@ -46628,7 +46674,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ocsp_server_packets" lineno="61579">
+<interface name="corenet_sendrecv_ocsp_server_packets" lineno="58641">
<summary>
Send and receive ocsp_server packets.
</summary>
@@ -46639,7 +46685,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="61595">
+<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="58657">
<summary>
Do not audit attempts to send and receive ocsp_server packets.
</summary>
@@ -46650,7 +46696,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ocsp_server_packets" lineno="61610">
+<interface name="corenet_relabelto_ocsp_server_packets" lineno="58672">
<summary>
Relabel packets to ocsp_server the packet type.
</summary>
@@ -46660,7 +46706,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="61632">
+<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="58694">
<summary>
Send and receive TCP traffic on the openhpid port.
</summary>
@@ -46671,7 +46717,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_openhpid_port" lineno="61651">
+<interface name="corenet_udp_send_openhpid_port" lineno="58709">
<summary>
Send UDP traffic on the openhpid port.
</summary>
@@ -46682,7 +46728,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="61670">
+<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="58724">
<summary>
Do not audit attempts to send UDP traffic on the openhpid port.
</summary>
@@ -46693,7 +46739,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_openhpid_port" lineno="61689">
+<interface name="corenet_udp_receive_openhpid_port" lineno="58739">
<summary>
Receive UDP traffic on the openhpid port.
</summary>
@@ -46704,7 +46750,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="61708">
+<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="58754">
<summary>
Do not audit attempts to receive UDP traffic on the openhpid port.
</summary>
@@ -46715,7 +46761,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_openhpid_port" lineno="61727">
+<interface name="corenet_udp_sendrecv_openhpid_port" lineno="58769">
<summary>
Send and receive UDP traffic on the openhpid port.
</summary>
@@ -46726,7 +46772,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="61744">
+<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="58785">
<summary>
Do not audit attempts to send and receive
UDP traffic on the openhpid port.
@@ -46738,7 +46784,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_openhpid_port" lineno="61760">
+<interface name="corenet_tcp_bind_openhpid_port" lineno="58800">
<summary>
Bind TCP sockets to the openhpid port.
</summary>
@@ -46749,7 +46795,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_openhpid_port" lineno="61780">
+<interface name="corenet_udp_bind_openhpid_port" lineno="58820">
<summary>
Bind UDP sockets to the openhpid port.
</summary>
@@ -46760,7 +46806,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_openhpid_port" lineno="61799">
+<interface name="corenet_tcp_connect_openhpid_port" lineno="58839">
<summary>
Make a TCP connection to the openhpid port.
</summary>
@@ -46770,7 +46816,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_openhpid_client_packets" lineno="61819">
+<interface name="corenet_send_openhpid_client_packets" lineno="58859">
<summary>
Send openhpid_client packets.
</summary>
@@ -46781,7 +46827,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="61838">
+<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="58878">
<summary>
Do not audit attempts to send openhpid_client packets.
</summary>
@@ -46792,7 +46838,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_openhpid_client_packets" lineno="61857">
+<interface name="corenet_receive_openhpid_client_packets" lineno="58897">
<summary>
Receive openhpid_client packets.
</summary>
@@ -46803,7 +46849,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="61876">
+<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="58916">
<summary>
Do not audit attempts to receive openhpid_client packets.
</summary>
@@ -46814,7 +46860,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_openhpid_client_packets" lineno="61895">
+<interface name="corenet_sendrecv_openhpid_client_packets" lineno="58935">
<summary>
Send and receive openhpid_client packets.
</summary>
@@ -46825,7 +46871,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="61911">
+<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="58951">
<summary>
Do not audit attempts to send and receive openhpid_client packets.
</summary>
@@ -46836,7 +46882,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_openhpid_client_packets" lineno="61926">
+<interface name="corenet_relabelto_openhpid_client_packets" lineno="58966">
<summary>
Relabel packets to openhpid_client the packet type.
</summary>
@@ -46846,7 +46892,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_openhpid_server_packets" lineno="61946">
+<interface name="corenet_send_openhpid_server_packets" lineno="58986">
<summary>
Send openhpid_server packets.
</summary>
@@ -46857,7 +46903,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="61965">
+<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59005">
<summary>
Do not audit attempts to send openhpid_server packets.
</summary>
@@ -46868,7 +46914,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_openhpid_server_packets" lineno="61984">
+<interface name="corenet_receive_openhpid_server_packets" lineno="59024">
<summary>
Receive openhpid_server packets.
</summary>
@@ -46879,7 +46925,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="62003">
+<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59043">
<summary>
Do not audit attempts to receive openhpid_server packets.
</summary>
@@ -46890,7 +46936,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_openhpid_server_packets" lineno="62022">
+<interface name="corenet_sendrecv_openhpid_server_packets" lineno="59062">
<summary>
Send and receive openhpid_server packets.
</summary>
@@ -46901,7 +46947,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="62038">
+<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59078">
<summary>
Do not audit attempts to send and receive openhpid_server packets.
</summary>
@@ -46912,7 +46958,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_openhpid_server_packets" lineno="62053">
+<interface name="corenet_relabelto_openhpid_server_packets" lineno="59093">
<summary>
Relabel packets to openhpid_server the packet type.
</summary>
@@ -46922,7 +46968,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="62075">
+<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59115">
<summary>
Send and receive TCP traffic on the openvpn port.
</summary>
@@ -46933,7 +46979,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_openvpn_port" lineno="62094">
+<interface name="corenet_udp_send_openvpn_port" lineno="59130">
<summary>
Send UDP traffic on the openvpn port.
</summary>
@@ -46944,7 +46990,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="62113">
+<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59145">
<summary>
Do not audit attempts to send UDP traffic on the openvpn port.
</summary>
@@ -46955,7 +47001,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_openvpn_port" lineno="62132">
+<interface name="corenet_udp_receive_openvpn_port" lineno="59160">
<summary>
Receive UDP traffic on the openvpn port.
</summary>
@@ -46966,7 +47012,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="62151">
+<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59175">
<summary>
Do not audit attempts to receive UDP traffic on the openvpn port.
</summary>
@@ -46977,7 +47023,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_openvpn_port" lineno="62170">
+<interface name="corenet_udp_sendrecv_openvpn_port" lineno="59190">
<summary>
Send and receive UDP traffic on the openvpn port.
</summary>
@@ -46988,7 +47034,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="62187">
+<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59206">
<summary>
Do not audit attempts to send and receive
UDP traffic on the openvpn port.
@@ -47000,7 +47046,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_openvpn_port" lineno="62203">
+<interface name="corenet_tcp_bind_openvpn_port" lineno="59221">
<summary>
Bind TCP sockets to the openvpn port.
</summary>
@@ -47011,7 +47057,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_openvpn_port" lineno="62223">
+<interface name="corenet_udp_bind_openvpn_port" lineno="59241">
<summary>
Bind UDP sockets to the openvpn port.
</summary>
@@ -47022,7 +47068,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_openvpn_port" lineno="62242">
+<interface name="corenet_tcp_connect_openvpn_port" lineno="59260">
<summary>
Make a TCP connection to the openvpn port.
</summary>
@@ -47032,7 +47078,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_openvpn_client_packets" lineno="62262">
+<interface name="corenet_send_openvpn_client_packets" lineno="59280">
<summary>
Send openvpn_client packets.
</summary>
@@ -47043,7 +47089,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="62281">
+<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59299">
<summary>
Do not audit attempts to send openvpn_client packets.
</summary>
@@ -47054,7 +47100,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_openvpn_client_packets" lineno="62300">
+<interface name="corenet_receive_openvpn_client_packets" lineno="59318">
<summary>
Receive openvpn_client packets.
</summary>
@@ -47065,7 +47111,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="62319">
+<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59337">
<summary>
Do not audit attempts to receive openvpn_client packets.
</summary>
@@ -47076,7 +47122,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_openvpn_client_packets" lineno="62338">
+<interface name="corenet_sendrecv_openvpn_client_packets" lineno="59356">
<summary>
Send and receive openvpn_client packets.
</summary>
@@ -47087,7 +47133,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="62354">
+<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59372">
<summary>
Do not audit attempts to send and receive openvpn_client packets.
</summary>
@@ -47098,7 +47144,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_openvpn_client_packets" lineno="62369">
+<interface name="corenet_relabelto_openvpn_client_packets" lineno="59387">
<summary>
Relabel packets to openvpn_client the packet type.
</summary>
@@ -47108,7 +47154,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_openvpn_server_packets" lineno="62389">
+<interface name="corenet_send_openvpn_server_packets" lineno="59407">
<summary>
Send openvpn_server packets.
</summary>
@@ -47119,7 +47165,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="62408">
+<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59426">
<summary>
Do not audit attempts to send openvpn_server packets.
</summary>
@@ -47130,7 +47176,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_openvpn_server_packets" lineno="62427">
+<interface name="corenet_receive_openvpn_server_packets" lineno="59445">
<summary>
Receive openvpn_server packets.
</summary>
@@ -47141,7 +47187,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="62446">
+<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="59464">
<summary>
Do not audit attempts to receive openvpn_server packets.
</summary>
@@ -47152,7 +47198,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_openvpn_server_packets" lineno="62465">
+<interface name="corenet_sendrecv_openvpn_server_packets" lineno="59483">
<summary>
Send and receive openvpn_server packets.
</summary>
@@ -47163,7 +47209,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="62481">
+<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="59499">
<summary>
Do not audit attempts to send and receive openvpn_server packets.
</summary>
@@ -47174,7 +47220,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_openvpn_server_packets" lineno="62496">
+<interface name="corenet_relabelto_openvpn_server_packets" lineno="59514">
<summary>
Relabel packets to openvpn_server the packet type.
</summary>
@@ -47184,7 +47230,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pdps_port" lineno="62518">
+<interface name="corenet_tcp_sendrecv_pdps_port" lineno="59536">
<summary>
Send and receive TCP traffic on the pdps port.
</summary>
@@ -47195,7 +47241,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pdps_port" lineno="62537">
+<interface name="corenet_udp_send_pdps_port" lineno="59551">
<summary>
Send UDP traffic on the pdps port.
</summary>
@@ -47206,7 +47252,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="62556">
+<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="59566">
<summary>
Do not audit attempts to send UDP traffic on the pdps port.
</summary>
@@ -47217,7 +47263,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pdps_port" lineno="62575">
+<interface name="corenet_udp_receive_pdps_port" lineno="59581">
<summary>
Receive UDP traffic on the pdps port.
</summary>
@@ -47228,7 +47274,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="62594">
+<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="59596">
<summary>
Do not audit attempts to receive UDP traffic on the pdps port.
</summary>
@@ -47239,7 +47285,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pdps_port" lineno="62613">
+<interface name="corenet_udp_sendrecv_pdps_port" lineno="59611">
<summary>
Send and receive UDP traffic on the pdps port.
</summary>
@@ -47250,7 +47296,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="62630">
+<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="59627">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pdps port.
@@ -47262,7 +47308,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pdps_port" lineno="62646">
+<interface name="corenet_tcp_bind_pdps_port" lineno="59642">
<summary>
Bind TCP sockets to the pdps port.
</summary>
@@ -47273,7 +47319,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pdps_port" lineno="62666">
+<interface name="corenet_udp_bind_pdps_port" lineno="59662">
<summary>
Bind UDP sockets to the pdps port.
</summary>
@@ -47284,7 +47330,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pdps_port" lineno="62685">
+<interface name="corenet_tcp_connect_pdps_port" lineno="59681">
<summary>
Make a TCP connection to the pdps port.
</summary>
@@ -47294,7 +47340,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pdps_client_packets" lineno="62705">
+<interface name="corenet_send_pdps_client_packets" lineno="59701">
<summary>
Send pdps_client packets.
</summary>
@@ -47305,7 +47351,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="62724">
+<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="59720">
<summary>
Do not audit attempts to send pdps_client packets.
</summary>
@@ -47316,7 +47362,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pdps_client_packets" lineno="62743">
+<interface name="corenet_receive_pdps_client_packets" lineno="59739">
<summary>
Receive pdps_client packets.
</summary>
@@ -47327,7 +47373,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="62762">
+<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="59758">
<summary>
Do not audit attempts to receive pdps_client packets.
</summary>
@@ -47338,7 +47384,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pdps_client_packets" lineno="62781">
+<interface name="corenet_sendrecv_pdps_client_packets" lineno="59777">
<summary>
Send and receive pdps_client packets.
</summary>
@@ -47349,7 +47395,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="62797">
+<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="59793">
<summary>
Do not audit attempts to send and receive pdps_client packets.
</summary>
@@ -47360,7 +47406,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pdps_client_packets" lineno="62812">
+<interface name="corenet_relabelto_pdps_client_packets" lineno="59808">
<summary>
Relabel packets to pdps_client the packet type.
</summary>
@@ -47370,7 +47416,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pdps_server_packets" lineno="62832">
+<interface name="corenet_send_pdps_server_packets" lineno="59828">
<summary>
Send pdps_server packets.
</summary>
@@ -47381,7 +47427,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="62851">
+<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="59847">
<summary>
Do not audit attempts to send pdps_server packets.
</summary>
@@ -47392,7 +47438,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pdps_server_packets" lineno="62870">
+<interface name="corenet_receive_pdps_server_packets" lineno="59866">
<summary>
Receive pdps_server packets.
</summary>
@@ -47403,7 +47449,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="62889">
+<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="59885">
<summary>
Do not audit attempts to receive pdps_server packets.
</summary>
@@ -47414,7 +47460,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pdps_server_packets" lineno="62908">
+<interface name="corenet_sendrecv_pdps_server_packets" lineno="59904">
<summary>
Send and receive pdps_server packets.
</summary>
@@ -47425,7 +47471,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="62924">
+<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="59920">
<summary>
Do not audit attempts to send and receive pdps_server packets.
</summary>
@@ -47436,7 +47482,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pdps_server_packets" lineno="62939">
+<interface name="corenet_relabelto_pdps_server_packets" lineno="59935">
<summary>
Relabel packets to pdps_server the packet type.
</summary>
@@ -47446,7 +47492,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="62961">
+<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="59957">
<summary>
Send and receive TCP traffic on the pegasus_http port.
</summary>
@@ -47457,7 +47503,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pegasus_http_port" lineno="62980">
+<interface name="corenet_udp_send_pegasus_http_port" lineno="59972">
<summary>
Send UDP traffic on the pegasus_http port.
</summary>
@@ -47468,7 +47514,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="62999">
+<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="59987">
<summary>
Do not audit attempts to send UDP traffic on the pegasus_http port.
</summary>
@@ -47479,7 +47525,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pegasus_http_port" lineno="63018">
+<interface name="corenet_udp_receive_pegasus_http_port" lineno="60002">
<summary>
Receive UDP traffic on the pegasus_http port.
</summary>
@@ -47490,7 +47536,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="63037">
+<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60017">
<summary>
Do not audit attempts to receive UDP traffic on the pegasus_http port.
</summary>
@@ -47501,7 +47547,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="63056">
+<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60032">
<summary>
Send and receive UDP traffic on the pegasus_http port.
</summary>
@@ -47512,7 +47558,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="63073">
+<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60048">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pegasus_http port.
@@ -47524,7 +47570,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pegasus_http_port" lineno="63089">
+<interface name="corenet_tcp_bind_pegasus_http_port" lineno="60063">
<summary>
Bind TCP sockets to the pegasus_http port.
</summary>
@@ -47535,7 +47581,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pegasus_http_port" lineno="63109">
+<interface name="corenet_udp_bind_pegasus_http_port" lineno="60083">
<summary>
Bind UDP sockets to the pegasus_http port.
</summary>
@@ -47546,7 +47592,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pegasus_http_port" lineno="63128">
+<interface name="corenet_tcp_connect_pegasus_http_port" lineno="60102">
<summary>
Make a TCP connection to the pegasus_http port.
</summary>
@@ -47556,7 +47602,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pegasus_http_client_packets" lineno="63148">
+<interface name="corenet_send_pegasus_http_client_packets" lineno="60122">
<summary>
Send pegasus_http_client packets.
</summary>
@@ -47567,7 +47613,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="63167">
+<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60141">
<summary>
Do not audit attempts to send pegasus_http_client packets.
</summary>
@@ -47578,7 +47624,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pegasus_http_client_packets" lineno="63186">
+<interface name="corenet_receive_pegasus_http_client_packets" lineno="60160">
<summary>
Receive pegasus_http_client packets.
</summary>
@@ -47589,7 +47635,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="63205">
+<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60179">
<summary>
Do not audit attempts to receive pegasus_http_client packets.
</summary>
@@ -47600,7 +47646,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="63224">
+<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60198">
<summary>
Send and receive pegasus_http_client packets.
</summary>
@@ -47611,7 +47657,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="63240">
+<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60214">
<summary>
Do not audit attempts to send and receive pegasus_http_client packets.
</summary>
@@ -47622,7 +47668,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="63255">
+<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60229">
<summary>
Relabel packets to pegasus_http_client the packet type.
</summary>
@@ -47632,7 +47678,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pegasus_http_server_packets" lineno="63275">
+<interface name="corenet_send_pegasus_http_server_packets" lineno="60249">
<summary>
Send pegasus_http_server packets.
</summary>
@@ -47643,7 +47689,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="63294">
+<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60268">
<summary>
Do not audit attempts to send pegasus_http_server packets.
</summary>
@@ -47654,7 +47700,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pegasus_http_server_packets" lineno="63313">
+<interface name="corenet_receive_pegasus_http_server_packets" lineno="60287">
<summary>
Receive pegasus_http_server packets.
</summary>
@@ -47665,7 +47711,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="63332">
+<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60306">
<summary>
Do not audit attempts to receive pegasus_http_server packets.
</summary>
@@ -47676,7 +47722,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="63351">
+<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60325">
<summary>
Send and receive pegasus_http_server packets.
</summary>
@@ -47687,7 +47733,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="63367">
+<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60341">
<summary>
Do not audit attempts to send and receive pegasus_http_server packets.
</summary>
@@ -47698,7 +47744,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="63382">
+<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60356">
<summary>
Relabel packets to pegasus_http_server the packet type.
</summary>
@@ -47708,7 +47754,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="63404">
+<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60378">
<summary>
Send and receive TCP traffic on the pegasus_https port.
</summary>
@@ -47719,7 +47765,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pegasus_https_port" lineno="63423">
+<interface name="corenet_udp_send_pegasus_https_port" lineno="60393">
<summary>
Send UDP traffic on the pegasus_https port.
</summary>
@@ -47730,7 +47776,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="63442">
+<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60408">
<summary>
Do not audit attempts to send UDP traffic on the pegasus_https port.
</summary>
@@ -47741,7 +47787,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pegasus_https_port" lineno="63461">
+<interface name="corenet_udp_receive_pegasus_https_port" lineno="60423">
<summary>
Receive UDP traffic on the pegasus_https port.
</summary>
@@ -47752,7 +47798,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="63480">
+<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="60438">
<summary>
Do not audit attempts to receive UDP traffic on the pegasus_https port.
</summary>
@@ -47763,7 +47809,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="63499">
+<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="60453">
<summary>
Send and receive UDP traffic on the pegasus_https port.
</summary>
@@ -47774,7 +47820,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="63516">
+<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="60469">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pegasus_https port.
@@ -47786,7 +47832,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pegasus_https_port" lineno="63532">
+<interface name="corenet_tcp_bind_pegasus_https_port" lineno="60484">
<summary>
Bind TCP sockets to the pegasus_https port.
</summary>
@@ -47797,7 +47843,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pegasus_https_port" lineno="63552">
+<interface name="corenet_udp_bind_pegasus_https_port" lineno="60504">
<summary>
Bind UDP sockets to the pegasus_https port.
</summary>
@@ -47808,7 +47854,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pegasus_https_port" lineno="63571">
+<interface name="corenet_tcp_connect_pegasus_https_port" lineno="60523">
<summary>
Make a TCP connection to the pegasus_https port.
</summary>
@@ -47818,7 +47864,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pegasus_https_client_packets" lineno="63591">
+<interface name="corenet_send_pegasus_https_client_packets" lineno="60543">
<summary>
Send pegasus_https_client packets.
</summary>
@@ -47829,7 +47875,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="63610">
+<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="60562">
<summary>
Do not audit attempts to send pegasus_https_client packets.
</summary>
@@ -47840,7 +47886,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pegasus_https_client_packets" lineno="63629">
+<interface name="corenet_receive_pegasus_https_client_packets" lineno="60581">
<summary>
Receive pegasus_https_client packets.
</summary>
@@ -47851,7 +47897,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="63648">
+<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="60600">
<summary>
Do not audit attempts to receive pegasus_https_client packets.
</summary>
@@ -47862,7 +47908,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="63667">
+<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="60619">
<summary>
Send and receive pegasus_https_client packets.
</summary>
@@ -47873,7 +47919,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="63683">
+<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="60635">
<summary>
Do not audit attempts to send and receive pegasus_https_client packets.
</summary>
@@ -47884,7 +47930,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="63698">
+<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="60650">
<summary>
Relabel packets to pegasus_https_client the packet type.
</summary>
@@ -47894,7 +47940,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pegasus_https_server_packets" lineno="63718">
+<interface name="corenet_send_pegasus_https_server_packets" lineno="60670">
<summary>
Send pegasus_https_server packets.
</summary>
@@ -47905,7 +47951,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="63737">
+<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="60689">
<summary>
Do not audit attempts to send pegasus_https_server packets.
</summary>
@@ -47916,7 +47962,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pegasus_https_server_packets" lineno="63756">
+<interface name="corenet_receive_pegasus_https_server_packets" lineno="60708">
<summary>
Receive pegasus_https_server packets.
</summary>
@@ -47927,7 +47973,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="63775">
+<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="60727">
<summary>
Do not audit attempts to receive pegasus_https_server packets.
</summary>
@@ -47938,7 +47984,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="63794">
+<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="60746">
<summary>
Send and receive pegasus_https_server packets.
</summary>
@@ -47949,7 +47995,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="63810">
+<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="60762">
<summary>
Do not audit attempts to send and receive pegasus_https_server packets.
</summary>
@@ -47960,7 +48006,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="63825">
+<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="60777">
<summary>
Relabel packets to pegasus_https_server the packet type.
</summary>
@@ -47970,7 +48016,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="63847">
+<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="60799">
<summary>
Send and receive TCP traffic on the pgpkeyserver port.
</summary>
@@ -47981,7 +48027,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pgpkeyserver_port" lineno="63866">
+<interface name="corenet_udp_send_pgpkeyserver_port" lineno="60814">
<summary>
Send UDP traffic on the pgpkeyserver port.
</summary>
@@ -47992,7 +48038,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="63885">
+<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="60829">
<summary>
Do not audit attempts to send UDP traffic on the pgpkeyserver port.
</summary>
@@ -48003,7 +48049,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="63904">
+<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="60844">
<summary>
Receive UDP traffic on the pgpkeyserver port.
</summary>
@@ -48014,7 +48060,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="63923">
+<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="60859">
<summary>
Do not audit attempts to receive UDP traffic on the pgpkeyserver port.
</summary>
@@ -48025,7 +48071,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="63942">
+<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="60874">
<summary>
Send and receive UDP traffic on the pgpkeyserver port.
</summary>
@@ -48036,7 +48082,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="63959">
+<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="60890">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pgpkeyserver port.
@@ -48048,7 +48094,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="63975">
+<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="60905">
<summary>
Bind TCP sockets to the pgpkeyserver port.
</summary>
@@ -48059,7 +48105,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="63995">
+<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="60925">
<summary>
Bind UDP sockets to the pgpkeyserver port.
</summary>
@@ -48070,7 +48116,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="64014">
+<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="60944">
<summary>
Make a TCP connection to the pgpkeyserver port.
</summary>
@@ -48080,7 +48126,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pgpkeyserver_client_packets" lineno="64034">
+<interface name="corenet_send_pgpkeyserver_client_packets" lineno="60964">
<summary>
Send pgpkeyserver_client packets.
</summary>
@@ -48091,7 +48137,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="64053">
+<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="60983">
<summary>
Do not audit attempts to send pgpkeyserver_client packets.
</summary>
@@ -48102,7 +48148,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="64072">
+<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61002">
<summary>
Receive pgpkeyserver_client packets.
</summary>
@@ -48113,7 +48159,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="64091">
+<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61021">
<summary>
Do not audit attempts to receive pgpkeyserver_client packets.
</summary>
@@ -48124,7 +48170,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="64110">
+<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61040">
<summary>
Send and receive pgpkeyserver_client packets.
</summary>
@@ -48135,7 +48181,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="64126">
+<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61056">
<summary>
Do not audit attempts to send and receive pgpkeyserver_client packets.
</summary>
@@ -48146,7 +48192,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="64141">
+<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61071">
<summary>
Relabel packets to pgpkeyserver_client the packet type.
</summary>
@@ -48156,7 +48202,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pgpkeyserver_server_packets" lineno="64161">
+<interface name="corenet_send_pgpkeyserver_server_packets" lineno="61091">
<summary>
Send pgpkeyserver_server packets.
</summary>
@@ -48167,7 +48213,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="64180">
+<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61110">
<summary>
Do not audit attempts to send pgpkeyserver_server packets.
</summary>
@@ -48178,7 +48224,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="64199">
+<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61129">
<summary>
Receive pgpkeyserver_server packets.
</summary>
@@ -48189,7 +48235,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="64218">
+<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61148">
<summary>
Do not audit attempts to receive pgpkeyserver_server packets.
</summary>
@@ -48200,7 +48246,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="64237">
+<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61167">
<summary>
Send and receive pgpkeyserver_server packets.
</summary>
@@ -48211,7 +48257,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="64253">
+<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61183">
<summary>
Do not audit attempts to send and receive pgpkeyserver_server packets.
</summary>
@@ -48222,7 +48268,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="64268">
+<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61198">
<summary>
Relabel packets to pgpkeyserver_server the packet type.
</summary>
@@ -48232,7 +48278,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pingd_port" lineno="64290">
+<interface name="corenet_tcp_sendrecv_pingd_port" lineno="61220">
<summary>
Send and receive TCP traffic on the pingd port.
</summary>
@@ -48243,7 +48289,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pingd_port" lineno="64309">
+<interface name="corenet_udp_send_pingd_port" lineno="61235">
<summary>
Send UDP traffic on the pingd port.
</summary>
@@ -48254,7 +48300,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="64328">
+<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61250">
<summary>
Do not audit attempts to send UDP traffic on the pingd port.
</summary>
@@ -48265,7 +48311,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pingd_port" lineno="64347">
+<interface name="corenet_udp_receive_pingd_port" lineno="61265">
<summary>
Receive UDP traffic on the pingd port.
</summary>
@@ -48276,7 +48322,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="64366">
+<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61280">
<summary>
Do not audit attempts to receive UDP traffic on the pingd port.
</summary>
@@ -48287,7 +48333,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pingd_port" lineno="64385">
+<interface name="corenet_udp_sendrecv_pingd_port" lineno="61295">
<summary>
Send and receive UDP traffic on the pingd port.
</summary>
@@ -48298,7 +48344,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="64402">
+<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61311">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pingd port.
@@ -48310,7 +48356,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pingd_port" lineno="64418">
+<interface name="corenet_tcp_bind_pingd_port" lineno="61326">
<summary>
Bind TCP sockets to the pingd port.
</summary>
@@ -48321,7 +48367,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pingd_port" lineno="64438">
+<interface name="corenet_udp_bind_pingd_port" lineno="61346">
<summary>
Bind UDP sockets to the pingd port.
</summary>
@@ -48332,7 +48378,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pingd_port" lineno="64457">
+<interface name="corenet_tcp_connect_pingd_port" lineno="61365">
<summary>
Make a TCP connection to the pingd port.
</summary>
@@ -48342,7 +48388,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pingd_client_packets" lineno="64477">
+<interface name="corenet_send_pingd_client_packets" lineno="61385">
<summary>
Send pingd_client packets.
</summary>
@@ -48353,7 +48399,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="64496">
+<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61404">
<summary>
Do not audit attempts to send pingd_client packets.
</summary>
@@ -48364,7 +48410,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pingd_client_packets" lineno="64515">
+<interface name="corenet_receive_pingd_client_packets" lineno="61423">
<summary>
Receive pingd_client packets.
</summary>
@@ -48375,7 +48421,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="64534">
+<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="61442">
<summary>
Do not audit attempts to receive pingd_client packets.
</summary>
@@ -48386,7 +48432,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pingd_client_packets" lineno="64553">
+<interface name="corenet_sendrecv_pingd_client_packets" lineno="61461">
<summary>
Send and receive pingd_client packets.
</summary>
@@ -48397,7 +48443,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="64569">
+<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="61477">
<summary>
Do not audit attempts to send and receive pingd_client packets.
</summary>
@@ -48408,7 +48454,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pingd_client_packets" lineno="64584">
+<interface name="corenet_relabelto_pingd_client_packets" lineno="61492">
<summary>
Relabel packets to pingd_client the packet type.
</summary>
@@ -48418,7 +48464,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pingd_server_packets" lineno="64604">
+<interface name="corenet_send_pingd_server_packets" lineno="61512">
<summary>
Send pingd_server packets.
</summary>
@@ -48429,7 +48475,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="64623">
+<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="61531">
<summary>
Do not audit attempts to send pingd_server packets.
</summary>
@@ -48440,7 +48486,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pingd_server_packets" lineno="64642">
+<interface name="corenet_receive_pingd_server_packets" lineno="61550">
<summary>
Receive pingd_server packets.
</summary>
@@ -48451,7 +48497,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="64661">
+<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="61569">
<summary>
Do not audit attempts to receive pingd_server packets.
</summary>
@@ -48462,7 +48508,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pingd_server_packets" lineno="64680">
+<interface name="corenet_sendrecv_pingd_server_packets" lineno="61588">
<summary>
Send and receive pingd_server packets.
</summary>
@@ -48473,7 +48519,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="64696">
+<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="61604">
<summary>
Do not audit attempts to send and receive pingd_server packets.
</summary>
@@ -48484,7 +48530,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pingd_server_packets" lineno="64711">
+<interface name="corenet_relabelto_pingd_server_packets" lineno="61619">
<summary>
Relabel packets to pingd_server the packet type.
</summary>
@@ -48494,7 +48540,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="64733">
+<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="61641">
<summary>
Send and receive TCP traffic on the pktcable_cops port.
</summary>
@@ -48505,7 +48551,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pktcable_cops_port" lineno="64752">
+<interface name="corenet_udp_send_pktcable_cops_port" lineno="61656">
<summary>
Send UDP traffic on the pktcable_cops port.
</summary>
@@ -48516,7 +48562,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="64771">
+<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="61671">
<summary>
Do not audit attempts to send UDP traffic on the pktcable_cops port.
</summary>
@@ -48527,7 +48573,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pktcable_cops_port" lineno="64790">
+<interface name="corenet_udp_receive_pktcable_cops_port" lineno="61686">
<summary>
Receive UDP traffic on the pktcable_cops port.
</summary>
@@ -48538,7 +48584,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="64809">
+<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="61701">
<summary>
Do not audit attempts to receive UDP traffic on the pktcable_cops port.
</summary>
@@ -48549,7 +48595,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="64828">
+<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="61716">
<summary>
Send and receive UDP traffic on the pktcable_cops port.
</summary>
@@ -48560,7 +48606,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="64845">
+<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="61732">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pktcable_cops port.
@@ -48572,7 +48618,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="64861">
+<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="61747">
<summary>
Bind TCP sockets to the pktcable_cops port.
</summary>
@@ -48583,7 +48629,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pktcable_cops_port" lineno="64881">
+<interface name="corenet_udp_bind_pktcable_cops_port" lineno="61767">
<summary>
Bind UDP sockets to the pktcable_cops port.
</summary>
@@ -48594,7 +48640,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="64900">
+<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="61786">
<summary>
Make a TCP connection to the pktcable_cops port.
</summary>
@@ -48604,7 +48650,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pktcable_cops_client_packets" lineno="64920">
+<interface name="corenet_send_pktcable_cops_client_packets" lineno="61806">
<summary>
Send pktcable_cops_client packets.
</summary>
@@ -48615,7 +48661,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="64939">
+<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="61825">
<summary>
Do not audit attempts to send pktcable_cops_client packets.
</summary>
@@ -48626,7 +48672,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pktcable_cops_client_packets" lineno="64958">
+<interface name="corenet_receive_pktcable_cops_client_packets" lineno="61844">
<summary>
Receive pktcable_cops_client packets.
</summary>
@@ -48637,7 +48683,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="64977">
+<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="61863">
<summary>
Do not audit attempts to receive pktcable_cops_client packets.
</summary>
@@ -48648,7 +48694,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="64996">
+<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="61882">
<summary>
Send and receive pktcable_cops_client packets.
</summary>
@@ -48659,7 +48705,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="65012">
+<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="61898">
<summary>
Do not audit attempts to send and receive pktcable_cops_client packets.
</summary>
@@ -48670,7 +48716,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="65027">
+<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="61913">
<summary>
Relabel packets to pktcable_cops_client the packet type.
</summary>
@@ -48680,7 +48726,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pktcable_cops_server_packets" lineno="65047">
+<interface name="corenet_send_pktcable_cops_server_packets" lineno="61933">
<summary>
Send pktcable_cops_server packets.
</summary>
@@ -48691,7 +48737,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="65066">
+<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="61952">
<summary>
Do not audit attempts to send pktcable_cops_server packets.
</summary>
@@ -48702,7 +48748,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pktcable_cops_server_packets" lineno="65085">
+<interface name="corenet_receive_pktcable_cops_server_packets" lineno="61971">
<summary>
Receive pktcable_cops_server packets.
</summary>
@@ -48713,7 +48759,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="65104">
+<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="61990">
<summary>
Do not audit attempts to receive pktcable_cops_server packets.
</summary>
@@ -48724,7 +48770,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="65123">
+<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="62009">
<summary>
Send and receive pktcable_cops_server packets.
</summary>
@@ -48735,7 +48781,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="65139">
+<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="62025">
<summary>
Do not audit attempts to send and receive pktcable_cops_server packets.
</summary>
@@ -48746,7 +48792,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="65154">
+<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="62040">
<summary>
Relabel packets to pktcable_cops_server the packet type.
</summary>
@@ -48756,7 +48802,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pop_port" lineno="65176">
+<interface name="corenet_tcp_sendrecv_pop_port" lineno="62062">
<summary>
Send and receive TCP traffic on the pop port.
</summary>
@@ -48767,7 +48813,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pop_port" lineno="65195">
+<interface name="corenet_udp_send_pop_port" lineno="62077">
<summary>
Send UDP traffic on the pop port.
</summary>
@@ -48778,7 +48824,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pop_port" lineno="65214">
+<interface name="corenet_dontaudit_udp_send_pop_port" lineno="62092">
<summary>
Do not audit attempts to send UDP traffic on the pop port.
</summary>
@@ -48789,7 +48835,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pop_port" lineno="65233">
+<interface name="corenet_udp_receive_pop_port" lineno="62107">
<summary>
Receive UDP traffic on the pop port.
</summary>
@@ -48800,7 +48846,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="65252">
+<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="62122">
<summary>
Do not audit attempts to receive UDP traffic on the pop port.
</summary>
@@ -48811,7 +48857,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pop_port" lineno="65271">
+<interface name="corenet_udp_sendrecv_pop_port" lineno="62137">
<summary>
Send and receive UDP traffic on the pop port.
</summary>
@@ -48822,7 +48868,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="65288">
+<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="62153">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pop port.
@@ -48834,7 +48880,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pop_port" lineno="65304">
+<interface name="corenet_tcp_bind_pop_port" lineno="62168">
<summary>
Bind TCP sockets to the pop port.
</summary>
@@ -48845,7 +48891,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pop_port" lineno="65324">
+<interface name="corenet_udp_bind_pop_port" lineno="62188">
<summary>
Bind UDP sockets to the pop port.
</summary>
@@ -48856,7 +48902,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pop_port" lineno="65343">
+<interface name="corenet_tcp_connect_pop_port" lineno="62207">
<summary>
Make a TCP connection to the pop port.
</summary>
@@ -48866,7 +48912,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pop_client_packets" lineno="65363">
+<interface name="corenet_send_pop_client_packets" lineno="62227">
<summary>
Send pop_client packets.
</summary>
@@ -48877,7 +48923,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pop_client_packets" lineno="65382">
+<interface name="corenet_dontaudit_send_pop_client_packets" lineno="62246">
<summary>
Do not audit attempts to send pop_client packets.
</summary>
@@ -48888,7 +48934,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pop_client_packets" lineno="65401">
+<interface name="corenet_receive_pop_client_packets" lineno="62265">
<summary>
Receive pop_client packets.
</summary>
@@ -48899,7 +48945,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="65420">
+<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="62284">
<summary>
Do not audit attempts to receive pop_client packets.
</summary>
@@ -48910,7 +48956,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pop_client_packets" lineno="65439">
+<interface name="corenet_sendrecv_pop_client_packets" lineno="62303">
<summary>
Send and receive pop_client packets.
</summary>
@@ -48921,7 +48967,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="65455">
+<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="62319">
<summary>
Do not audit attempts to send and receive pop_client packets.
</summary>
@@ -48932,7 +48978,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pop_client_packets" lineno="65470">
+<interface name="corenet_relabelto_pop_client_packets" lineno="62334">
<summary>
Relabel packets to pop_client the packet type.
</summary>
@@ -48942,7 +48988,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pop_server_packets" lineno="65490">
+<interface name="corenet_send_pop_server_packets" lineno="62354">
<summary>
Send pop_server packets.
</summary>
@@ -48953,7 +48999,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pop_server_packets" lineno="65509">
+<interface name="corenet_dontaudit_send_pop_server_packets" lineno="62373">
<summary>
Do not audit attempts to send pop_server packets.
</summary>
@@ -48964,7 +49010,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pop_server_packets" lineno="65528">
+<interface name="corenet_receive_pop_server_packets" lineno="62392">
<summary>
Receive pop_server packets.
</summary>
@@ -48975,7 +49021,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="65547">
+<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="62411">
<summary>
Do not audit attempts to receive pop_server packets.
</summary>
@@ -48986,7 +49032,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pop_server_packets" lineno="65566">
+<interface name="corenet_sendrecv_pop_server_packets" lineno="62430">
<summary>
Send and receive pop_server packets.
</summary>
@@ -48997,7 +49043,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="65582">
+<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="62446">
<summary>
Do not audit attempts to send and receive pop_server packets.
</summary>
@@ -49008,7 +49054,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pop_server_packets" lineno="65597">
+<interface name="corenet_relabelto_pop_server_packets" lineno="62461">
<summary>
Relabel packets to pop_server the packet type.
</summary>
@@ -49018,7 +49064,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_portmap_port" lineno="65619">
+<interface name="corenet_tcp_sendrecv_portmap_port" lineno="62483">
<summary>
Send and receive TCP traffic on the portmap port.
</summary>
@@ -49029,7 +49075,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_portmap_port" lineno="65638">
+<interface name="corenet_udp_send_portmap_port" lineno="62498">
<summary>
Send UDP traffic on the portmap port.
</summary>
@@ -49040,7 +49086,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="65657">
+<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="62513">
<summary>
Do not audit attempts to send UDP traffic on the portmap port.
</summary>
@@ -49051,7 +49097,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_portmap_port" lineno="65676">
+<interface name="corenet_udp_receive_portmap_port" lineno="62528">
<summary>
Receive UDP traffic on the portmap port.
</summary>
@@ -49062,7 +49108,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="65695">
+<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="62543">
<summary>
Do not audit attempts to receive UDP traffic on the portmap port.
</summary>
@@ -49073,7 +49119,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_portmap_port" lineno="65714">
+<interface name="corenet_udp_sendrecv_portmap_port" lineno="62558">
<summary>
Send and receive UDP traffic on the portmap port.
</summary>
@@ -49084,7 +49130,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="65731">
+<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="62574">
<summary>
Do not audit attempts to send and receive
UDP traffic on the portmap port.
@@ -49096,7 +49142,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_portmap_port" lineno="65747">
+<interface name="corenet_tcp_bind_portmap_port" lineno="62589">
<summary>
Bind TCP sockets to the portmap port.
</summary>
@@ -49107,7 +49153,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_portmap_port" lineno="65767">
+<interface name="corenet_udp_bind_portmap_port" lineno="62609">
<summary>
Bind UDP sockets to the portmap port.
</summary>
@@ -49118,7 +49164,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_portmap_port" lineno="65786">
+<interface name="corenet_tcp_connect_portmap_port" lineno="62628">
<summary>
Make a TCP connection to the portmap port.
</summary>
@@ -49128,7 +49174,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_portmap_client_packets" lineno="65806">
+<interface name="corenet_send_portmap_client_packets" lineno="62648">
<summary>
Send portmap_client packets.
</summary>
@@ -49139,7 +49185,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="65825">
+<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="62667">
<summary>
Do not audit attempts to send portmap_client packets.
</summary>
@@ -49150,7 +49196,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_portmap_client_packets" lineno="65844">
+<interface name="corenet_receive_portmap_client_packets" lineno="62686">
<summary>
Receive portmap_client packets.
</summary>
@@ -49161,7 +49207,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="65863">
+<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="62705">
<summary>
Do not audit attempts to receive portmap_client packets.
</summary>
@@ -49172,7 +49218,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_portmap_client_packets" lineno="65882">
+<interface name="corenet_sendrecv_portmap_client_packets" lineno="62724">
<summary>
Send and receive portmap_client packets.
</summary>
@@ -49183,7 +49229,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="65898">
+<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="62740">
<summary>
Do not audit attempts to send and receive portmap_client packets.
</summary>
@@ -49194,7 +49240,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_portmap_client_packets" lineno="65913">
+<interface name="corenet_relabelto_portmap_client_packets" lineno="62755">
<summary>
Relabel packets to portmap_client the packet type.
</summary>
@@ -49204,7 +49250,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_portmap_server_packets" lineno="65933">
+<interface name="corenet_send_portmap_server_packets" lineno="62775">
<summary>
Send portmap_server packets.
</summary>
@@ -49215,7 +49261,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="65952">
+<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="62794">
<summary>
Do not audit attempts to send portmap_server packets.
</summary>
@@ -49226,7 +49272,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_portmap_server_packets" lineno="65971">
+<interface name="corenet_receive_portmap_server_packets" lineno="62813">
<summary>
Receive portmap_server packets.
</summary>
@@ -49237,7 +49283,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="65990">
+<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="62832">
<summary>
Do not audit attempts to receive portmap_server packets.
</summary>
@@ -49248,7 +49294,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_portmap_server_packets" lineno="66009">
+<interface name="corenet_sendrecv_portmap_server_packets" lineno="62851">
<summary>
Send and receive portmap_server packets.
</summary>
@@ -49259,7 +49305,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="66025">
+<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="62867">
<summary>
Do not audit attempts to send and receive portmap_server packets.
</summary>
@@ -49270,7 +49316,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_portmap_server_packets" lineno="66040">
+<interface name="corenet_relabelto_portmap_server_packets" lineno="62882">
<summary>
Relabel packets to portmap_server the packet type.
</summary>
@@ -49280,7 +49326,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="66062">
+<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="62904">
<summary>
Send and receive TCP traffic on the postfix_policyd port.
</summary>
@@ -49291,7 +49337,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_postfix_policyd_port" lineno="66081">
+<interface name="corenet_udp_send_postfix_policyd_port" lineno="62919">
<summary>
Send UDP traffic on the postfix_policyd port.
</summary>
@@ -49302,7 +49348,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="66100">
+<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="62934">
<summary>
Do not audit attempts to send UDP traffic on the postfix_policyd port.
</summary>
@@ -49313,7 +49359,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_postfix_policyd_port" lineno="66119">
+<interface name="corenet_udp_receive_postfix_policyd_port" lineno="62949">
<summary>
Receive UDP traffic on the postfix_policyd port.
</summary>
@@ -49324,7 +49370,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="66138">
+<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="62964">
<summary>
Do not audit attempts to receive UDP traffic on the postfix_policyd port.
</summary>
@@ -49335,7 +49381,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="66157">
+<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="62979">
<summary>
Send and receive UDP traffic on the postfix_policyd port.
</summary>
@@ -49346,7 +49392,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="66174">
+<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="62995">
<summary>
Do not audit attempts to send and receive
UDP traffic on the postfix_policyd port.
@@ -49358,7 +49404,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="66190">
+<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="63010">
<summary>
Bind TCP sockets to the postfix_policyd port.
</summary>
@@ -49369,7 +49415,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_postfix_policyd_port" lineno="66210">
+<interface name="corenet_udp_bind_postfix_policyd_port" lineno="63030">
<summary>
Bind UDP sockets to the postfix_policyd port.
</summary>
@@ -49380,7 +49426,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="66229">
+<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="63049">
<summary>
Make a TCP connection to the postfix_policyd port.
</summary>
@@ -49390,7 +49436,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postfix_policyd_client_packets" lineno="66249">
+<interface name="corenet_send_postfix_policyd_client_packets" lineno="63069">
<summary>
Send postfix_policyd_client packets.
</summary>
@@ -49401,7 +49447,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="66268">
+<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="63088">
<summary>
Do not audit attempts to send postfix_policyd_client packets.
</summary>
@@ -49412,7 +49458,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postfix_policyd_client_packets" lineno="66287">
+<interface name="corenet_receive_postfix_policyd_client_packets" lineno="63107">
<summary>
Receive postfix_policyd_client packets.
</summary>
@@ -49423,7 +49469,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="66306">
+<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="63126">
<summary>
Do not audit attempts to receive postfix_policyd_client packets.
</summary>
@@ -49434,7 +49480,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="66325">
+<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="63145">
<summary>
Send and receive postfix_policyd_client packets.
</summary>
@@ -49445,7 +49491,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="66341">
+<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="63161">
<summary>
Do not audit attempts to send and receive postfix_policyd_client packets.
</summary>
@@ -49456,7 +49502,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="66356">
+<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="63176">
<summary>
Relabel packets to postfix_policyd_client the packet type.
</summary>
@@ -49466,7 +49512,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postfix_policyd_server_packets" lineno="66376">
+<interface name="corenet_send_postfix_policyd_server_packets" lineno="63196">
<summary>
Send postfix_policyd_server packets.
</summary>
@@ -49477,7 +49523,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="66395">
+<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="63215">
<summary>
Do not audit attempts to send postfix_policyd_server packets.
</summary>
@@ -49488,7 +49534,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postfix_policyd_server_packets" lineno="66414">
+<interface name="corenet_receive_postfix_policyd_server_packets" lineno="63234">
<summary>
Receive postfix_policyd_server packets.
</summary>
@@ -49499,7 +49545,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="66433">
+<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="63253">
<summary>
Do not audit attempts to receive postfix_policyd_server packets.
</summary>
@@ -49510,7 +49556,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="66452">
+<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="63272">
<summary>
Send and receive postfix_policyd_server packets.
</summary>
@@ -49521,7 +49567,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="66468">
+<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="63288">
<summary>
Do not audit attempts to send and receive postfix_policyd_server packets.
</summary>
@@ -49532,7 +49578,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="66483">
+<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="63303">
<summary>
Relabel packets to postfix_policyd_server the packet type.
</summary>
@@ -49542,7 +49588,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="66505">
+<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="63325">
<summary>
Send and receive TCP traffic on the postgresql port.
</summary>
@@ -49553,7 +49599,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_postgresql_port" lineno="66524">
+<interface name="corenet_udp_send_postgresql_port" lineno="63340">
<summary>
Send UDP traffic on the postgresql port.
</summary>
@@ -49564,7 +49610,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="66543">
+<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="63355">
<summary>
Do not audit attempts to send UDP traffic on the postgresql port.
</summary>
@@ -49575,7 +49621,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_postgresql_port" lineno="66562">
+<interface name="corenet_udp_receive_postgresql_port" lineno="63370">
<summary>
Receive UDP traffic on the postgresql port.
</summary>
@@ -49586,7 +49632,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="66581">
+<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="63385">
<summary>
Do not audit attempts to receive UDP traffic on the postgresql port.
</summary>
@@ -49597,7 +49643,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_postgresql_port" lineno="66600">
+<interface name="corenet_udp_sendrecv_postgresql_port" lineno="63400">
<summary>
Send and receive UDP traffic on the postgresql port.
</summary>
@@ -49608,7 +49654,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="66617">
+<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="63416">
<summary>
Do not audit attempts to send and receive
UDP traffic on the postgresql port.
@@ -49620,7 +49666,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_postgresql_port" lineno="66633">
+<interface name="corenet_tcp_bind_postgresql_port" lineno="63431">
<summary>
Bind TCP sockets to the postgresql port.
</summary>
@@ -49631,7 +49677,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_postgresql_port" lineno="66653">
+<interface name="corenet_udp_bind_postgresql_port" lineno="63451">
<summary>
Bind UDP sockets to the postgresql port.
</summary>
@@ -49642,7 +49688,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_postgresql_port" lineno="66672">
+<interface name="corenet_tcp_connect_postgresql_port" lineno="63470">
<summary>
Make a TCP connection to the postgresql port.
</summary>
@@ -49652,7 +49698,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postgresql_client_packets" lineno="66692">
+<interface name="corenet_send_postgresql_client_packets" lineno="63490">
<summary>
Send postgresql_client packets.
</summary>
@@ -49663,7 +49709,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="66711">
+<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="63509">
<summary>
Do not audit attempts to send postgresql_client packets.
</summary>
@@ -49674,7 +49720,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postgresql_client_packets" lineno="66730">
+<interface name="corenet_receive_postgresql_client_packets" lineno="63528">
<summary>
Receive postgresql_client packets.
</summary>
@@ -49685,7 +49731,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="66749">
+<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="63547">
<summary>
Do not audit attempts to receive postgresql_client packets.
</summary>
@@ -49696,7 +49742,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postgresql_client_packets" lineno="66768">
+<interface name="corenet_sendrecv_postgresql_client_packets" lineno="63566">
<summary>
Send and receive postgresql_client packets.
</summary>
@@ -49707,7 +49753,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="66784">
+<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="63582">
<summary>
Do not audit attempts to send and receive postgresql_client packets.
</summary>
@@ -49718,7 +49764,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postgresql_client_packets" lineno="66799">
+<interface name="corenet_relabelto_postgresql_client_packets" lineno="63597">
<summary>
Relabel packets to postgresql_client the packet type.
</summary>
@@ -49728,7 +49774,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postgresql_server_packets" lineno="66819">
+<interface name="corenet_send_postgresql_server_packets" lineno="63617">
<summary>
Send postgresql_server packets.
</summary>
@@ -49739,7 +49785,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="66838">
+<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="63636">
<summary>
Do not audit attempts to send postgresql_server packets.
</summary>
@@ -49750,7 +49796,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postgresql_server_packets" lineno="66857">
+<interface name="corenet_receive_postgresql_server_packets" lineno="63655">
<summary>
Receive postgresql_server packets.
</summary>
@@ -49761,7 +49807,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="66876">
+<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="63674">
<summary>
Do not audit attempts to receive postgresql_server packets.
</summary>
@@ -49772,7 +49818,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postgresql_server_packets" lineno="66895">
+<interface name="corenet_sendrecv_postgresql_server_packets" lineno="63693">
<summary>
Send and receive postgresql_server packets.
</summary>
@@ -49783,7 +49829,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="66911">
+<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="63709">
<summary>
Do not audit attempts to send and receive postgresql_server packets.
</summary>
@@ -49794,7 +49840,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postgresql_server_packets" lineno="66926">
+<interface name="corenet_relabelto_postgresql_server_packets" lineno="63724">
<summary>
Relabel packets to postgresql_server the packet type.
</summary>
@@ -49804,7 +49850,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="66948">
+<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="63746">
<summary>
Send and receive TCP traffic on the postgrey port.
</summary>
@@ -49815,7 +49861,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_postgrey_port" lineno="66967">
+<interface name="corenet_udp_send_postgrey_port" lineno="63761">
<summary>
Send UDP traffic on the postgrey port.
</summary>
@@ -49826,7 +49872,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="66986">
+<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="63776">
<summary>
Do not audit attempts to send UDP traffic on the postgrey port.
</summary>
@@ -49837,7 +49883,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_postgrey_port" lineno="67005">
+<interface name="corenet_udp_receive_postgrey_port" lineno="63791">
<summary>
Receive UDP traffic on the postgrey port.
</summary>
@@ -49848,7 +49894,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="67024">
+<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="63806">
<summary>
Do not audit attempts to receive UDP traffic on the postgrey port.
</summary>
@@ -49859,7 +49905,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_postgrey_port" lineno="67043">
+<interface name="corenet_udp_sendrecv_postgrey_port" lineno="63821">
<summary>
Send and receive UDP traffic on the postgrey port.
</summary>
@@ -49870,7 +49916,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="67060">
+<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="63837">
<summary>
Do not audit attempts to send and receive
UDP traffic on the postgrey port.
@@ -49882,7 +49928,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_postgrey_port" lineno="67076">
+<interface name="corenet_tcp_bind_postgrey_port" lineno="63852">
<summary>
Bind TCP sockets to the postgrey port.
</summary>
@@ -49893,7 +49939,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_postgrey_port" lineno="67096">
+<interface name="corenet_udp_bind_postgrey_port" lineno="63872">
<summary>
Bind UDP sockets to the postgrey port.
</summary>
@@ -49904,7 +49950,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_postgrey_port" lineno="67115">
+<interface name="corenet_tcp_connect_postgrey_port" lineno="63891">
<summary>
Make a TCP connection to the postgrey port.
</summary>
@@ -49914,7 +49960,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postgrey_client_packets" lineno="67135">
+<interface name="corenet_send_postgrey_client_packets" lineno="63911">
<summary>
Send postgrey_client packets.
</summary>
@@ -49925,7 +49971,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="67154">
+<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="63930">
<summary>
Do not audit attempts to send postgrey_client packets.
</summary>
@@ -49936,7 +49982,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postgrey_client_packets" lineno="67173">
+<interface name="corenet_receive_postgrey_client_packets" lineno="63949">
<summary>
Receive postgrey_client packets.
</summary>
@@ -49947,7 +49993,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="67192">
+<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="63968">
<summary>
Do not audit attempts to receive postgrey_client packets.
</summary>
@@ -49958,7 +50004,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postgrey_client_packets" lineno="67211">
+<interface name="corenet_sendrecv_postgrey_client_packets" lineno="63987">
<summary>
Send and receive postgrey_client packets.
</summary>
@@ -49969,7 +50015,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="67227">
+<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="64003">
<summary>
Do not audit attempts to send and receive postgrey_client packets.
</summary>
@@ -49980,7 +50026,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postgrey_client_packets" lineno="67242">
+<interface name="corenet_relabelto_postgrey_client_packets" lineno="64018">
<summary>
Relabel packets to postgrey_client the packet type.
</summary>
@@ -49990,7 +50036,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_postgrey_server_packets" lineno="67262">
+<interface name="corenet_send_postgrey_server_packets" lineno="64038">
<summary>
Send postgrey_server packets.
</summary>
@@ -50001,7 +50047,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="67281">
+<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="64057">
<summary>
Do not audit attempts to send postgrey_server packets.
</summary>
@@ -50012,7 +50058,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_postgrey_server_packets" lineno="67300">
+<interface name="corenet_receive_postgrey_server_packets" lineno="64076">
<summary>
Receive postgrey_server packets.
</summary>
@@ -50023,7 +50069,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="67319">
+<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="64095">
<summary>
Do not audit attempts to receive postgrey_server packets.
</summary>
@@ -50034,7 +50080,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_postgrey_server_packets" lineno="67338">
+<interface name="corenet_sendrecv_postgrey_server_packets" lineno="64114">
<summary>
Send and receive postgrey_server packets.
</summary>
@@ -50045,7 +50091,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="67354">
+<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="64130">
<summary>
Do not audit attempts to send and receive postgrey_server packets.
</summary>
@@ -50056,7 +50102,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_postgrey_server_packets" lineno="67369">
+<interface name="corenet_relabelto_postgrey_server_packets" lineno="64145">
<summary>
Relabel packets to postgrey_server the packet type.
</summary>
@@ -50066,7 +50112,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pptp_port" lineno="67391">
+<interface name="corenet_tcp_sendrecv_pptp_port" lineno="64167">
<summary>
Send and receive TCP traffic on the pptp port.
</summary>
@@ -50077,7 +50123,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pptp_port" lineno="67410">
+<interface name="corenet_udp_send_pptp_port" lineno="64182">
<summary>
Send UDP traffic on the pptp port.
</summary>
@@ -50088,7 +50134,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="67429">
+<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="64197">
<summary>
Do not audit attempts to send UDP traffic on the pptp port.
</summary>
@@ -50099,7 +50145,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pptp_port" lineno="67448">
+<interface name="corenet_udp_receive_pptp_port" lineno="64212">
<summary>
Receive UDP traffic on the pptp port.
</summary>
@@ -50110,7 +50156,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="67467">
+<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="64227">
<summary>
Do not audit attempts to receive UDP traffic on the pptp port.
</summary>
@@ -50121,7 +50167,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pptp_port" lineno="67486">
+<interface name="corenet_udp_sendrecv_pptp_port" lineno="64242">
<summary>
Send and receive UDP traffic on the pptp port.
</summary>
@@ -50132,7 +50178,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="67503">
+<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="64258">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pptp port.
@@ -50144,7 +50190,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pptp_port" lineno="67519">
+<interface name="corenet_tcp_bind_pptp_port" lineno="64273">
<summary>
Bind TCP sockets to the pptp port.
</summary>
@@ -50155,7 +50201,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pptp_port" lineno="67539">
+<interface name="corenet_udp_bind_pptp_port" lineno="64293">
<summary>
Bind UDP sockets to the pptp port.
</summary>
@@ -50166,7 +50212,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pptp_port" lineno="67558">
+<interface name="corenet_tcp_connect_pptp_port" lineno="64312">
<summary>
Make a TCP connection to the pptp port.
</summary>
@@ -50176,7 +50222,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pptp_client_packets" lineno="67578">
+<interface name="corenet_send_pptp_client_packets" lineno="64332">
<summary>
Send pptp_client packets.
</summary>
@@ -50187,7 +50233,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="67597">
+<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="64351">
<summary>
Do not audit attempts to send pptp_client packets.
</summary>
@@ -50198,7 +50244,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pptp_client_packets" lineno="67616">
+<interface name="corenet_receive_pptp_client_packets" lineno="64370">
<summary>
Receive pptp_client packets.
</summary>
@@ -50209,7 +50255,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="67635">
+<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="64389">
<summary>
Do not audit attempts to receive pptp_client packets.
</summary>
@@ -50220,7 +50266,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pptp_client_packets" lineno="67654">
+<interface name="corenet_sendrecv_pptp_client_packets" lineno="64408">
<summary>
Send and receive pptp_client packets.
</summary>
@@ -50231,7 +50277,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="67670">
+<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="64424">
<summary>
Do not audit attempts to send and receive pptp_client packets.
</summary>
@@ -50242,7 +50288,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pptp_client_packets" lineno="67685">
+<interface name="corenet_relabelto_pptp_client_packets" lineno="64439">
<summary>
Relabel packets to pptp_client the packet type.
</summary>
@@ -50252,7 +50298,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pptp_server_packets" lineno="67705">
+<interface name="corenet_send_pptp_server_packets" lineno="64459">
<summary>
Send pptp_server packets.
</summary>
@@ -50263,7 +50309,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="67724">
+<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="64478">
<summary>
Do not audit attempts to send pptp_server packets.
</summary>
@@ -50274,7 +50320,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pptp_server_packets" lineno="67743">
+<interface name="corenet_receive_pptp_server_packets" lineno="64497">
<summary>
Receive pptp_server packets.
</summary>
@@ -50285,7 +50331,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="67762">
+<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="64516">
<summary>
Do not audit attempts to receive pptp_server packets.
</summary>
@@ -50296,7 +50342,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pptp_server_packets" lineno="67781">
+<interface name="corenet_sendrecv_pptp_server_packets" lineno="64535">
<summary>
Send and receive pptp_server packets.
</summary>
@@ -50307,7 +50353,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="67797">
+<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="64551">
<summary>
Do not audit attempts to send and receive pptp_server packets.
</summary>
@@ -50318,7 +50364,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pptp_server_packets" lineno="67812">
+<interface name="corenet_relabelto_pptp_server_packets" lineno="64566">
<summary>
Relabel packets to pptp_server the packet type.
</summary>
@@ -50328,7 +50374,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_prelude_port" lineno="67834">
+<interface name="corenet_tcp_sendrecv_prelude_port" lineno="64588">
<summary>
Send and receive TCP traffic on the prelude port.
</summary>
@@ -50339,7 +50385,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_prelude_port" lineno="67853">
+<interface name="corenet_udp_send_prelude_port" lineno="64603">
<summary>
Send UDP traffic on the prelude port.
</summary>
@@ -50350,7 +50396,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="67872">
+<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="64618">
<summary>
Do not audit attempts to send UDP traffic on the prelude port.
</summary>
@@ -50361,7 +50407,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_prelude_port" lineno="67891">
+<interface name="corenet_udp_receive_prelude_port" lineno="64633">
<summary>
Receive UDP traffic on the prelude port.
</summary>
@@ -50372,7 +50418,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="67910">
+<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="64648">
<summary>
Do not audit attempts to receive UDP traffic on the prelude port.
</summary>
@@ -50383,7 +50429,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_prelude_port" lineno="67929">
+<interface name="corenet_udp_sendrecv_prelude_port" lineno="64663">
<summary>
Send and receive UDP traffic on the prelude port.
</summary>
@@ -50394,7 +50440,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="67946">
+<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="64679">
<summary>
Do not audit attempts to send and receive
UDP traffic on the prelude port.
@@ -50406,7 +50452,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_prelude_port" lineno="67962">
+<interface name="corenet_tcp_bind_prelude_port" lineno="64694">
<summary>
Bind TCP sockets to the prelude port.
</summary>
@@ -50417,7 +50463,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_prelude_port" lineno="67982">
+<interface name="corenet_udp_bind_prelude_port" lineno="64714">
<summary>
Bind UDP sockets to the prelude port.
</summary>
@@ -50428,7 +50474,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_prelude_port" lineno="68001">
+<interface name="corenet_tcp_connect_prelude_port" lineno="64733">
<summary>
Make a TCP connection to the prelude port.
</summary>
@@ -50438,7 +50484,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_prelude_client_packets" lineno="68021">
+<interface name="corenet_send_prelude_client_packets" lineno="64753">
<summary>
Send prelude_client packets.
</summary>
@@ -50449,7 +50495,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="68040">
+<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="64772">
<summary>
Do not audit attempts to send prelude_client packets.
</summary>
@@ -50460,7 +50506,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_prelude_client_packets" lineno="68059">
+<interface name="corenet_receive_prelude_client_packets" lineno="64791">
<summary>
Receive prelude_client packets.
</summary>
@@ -50471,7 +50517,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="68078">
+<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="64810">
<summary>
Do not audit attempts to receive prelude_client packets.
</summary>
@@ -50482,7 +50528,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_prelude_client_packets" lineno="68097">
+<interface name="corenet_sendrecv_prelude_client_packets" lineno="64829">
<summary>
Send and receive prelude_client packets.
</summary>
@@ -50493,7 +50539,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="68113">
+<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="64845">
<summary>
Do not audit attempts to send and receive prelude_client packets.
</summary>
@@ -50504,7 +50550,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_prelude_client_packets" lineno="68128">
+<interface name="corenet_relabelto_prelude_client_packets" lineno="64860">
<summary>
Relabel packets to prelude_client the packet type.
</summary>
@@ -50514,7 +50560,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_prelude_server_packets" lineno="68148">
+<interface name="corenet_send_prelude_server_packets" lineno="64880">
<summary>
Send prelude_server packets.
</summary>
@@ -50525,7 +50571,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="68167">
+<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="64899">
<summary>
Do not audit attempts to send prelude_server packets.
</summary>
@@ -50536,7 +50582,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_prelude_server_packets" lineno="68186">
+<interface name="corenet_receive_prelude_server_packets" lineno="64918">
<summary>
Receive prelude_server packets.
</summary>
@@ -50547,7 +50593,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="68205">
+<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="64937">
<summary>
Do not audit attempts to receive prelude_server packets.
</summary>
@@ -50558,7 +50604,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_prelude_server_packets" lineno="68224">
+<interface name="corenet_sendrecv_prelude_server_packets" lineno="64956">
<summary>
Send and receive prelude_server packets.
</summary>
@@ -50569,7 +50615,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="68240">
+<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="64972">
<summary>
Do not audit attempts to send and receive prelude_server packets.
</summary>
@@ -50580,7 +50626,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_prelude_server_packets" lineno="68255">
+<interface name="corenet_relabelto_prelude_server_packets" lineno="64987">
<summary>
Relabel packets to prelude_server the packet type.
</summary>
@@ -50590,7 +50636,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_presence_port" lineno="68277">
+<interface name="corenet_tcp_sendrecv_presence_port" lineno="65009">
<summary>
Send and receive TCP traffic on the presence port.
</summary>
@@ -50601,7 +50647,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_presence_port" lineno="68296">
+<interface name="corenet_udp_send_presence_port" lineno="65024">
<summary>
Send UDP traffic on the presence port.
</summary>
@@ -50612,7 +50658,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_presence_port" lineno="68315">
+<interface name="corenet_dontaudit_udp_send_presence_port" lineno="65039">
<summary>
Do not audit attempts to send UDP traffic on the presence port.
</summary>
@@ -50623,7 +50669,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_presence_port" lineno="68334">
+<interface name="corenet_udp_receive_presence_port" lineno="65054">
<summary>
Receive UDP traffic on the presence port.
</summary>
@@ -50634,7 +50680,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="68353">
+<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="65069">
<summary>
Do not audit attempts to receive UDP traffic on the presence port.
</summary>
@@ -50645,7 +50691,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_presence_port" lineno="68372">
+<interface name="corenet_udp_sendrecv_presence_port" lineno="65084">
<summary>
Send and receive UDP traffic on the presence port.
</summary>
@@ -50656,7 +50702,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="68389">
+<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="65100">
<summary>
Do not audit attempts to send and receive
UDP traffic on the presence port.
@@ -50668,7 +50714,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_presence_port" lineno="68405">
+<interface name="corenet_tcp_bind_presence_port" lineno="65115">
<summary>
Bind TCP sockets to the presence port.
</summary>
@@ -50679,7 +50725,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_presence_port" lineno="68425">
+<interface name="corenet_udp_bind_presence_port" lineno="65135">
<summary>
Bind UDP sockets to the presence port.
</summary>
@@ -50690,7 +50736,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_presence_port" lineno="68444">
+<interface name="corenet_tcp_connect_presence_port" lineno="65154">
<summary>
Make a TCP connection to the presence port.
</summary>
@@ -50700,7 +50746,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_presence_client_packets" lineno="68464">
+<interface name="corenet_send_presence_client_packets" lineno="65174">
<summary>
Send presence_client packets.
</summary>
@@ -50711,7 +50757,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_presence_client_packets" lineno="68483">
+<interface name="corenet_dontaudit_send_presence_client_packets" lineno="65193">
<summary>
Do not audit attempts to send presence_client packets.
</summary>
@@ -50722,7 +50768,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_presence_client_packets" lineno="68502">
+<interface name="corenet_receive_presence_client_packets" lineno="65212">
<summary>
Receive presence_client packets.
</summary>
@@ -50733,7 +50779,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="68521">
+<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="65231">
<summary>
Do not audit attempts to receive presence_client packets.
</summary>
@@ -50744,7 +50790,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_presence_client_packets" lineno="68540">
+<interface name="corenet_sendrecv_presence_client_packets" lineno="65250">
<summary>
Send and receive presence_client packets.
</summary>
@@ -50755,7 +50801,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="68556">
+<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="65266">
<summary>
Do not audit attempts to send and receive presence_client packets.
</summary>
@@ -50766,7 +50812,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_presence_client_packets" lineno="68571">
+<interface name="corenet_relabelto_presence_client_packets" lineno="65281">
<summary>
Relabel packets to presence_client the packet type.
</summary>
@@ -50776,7 +50822,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_presence_server_packets" lineno="68591">
+<interface name="corenet_send_presence_server_packets" lineno="65301">
<summary>
Send presence_server packets.
</summary>
@@ -50787,7 +50833,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_presence_server_packets" lineno="68610">
+<interface name="corenet_dontaudit_send_presence_server_packets" lineno="65320">
<summary>
Do not audit attempts to send presence_server packets.
</summary>
@@ -50798,7 +50844,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_presence_server_packets" lineno="68629">
+<interface name="corenet_receive_presence_server_packets" lineno="65339">
<summary>
Receive presence_server packets.
</summary>
@@ -50809,7 +50855,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="68648">
+<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="65358">
<summary>
Do not audit attempts to receive presence_server packets.
</summary>
@@ -50820,7 +50866,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_presence_server_packets" lineno="68667">
+<interface name="corenet_sendrecv_presence_server_packets" lineno="65377">
<summary>
Send and receive presence_server packets.
</summary>
@@ -50831,7 +50877,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="68683">
+<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="65393">
<summary>
Do not audit attempts to send and receive presence_server packets.
</summary>
@@ -50842,7 +50888,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_presence_server_packets" lineno="68698">
+<interface name="corenet_relabelto_presence_server_packets" lineno="65408">
<summary>
Relabel packets to presence_server the packet type.
</summary>
@@ -50852,7 +50898,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_printer_port" lineno="68720">
+<interface name="corenet_tcp_sendrecv_printer_port" lineno="65430">
<summary>
Send and receive TCP traffic on the printer port.
</summary>
@@ -50863,7 +50909,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_printer_port" lineno="68739">
+<interface name="corenet_udp_send_printer_port" lineno="65445">
<summary>
Send UDP traffic on the printer port.
</summary>
@@ -50874,7 +50920,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_printer_port" lineno="68758">
+<interface name="corenet_dontaudit_udp_send_printer_port" lineno="65460">
<summary>
Do not audit attempts to send UDP traffic on the printer port.
</summary>
@@ -50885,7 +50931,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_printer_port" lineno="68777">
+<interface name="corenet_udp_receive_printer_port" lineno="65475">
<summary>
Receive UDP traffic on the printer port.
</summary>
@@ -50896,7 +50942,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="68796">
+<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="65490">
<summary>
Do not audit attempts to receive UDP traffic on the printer port.
</summary>
@@ -50907,7 +50953,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_printer_port" lineno="68815">
+<interface name="corenet_udp_sendrecv_printer_port" lineno="65505">
<summary>
Send and receive UDP traffic on the printer port.
</summary>
@@ -50918,7 +50964,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="68832">
+<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="65521">
<summary>
Do not audit attempts to send and receive
UDP traffic on the printer port.
@@ -50930,7 +50976,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_printer_port" lineno="68848">
+<interface name="corenet_tcp_bind_printer_port" lineno="65536">
<summary>
Bind TCP sockets to the printer port.
</summary>
@@ -50941,7 +50987,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_printer_port" lineno="68868">
+<interface name="corenet_udp_bind_printer_port" lineno="65556">
<summary>
Bind UDP sockets to the printer port.
</summary>
@@ -50952,7 +50998,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_printer_port" lineno="68887">
+<interface name="corenet_tcp_connect_printer_port" lineno="65575">
<summary>
Make a TCP connection to the printer port.
</summary>
@@ -50962,7 +51008,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_printer_client_packets" lineno="68907">
+<interface name="corenet_send_printer_client_packets" lineno="65595">
<summary>
Send printer_client packets.
</summary>
@@ -50973,7 +51019,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_printer_client_packets" lineno="68926">
+<interface name="corenet_dontaudit_send_printer_client_packets" lineno="65614">
<summary>
Do not audit attempts to send printer_client packets.
</summary>
@@ -50984,7 +51030,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_printer_client_packets" lineno="68945">
+<interface name="corenet_receive_printer_client_packets" lineno="65633">
<summary>
Receive printer_client packets.
</summary>
@@ -50995,7 +51041,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="68964">
+<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="65652">
<summary>
Do not audit attempts to receive printer_client packets.
</summary>
@@ -51006,7 +51052,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_printer_client_packets" lineno="68983">
+<interface name="corenet_sendrecv_printer_client_packets" lineno="65671">
<summary>
Send and receive printer_client packets.
</summary>
@@ -51017,7 +51063,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="68999">
+<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="65687">
<summary>
Do not audit attempts to send and receive printer_client packets.
</summary>
@@ -51028,7 +51074,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_printer_client_packets" lineno="69014">
+<interface name="corenet_relabelto_printer_client_packets" lineno="65702">
<summary>
Relabel packets to printer_client the packet type.
</summary>
@@ -51038,7 +51084,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_printer_server_packets" lineno="69034">
+<interface name="corenet_send_printer_server_packets" lineno="65722">
<summary>
Send printer_server packets.
</summary>
@@ -51049,7 +51095,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_printer_server_packets" lineno="69053">
+<interface name="corenet_dontaudit_send_printer_server_packets" lineno="65741">
<summary>
Do not audit attempts to send printer_server packets.
</summary>
@@ -51060,7 +51106,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_printer_server_packets" lineno="69072">
+<interface name="corenet_receive_printer_server_packets" lineno="65760">
<summary>
Receive printer_server packets.
</summary>
@@ -51071,7 +51117,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="69091">
+<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="65779">
<summary>
Do not audit attempts to receive printer_server packets.
</summary>
@@ -51082,7 +51128,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_printer_server_packets" lineno="69110">
+<interface name="corenet_sendrecv_printer_server_packets" lineno="65798">
<summary>
Send and receive printer_server packets.
</summary>
@@ -51093,7 +51139,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="69126">
+<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="65814">
<summary>
Do not audit attempts to send and receive printer_server packets.
</summary>
@@ -51104,7 +51150,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_printer_server_packets" lineno="69141">
+<interface name="corenet_relabelto_printer_server_packets" lineno="65829">
<summary>
Relabel packets to printer_server the packet type.
</summary>
@@ -51114,7 +51160,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ptal_port" lineno="69163">
+<interface name="corenet_tcp_sendrecv_ptal_port" lineno="65851">
<summary>
Send and receive TCP traffic on the ptal port.
</summary>
@@ -51125,7 +51171,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ptal_port" lineno="69182">
+<interface name="corenet_udp_send_ptal_port" lineno="65866">
<summary>
Send UDP traffic on the ptal port.
</summary>
@@ -51136,7 +51182,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="69201">
+<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="65881">
<summary>
Do not audit attempts to send UDP traffic on the ptal port.
</summary>
@@ -51147,7 +51193,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ptal_port" lineno="69220">
+<interface name="corenet_udp_receive_ptal_port" lineno="65896">
<summary>
Receive UDP traffic on the ptal port.
</summary>
@@ -51158,7 +51204,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="69239">
+<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="65911">
<summary>
Do not audit attempts to receive UDP traffic on the ptal port.
</summary>
@@ -51169,7 +51215,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ptal_port" lineno="69258">
+<interface name="corenet_udp_sendrecv_ptal_port" lineno="65926">
<summary>
Send and receive UDP traffic on the ptal port.
</summary>
@@ -51180,7 +51226,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="69275">
+<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="65942">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ptal port.
@@ -51192,7 +51238,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ptal_port" lineno="69291">
+<interface name="corenet_tcp_bind_ptal_port" lineno="65957">
<summary>
Bind TCP sockets to the ptal port.
</summary>
@@ -51203,7 +51249,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ptal_port" lineno="69311">
+<interface name="corenet_udp_bind_ptal_port" lineno="65977">
<summary>
Bind UDP sockets to the ptal port.
</summary>
@@ -51214,7 +51260,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ptal_port" lineno="69330">
+<interface name="corenet_tcp_connect_ptal_port" lineno="65996">
<summary>
Make a TCP connection to the ptal port.
</summary>
@@ -51224,7 +51270,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ptal_client_packets" lineno="69350">
+<interface name="corenet_send_ptal_client_packets" lineno="66016">
<summary>
Send ptal_client packets.
</summary>
@@ -51235,7 +51281,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="69369">
+<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="66035">
<summary>
Do not audit attempts to send ptal_client packets.
</summary>
@@ -51246,7 +51292,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ptal_client_packets" lineno="69388">
+<interface name="corenet_receive_ptal_client_packets" lineno="66054">
<summary>
Receive ptal_client packets.
</summary>
@@ -51257,7 +51303,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="69407">
+<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="66073">
<summary>
Do not audit attempts to receive ptal_client packets.
</summary>
@@ -51268,7 +51314,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ptal_client_packets" lineno="69426">
+<interface name="corenet_sendrecv_ptal_client_packets" lineno="66092">
<summary>
Send and receive ptal_client packets.
</summary>
@@ -51279,7 +51325,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="69442">
+<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="66108">
<summary>
Do not audit attempts to send and receive ptal_client packets.
</summary>
@@ -51290,7 +51336,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ptal_client_packets" lineno="69457">
+<interface name="corenet_relabelto_ptal_client_packets" lineno="66123">
<summary>
Relabel packets to ptal_client the packet type.
</summary>
@@ -51300,7 +51346,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ptal_server_packets" lineno="69477">
+<interface name="corenet_send_ptal_server_packets" lineno="66143">
<summary>
Send ptal_server packets.
</summary>
@@ -51311,7 +51357,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="69496">
+<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="66162">
<summary>
Do not audit attempts to send ptal_server packets.
</summary>
@@ -51322,7 +51368,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ptal_server_packets" lineno="69515">
+<interface name="corenet_receive_ptal_server_packets" lineno="66181">
<summary>
Receive ptal_server packets.
</summary>
@@ -51333,7 +51379,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="69534">
+<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="66200">
<summary>
Do not audit attempts to receive ptal_server packets.
</summary>
@@ -51344,7 +51390,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ptal_server_packets" lineno="69553">
+<interface name="corenet_sendrecv_ptal_server_packets" lineno="66219">
<summary>
Send and receive ptal_server packets.
</summary>
@@ -51355,7 +51401,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="69569">
+<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="66235">
<summary>
Do not audit attempts to send and receive ptal_server packets.
</summary>
@@ -51366,7 +51412,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ptal_server_packets" lineno="69584">
+<interface name="corenet_relabelto_ptal_server_packets" lineno="66250">
<summary>
Relabel packets to ptal_server the packet type.
</summary>
@@ -51376,7 +51422,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="69606">
+<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="66272">
<summary>
Send and receive TCP traffic on the pulseaudio port.
</summary>
@@ -51387,7 +51433,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pulseaudio_port" lineno="69625">
+<interface name="corenet_udp_send_pulseaudio_port" lineno="66287">
<summary>
Send UDP traffic on the pulseaudio port.
</summary>
@@ -51398,7 +51444,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="69644">
+<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="66302">
<summary>
Do not audit attempts to send UDP traffic on the pulseaudio port.
</summary>
@@ -51409,7 +51455,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pulseaudio_port" lineno="69663">
+<interface name="corenet_udp_receive_pulseaudio_port" lineno="66317">
<summary>
Receive UDP traffic on the pulseaudio port.
</summary>
@@ -51420,7 +51466,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="69682">
+<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="66332">
<summary>
Do not audit attempts to receive UDP traffic on the pulseaudio port.
</summary>
@@ -51431,7 +51477,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="69701">
+<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="66347">
<summary>
Send and receive UDP traffic on the pulseaudio port.
</summary>
@@ -51442,7 +51488,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="69718">
+<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="66363">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pulseaudio port.
@@ -51454,7 +51500,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pulseaudio_port" lineno="69734">
+<interface name="corenet_tcp_bind_pulseaudio_port" lineno="66378">
<summary>
Bind TCP sockets to the pulseaudio port.
</summary>
@@ -51465,7 +51511,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pulseaudio_port" lineno="69754">
+<interface name="corenet_udp_bind_pulseaudio_port" lineno="66398">
<summary>
Bind UDP sockets to the pulseaudio port.
</summary>
@@ -51476,7 +51522,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pulseaudio_port" lineno="69773">
+<interface name="corenet_tcp_connect_pulseaudio_port" lineno="66417">
<summary>
Make a TCP connection to the pulseaudio port.
</summary>
@@ -51486,7 +51532,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pulseaudio_client_packets" lineno="69793">
+<interface name="corenet_send_pulseaudio_client_packets" lineno="66437">
<summary>
Send pulseaudio_client packets.
</summary>
@@ -51497,7 +51543,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="69812">
+<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="66456">
<summary>
Do not audit attempts to send pulseaudio_client packets.
</summary>
@@ -51508,7 +51554,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pulseaudio_client_packets" lineno="69831">
+<interface name="corenet_receive_pulseaudio_client_packets" lineno="66475">
<summary>
Receive pulseaudio_client packets.
</summary>
@@ -51519,7 +51565,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="69850">
+<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="66494">
<summary>
Do not audit attempts to receive pulseaudio_client packets.
</summary>
@@ -51530,7 +51576,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="69869">
+<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="66513">
<summary>
Send and receive pulseaudio_client packets.
</summary>
@@ -51541,7 +51587,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="69885">
+<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="66529">
<summary>
Do not audit attempts to send and receive pulseaudio_client packets.
</summary>
@@ -51552,7 +51598,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="69900">
+<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="66544">
<summary>
Relabel packets to pulseaudio_client the packet type.
</summary>
@@ -51562,7 +51608,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pulseaudio_server_packets" lineno="69920">
+<interface name="corenet_send_pulseaudio_server_packets" lineno="66564">
<summary>
Send pulseaudio_server packets.
</summary>
@@ -51573,7 +51619,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="69939">
+<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="66583">
<summary>
Do not audit attempts to send pulseaudio_server packets.
</summary>
@@ -51584,7 +51630,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pulseaudio_server_packets" lineno="69958">
+<interface name="corenet_receive_pulseaudio_server_packets" lineno="66602">
<summary>
Receive pulseaudio_server packets.
</summary>
@@ -51595,7 +51641,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="69977">
+<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="66621">
<summary>
Do not audit attempts to receive pulseaudio_server packets.
</summary>
@@ -51606,7 +51652,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="69996">
+<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="66640">
<summary>
Send and receive pulseaudio_server packets.
</summary>
@@ -51617,7 +51663,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="70012">
+<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="66656">
<summary>
Do not audit attempts to send and receive pulseaudio_server packets.
</summary>
@@ -51628,7 +51674,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="70027">
+<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="66671">
<summary>
Relabel packets to pulseaudio_server the packet type.
</summary>
@@ -51638,7 +51684,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_puppet_port" lineno="70049">
+<interface name="corenet_tcp_sendrecv_puppet_port" lineno="66693">
<summary>
Send and receive TCP traffic on the puppet port.
</summary>
@@ -51649,7 +51695,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_puppet_port" lineno="70068">
+<interface name="corenet_udp_send_puppet_port" lineno="66708">
<summary>
Send UDP traffic on the puppet port.
</summary>
@@ -51660,7 +51706,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="70087">
+<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="66723">
<summary>
Do not audit attempts to send UDP traffic on the puppet port.
</summary>
@@ -51671,7 +51717,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_puppet_port" lineno="70106">
+<interface name="corenet_udp_receive_puppet_port" lineno="66738">
<summary>
Receive UDP traffic on the puppet port.
</summary>
@@ -51682,7 +51728,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="70125">
+<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="66753">
<summary>
Do not audit attempts to receive UDP traffic on the puppet port.
</summary>
@@ -51693,7 +51739,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_puppet_port" lineno="70144">
+<interface name="corenet_udp_sendrecv_puppet_port" lineno="66768">
<summary>
Send and receive UDP traffic on the puppet port.
</summary>
@@ -51704,7 +51750,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="70161">
+<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="66784">
<summary>
Do not audit attempts to send and receive
UDP traffic on the puppet port.
@@ -51716,7 +51762,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_puppet_port" lineno="70177">
+<interface name="corenet_tcp_bind_puppet_port" lineno="66799">
<summary>
Bind TCP sockets to the puppet port.
</summary>
@@ -51727,7 +51773,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_puppet_port" lineno="70197">
+<interface name="corenet_udp_bind_puppet_port" lineno="66819">
<summary>
Bind UDP sockets to the puppet port.
</summary>
@@ -51738,7 +51784,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_puppet_port" lineno="70216">
+<interface name="corenet_tcp_connect_puppet_port" lineno="66838">
<summary>
Make a TCP connection to the puppet port.
</summary>
@@ -51748,7 +51794,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_puppet_client_packets" lineno="70236">
+<interface name="corenet_send_puppet_client_packets" lineno="66858">
<summary>
Send puppet_client packets.
</summary>
@@ -51759,7 +51805,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="70255">
+<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="66877">
<summary>
Do not audit attempts to send puppet_client packets.
</summary>
@@ -51770,7 +51816,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_puppet_client_packets" lineno="70274">
+<interface name="corenet_receive_puppet_client_packets" lineno="66896">
<summary>
Receive puppet_client packets.
</summary>
@@ -51781,7 +51827,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="70293">
+<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="66915">
<summary>
Do not audit attempts to receive puppet_client packets.
</summary>
@@ -51792,7 +51838,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_puppet_client_packets" lineno="70312">
+<interface name="corenet_sendrecv_puppet_client_packets" lineno="66934">
<summary>
Send and receive puppet_client packets.
</summary>
@@ -51803,7 +51849,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="70328">
+<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="66950">
<summary>
Do not audit attempts to send and receive puppet_client packets.
</summary>
@@ -51814,7 +51860,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_puppet_client_packets" lineno="70343">
+<interface name="corenet_relabelto_puppet_client_packets" lineno="66965">
<summary>
Relabel packets to puppet_client the packet type.
</summary>
@@ -51824,7 +51870,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_puppet_server_packets" lineno="70363">
+<interface name="corenet_send_puppet_server_packets" lineno="66985">
<summary>
Send puppet_server packets.
</summary>
@@ -51835,7 +51881,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="70382">
+<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="67004">
<summary>
Do not audit attempts to send puppet_server packets.
</summary>
@@ -51846,7 +51892,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_puppet_server_packets" lineno="70401">
+<interface name="corenet_receive_puppet_server_packets" lineno="67023">
<summary>
Receive puppet_server packets.
</summary>
@@ -51857,7 +51903,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="70420">
+<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="67042">
<summary>
Do not audit attempts to receive puppet_server packets.
</summary>
@@ -51868,7 +51914,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_puppet_server_packets" lineno="70439">
+<interface name="corenet_sendrecv_puppet_server_packets" lineno="67061">
<summary>
Send and receive puppet_server packets.
</summary>
@@ -51879,7 +51925,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="70455">
+<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="67077">
<summary>
Do not audit attempts to send and receive puppet_server packets.
</summary>
@@ -51890,7 +51936,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_puppet_server_packets" lineno="70470">
+<interface name="corenet_relabelto_puppet_server_packets" lineno="67092">
<summary>
Relabel packets to puppet_server the packet type.
</summary>
@@ -51900,7 +51946,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="70492">
+<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="67114">
<summary>
Send and receive TCP traffic on the puppetclient port.
</summary>
@@ -51911,7 +51957,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_puppetclient_port" lineno="70511">
+<interface name="corenet_udp_send_puppetclient_port" lineno="67129">
<summary>
Send UDP traffic on the puppetclient port.
</summary>
@@ -51922,7 +51968,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="70530">
+<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="67144">
<summary>
Do not audit attempts to send UDP traffic on the puppetclient port.
</summary>
@@ -51933,7 +51979,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_puppetclient_port" lineno="70549">
+<interface name="corenet_udp_receive_puppetclient_port" lineno="67159">
<summary>
Receive UDP traffic on the puppetclient port.
</summary>
@@ -51944,7 +51990,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="70568">
+<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="67174">
<summary>
Do not audit attempts to receive UDP traffic on the puppetclient port.
</summary>
@@ -51955,7 +52001,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="70587">
+<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="67189">
<summary>
Send and receive UDP traffic on the puppetclient port.
</summary>
@@ -51966,7 +52012,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="70604">
+<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="67205">
<summary>
Do not audit attempts to send and receive
UDP traffic on the puppetclient port.
@@ -51978,7 +52024,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_puppetclient_port" lineno="70620">
+<interface name="corenet_tcp_bind_puppetclient_port" lineno="67220">
<summary>
Bind TCP sockets to the puppetclient port.
</summary>
@@ -51989,7 +52035,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_puppetclient_port" lineno="70640">
+<interface name="corenet_udp_bind_puppetclient_port" lineno="67240">
<summary>
Bind UDP sockets to the puppetclient port.
</summary>
@@ -52000,7 +52046,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_puppetclient_port" lineno="70659">
+<interface name="corenet_tcp_connect_puppetclient_port" lineno="67259">
<summary>
Make a TCP connection to the puppetclient port.
</summary>
@@ -52010,7 +52056,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_puppetclient_client_packets" lineno="70679">
+<interface name="corenet_send_puppetclient_client_packets" lineno="67279">
<summary>
Send puppetclient_client packets.
</summary>
@@ -52021,7 +52067,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="70698">
+<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="67298">
<summary>
Do not audit attempts to send puppetclient_client packets.
</summary>
@@ -52032,7 +52078,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_puppetclient_client_packets" lineno="70717">
+<interface name="corenet_receive_puppetclient_client_packets" lineno="67317">
<summary>
Receive puppetclient_client packets.
</summary>
@@ -52043,7 +52089,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="70736">
+<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="67336">
<summary>
Do not audit attempts to receive puppetclient_client packets.
</summary>
@@ -52054,7 +52100,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="70755">
+<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="67355">
<summary>
Send and receive puppetclient_client packets.
</summary>
@@ -52065,7 +52111,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="70771">
+<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="67371">
<summary>
Do not audit attempts to send and receive puppetclient_client packets.
</summary>
@@ -52076,7 +52122,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_puppetclient_client_packets" lineno="70786">
+<interface name="corenet_relabelto_puppetclient_client_packets" lineno="67386">
<summary>
Relabel packets to puppetclient_client the packet type.
</summary>
@@ -52086,7 +52132,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_puppetclient_server_packets" lineno="70806">
+<interface name="corenet_send_puppetclient_server_packets" lineno="67406">
<summary>
Send puppetclient_server packets.
</summary>
@@ -52097,7 +52143,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="70825">
+<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="67425">
<summary>
Do not audit attempts to send puppetclient_server packets.
</summary>
@@ -52108,7 +52154,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_puppetclient_server_packets" lineno="70844">
+<interface name="corenet_receive_puppetclient_server_packets" lineno="67444">
<summary>
Receive puppetclient_server packets.
</summary>
@@ -52119,7 +52165,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="70863">
+<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="67463">
<summary>
Do not audit attempts to receive puppetclient_server packets.
</summary>
@@ -52130,7 +52176,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="70882">
+<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="67482">
<summary>
Send and receive puppetclient_server packets.
</summary>
@@ -52141,7 +52187,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="70898">
+<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="67498">
<summary>
Do not audit attempts to send and receive puppetclient_server packets.
</summary>
@@ -52152,7 +52198,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_puppetclient_server_packets" lineno="70913">
+<interface name="corenet_relabelto_puppetclient_server_packets" lineno="67513">
<summary>
Relabel packets to puppetclient_server the packet type.
</summary>
@@ -52162,7 +52208,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pxe_port" lineno="70935">
+<interface name="corenet_tcp_sendrecv_pxe_port" lineno="67535">
<summary>
Send and receive TCP traffic on the pxe port.
</summary>
@@ -52173,7 +52219,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pxe_port" lineno="70954">
+<interface name="corenet_udp_send_pxe_port" lineno="67550">
<summary>
Send UDP traffic on the pxe port.
</summary>
@@ -52184,7 +52230,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="70973">
+<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="67565">
<summary>
Do not audit attempts to send UDP traffic on the pxe port.
</summary>
@@ -52195,7 +52241,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pxe_port" lineno="70992">
+<interface name="corenet_udp_receive_pxe_port" lineno="67580">
<summary>
Receive UDP traffic on the pxe port.
</summary>
@@ -52206,7 +52252,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="71011">
+<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="67595">
<summary>
Do not audit attempts to receive UDP traffic on the pxe port.
</summary>
@@ -52217,7 +52263,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pxe_port" lineno="71030">
+<interface name="corenet_udp_sendrecv_pxe_port" lineno="67610">
<summary>
Send and receive UDP traffic on the pxe port.
</summary>
@@ -52228,7 +52274,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="71047">
+<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="67626">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pxe port.
@@ -52240,7 +52286,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pxe_port" lineno="71063">
+<interface name="corenet_tcp_bind_pxe_port" lineno="67641">
<summary>
Bind TCP sockets to the pxe port.
</summary>
@@ -52251,7 +52297,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pxe_port" lineno="71083">
+<interface name="corenet_udp_bind_pxe_port" lineno="67661">
<summary>
Bind UDP sockets to the pxe port.
</summary>
@@ -52262,7 +52308,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pxe_port" lineno="71102">
+<interface name="corenet_tcp_connect_pxe_port" lineno="67680">
<summary>
Make a TCP connection to the pxe port.
</summary>
@@ -52272,7 +52318,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pxe_client_packets" lineno="71122">
+<interface name="corenet_send_pxe_client_packets" lineno="67700">
<summary>
Send pxe_client packets.
</summary>
@@ -52283,7 +52329,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="71141">
+<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="67719">
<summary>
Do not audit attempts to send pxe_client packets.
</summary>
@@ -52294,7 +52340,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pxe_client_packets" lineno="71160">
+<interface name="corenet_receive_pxe_client_packets" lineno="67738">
<summary>
Receive pxe_client packets.
</summary>
@@ -52305,7 +52351,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="71179">
+<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="67757">
<summary>
Do not audit attempts to receive pxe_client packets.
</summary>
@@ -52316,7 +52362,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pxe_client_packets" lineno="71198">
+<interface name="corenet_sendrecv_pxe_client_packets" lineno="67776">
<summary>
Send and receive pxe_client packets.
</summary>
@@ -52327,7 +52373,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="71214">
+<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="67792">
<summary>
Do not audit attempts to send and receive pxe_client packets.
</summary>
@@ -52338,7 +52384,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pxe_client_packets" lineno="71229">
+<interface name="corenet_relabelto_pxe_client_packets" lineno="67807">
<summary>
Relabel packets to pxe_client the packet type.
</summary>
@@ -52348,7 +52394,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pxe_server_packets" lineno="71249">
+<interface name="corenet_send_pxe_server_packets" lineno="67827">
<summary>
Send pxe_server packets.
</summary>
@@ -52359,7 +52405,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="71268">
+<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="67846">
<summary>
Do not audit attempts to send pxe_server packets.
</summary>
@@ -52370,7 +52416,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pxe_server_packets" lineno="71287">
+<interface name="corenet_receive_pxe_server_packets" lineno="67865">
<summary>
Receive pxe_server packets.
</summary>
@@ -52381,7 +52427,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="71306">
+<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="67884">
<summary>
Do not audit attempts to receive pxe_server packets.
</summary>
@@ -52392,7 +52438,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pxe_server_packets" lineno="71325">
+<interface name="corenet_sendrecv_pxe_server_packets" lineno="67903">
<summary>
Send and receive pxe_server packets.
</summary>
@@ -52403,7 +52449,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="71341">
+<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="67919">
<summary>
Do not audit attempts to send and receive pxe_server packets.
</summary>
@@ -52414,7 +52460,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pxe_server_packets" lineno="71356">
+<interface name="corenet_relabelto_pxe_server_packets" lineno="67934">
<summary>
Relabel packets to pxe_server the packet type.
</summary>
@@ -52424,7 +52470,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="71378">
+<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="67956">
<summary>
Send and receive TCP traffic on the pyzor port.
</summary>
@@ -52435,7 +52481,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_pyzor_port" lineno="71397">
+<interface name="corenet_udp_send_pyzor_port" lineno="67971">
<summary>
Send UDP traffic on the pyzor port.
</summary>
@@ -52446,7 +52492,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="71416">
+<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="67986">
<summary>
Do not audit attempts to send UDP traffic on the pyzor port.
</summary>
@@ -52457,7 +52503,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_pyzor_port" lineno="71435">
+<interface name="corenet_udp_receive_pyzor_port" lineno="68001">
<summary>
Receive UDP traffic on the pyzor port.
</summary>
@@ -52468,7 +52514,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="71454">
+<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="68016">
<summary>
Do not audit attempts to receive UDP traffic on the pyzor port.
</summary>
@@ -52479,7 +52525,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_pyzor_port" lineno="71473">
+<interface name="corenet_udp_sendrecv_pyzor_port" lineno="68031">
<summary>
Send and receive UDP traffic on the pyzor port.
</summary>
@@ -52490,7 +52536,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="71490">
+<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="68047">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pyzor port.
@@ -52502,7 +52548,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_pyzor_port" lineno="71506">
+<interface name="corenet_tcp_bind_pyzor_port" lineno="68062">
<summary>
Bind TCP sockets to the pyzor port.
</summary>
@@ -52513,7 +52559,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_pyzor_port" lineno="71526">
+<interface name="corenet_udp_bind_pyzor_port" lineno="68082">
<summary>
Bind UDP sockets to the pyzor port.
</summary>
@@ -52524,7 +52570,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_pyzor_port" lineno="71545">
+<interface name="corenet_tcp_connect_pyzor_port" lineno="68101">
<summary>
Make a TCP connection to the pyzor port.
</summary>
@@ -52534,7 +52580,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pyzor_client_packets" lineno="71565">
+<interface name="corenet_send_pyzor_client_packets" lineno="68121">
<summary>
Send pyzor_client packets.
</summary>
@@ -52545,7 +52591,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="71584">
+<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="68140">
<summary>
Do not audit attempts to send pyzor_client packets.
</summary>
@@ -52556,7 +52602,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pyzor_client_packets" lineno="71603">
+<interface name="corenet_receive_pyzor_client_packets" lineno="68159">
<summary>
Receive pyzor_client packets.
</summary>
@@ -52567,7 +52613,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="71622">
+<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="68178">
<summary>
Do not audit attempts to receive pyzor_client packets.
</summary>
@@ -52578,7 +52624,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pyzor_client_packets" lineno="71641">
+<interface name="corenet_sendrecv_pyzor_client_packets" lineno="68197">
<summary>
Send and receive pyzor_client packets.
</summary>
@@ -52589,7 +52635,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="71657">
+<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="68213">
<summary>
Do not audit attempts to send and receive pyzor_client packets.
</summary>
@@ -52600,7 +52646,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pyzor_client_packets" lineno="71672">
+<interface name="corenet_relabelto_pyzor_client_packets" lineno="68228">
<summary>
Relabel packets to pyzor_client the packet type.
</summary>
@@ -52610,7 +52656,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_pyzor_server_packets" lineno="71692">
+<interface name="corenet_send_pyzor_server_packets" lineno="68248">
<summary>
Send pyzor_server packets.
</summary>
@@ -52621,7 +52667,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="71711">
+<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="68267">
<summary>
Do not audit attempts to send pyzor_server packets.
</summary>
@@ -52632,7 +52678,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_pyzor_server_packets" lineno="71730">
+<interface name="corenet_receive_pyzor_server_packets" lineno="68286">
<summary>
Receive pyzor_server packets.
</summary>
@@ -52643,7 +52689,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="71749">
+<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="68305">
<summary>
Do not audit attempts to receive pyzor_server packets.
</summary>
@@ -52654,7 +52700,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_pyzor_server_packets" lineno="71768">
+<interface name="corenet_sendrecv_pyzor_server_packets" lineno="68324">
<summary>
Send and receive pyzor_server packets.
</summary>
@@ -52665,7 +52711,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="71784">
+<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="68340">
<summary>
Do not audit attempts to send and receive pyzor_server packets.
</summary>
@@ -52676,7 +52722,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_pyzor_server_packets" lineno="71799">
+<interface name="corenet_relabelto_pyzor_server_packets" lineno="68355">
<summary>
Relabel packets to pyzor_server the packet type.
</summary>
@@ -52686,7 +52732,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_radacct_port" lineno="71821">
+<interface name="corenet_tcp_sendrecv_radacct_port" lineno="68377">
<summary>
Send and receive TCP traffic on the radacct port.
</summary>
@@ -52697,7 +52743,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_radacct_port" lineno="71840">
+<interface name="corenet_udp_send_radacct_port" lineno="68392">
<summary>
Send UDP traffic on the radacct port.
</summary>
@@ -52708,7 +52754,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="71859">
+<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="68407">
<summary>
Do not audit attempts to send UDP traffic on the radacct port.
</summary>
@@ -52719,7 +52765,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_radacct_port" lineno="71878">
+<interface name="corenet_udp_receive_radacct_port" lineno="68422">
<summary>
Receive UDP traffic on the radacct port.
</summary>
@@ -52730,7 +52776,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="71897">
+<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="68437">
<summary>
Do not audit attempts to receive UDP traffic on the radacct port.
</summary>
@@ -52741,7 +52787,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_radacct_port" lineno="71916">
+<interface name="corenet_udp_sendrecv_radacct_port" lineno="68452">
<summary>
Send and receive UDP traffic on the radacct port.
</summary>
@@ -52752,7 +52798,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="71933">
+<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="68468">
<summary>
Do not audit attempts to send and receive
UDP traffic on the radacct port.
@@ -52764,7 +52810,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_radacct_port" lineno="71949">
+<interface name="corenet_tcp_bind_radacct_port" lineno="68483">
<summary>
Bind TCP sockets to the radacct port.
</summary>
@@ -52775,7 +52821,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_radacct_port" lineno="71969">
+<interface name="corenet_udp_bind_radacct_port" lineno="68503">
<summary>
Bind UDP sockets to the radacct port.
</summary>
@@ -52786,7 +52832,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_radacct_port" lineno="71988">
+<interface name="corenet_tcp_connect_radacct_port" lineno="68522">
<summary>
Make a TCP connection to the radacct port.
</summary>
@@ -52796,7 +52842,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radacct_client_packets" lineno="72008">
+<interface name="corenet_send_radacct_client_packets" lineno="68542">
<summary>
Send radacct_client packets.
</summary>
@@ -52807,7 +52853,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="72027">
+<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="68561">
<summary>
Do not audit attempts to send radacct_client packets.
</summary>
@@ -52818,7 +52864,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radacct_client_packets" lineno="72046">
+<interface name="corenet_receive_radacct_client_packets" lineno="68580">
<summary>
Receive radacct_client packets.
</summary>
@@ -52829,7 +52875,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="72065">
+<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="68599">
<summary>
Do not audit attempts to receive radacct_client packets.
</summary>
@@ -52840,7 +52886,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radacct_client_packets" lineno="72084">
+<interface name="corenet_sendrecv_radacct_client_packets" lineno="68618">
<summary>
Send and receive radacct_client packets.
</summary>
@@ -52851,7 +52897,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="72100">
+<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="68634">
<summary>
Do not audit attempts to send and receive radacct_client packets.
</summary>
@@ -52862,7 +52908,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radacct_client_packets" lineno="72115">
+<interface name="corenet_relabelto_radacct_client_packets" lineno="68649">
<summary>
Relabel packets to radacct_client the packet type.
</summary>
@@ -52872,7 +52918,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radacct_server_packets" lineno="72135">
+<interface name="corenet_send_radacct_server_packets" lineno="68669">
<summary>
Send radacct_server packets.
</summary>
@@ -52883,7 +52929,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="72154">
+<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="68688">
<summary>
Do not audit attempts to send radacct_server packets.
</summary>
@@ -52894,7 +52940,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radacct_server_packets" lineno="72173">
+<interface name="corenet_receive_radacct_server_packets" lineno="68707">
<summary>
Receive radacct_server packets.
</summary>
@@ -52905,7 +52951,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="72192">
+<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="68726">
<summary>
Do not audit attempts to receive radacct_server packets.
</summary>
@@ -52916,7 +52962,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radacct_server_packets" lineno="72211">
+<interface name="corenet_sendrecv_radacct_server_packets" lineno="68745">
<summary>
Send and receive radacct_server packets.
</summary>
@@ -52927,7 +52973,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="72227">
+<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="68761">
<summary>
Do not audit attempts to send and receive radacct_server packets.
</summary>
@@ -52938,7 +52984,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radacct_server_packets" lineno="72242">
+<interface name="corenet_relabelto_radacct_server_packets" lineno="68776">
<summary>
Relabel packets to radacct_server the packet type.
</summary>
@@ -52948,7 +52994,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_radius_port" lineno="72264">
+<interface name="corenet_tcp_sendrecv_radius_port" lineno="68798">
<summary>
Send and receive TCP traffic on the radius port.
</summary>
@@ -52959,7 +53005,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_radius_port" lineno="72283">
+<interface name="corenet_udp_send_radius_port" lineno="68813">
<summary>
Send UDP traffic on the radius port.
</summary>
@@ -52970,7 +53016,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_radius_port" lineno="72302">
+<interface name="corenet_dontaudit_udp_send_radius_port" lineno="68828">
<summary>
Do not audit attempts to send UDP traffic on the radius port.
</summary>
@@ -52981,7 +53027,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_radius_port" lineno="72321">
+<interface name="corenet_udp_receive_radius_port" lineno="68843">
<summary>
Receive UDP traffic on the radius port.
</summary>
@@ -52992,7 +53038,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="72340">
+<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="68858">
<summary>
Do not audit attempts to receive UDP traffic on the radius port.
</summary>
@@ -53003,7 +53049,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_radius_port" lineno="72359">
+<interface name="corenet_udp_sendrecv_radius_port" lineno="68873">
<summary>
Send and receive UDP traffic on the radius port.
</summary>
@@ -53014,7 +53060,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="72376">
+<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="68889">
<summary>
Do not audit attempts to send and receive
UDP traffic on the radius port.
@@ -53026,7 +53072,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_radius_port" lineno="72392">
+<interface name="corenet_tcp_bind_radius_port" lineno="68904">
<summary>
Bind TCP sockets to the radius port.
</summary>
@@ -53037,7 +53083,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_radius_port" lineno="72412">
+<interface name="corenet_udp_bind_radius_port" lineno="68924">
<summary>
Bind UDP sockets to the radius port.
</summary>
@@ -53048,7 +53094,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_radius_port" lineno="72431">
+<interface name="corenet_tcp_connect_radius_port" lineno="68943">
<summary>
Make a TCP connection to the radius port.
</summary>
@@ -53058,7 +53104,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radius_client_packets" lineno="72451">
+<interface name="corenet_send_radius_client_packets" lineno="68963">
<summary>
Send radius_client packets.
</summary>
@@ -53069,7 +53115,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radius_client_packets" lineno="72470">
+<interface name="corenet_dontaudit_send_radius_client_packets" lineno="68982">
<summary>
Do not audit attempts to send radius_client packets.
</summary>
@@ -53080,7 +53126,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radius_client_packets" lineno="72489">
+<interface name="corenet_receive_radius_client_packets" lineno="69001">
<summary>
Receive radius_client packets.
</summary>
@@ -53091,7 +53137,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="72508">
+<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="69020">
<summary>
Do not audit attempts to receive radius_client packets.
</summary>
@@ -53102,7 +53148,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radius_client_packets" lineno="72527">
+<interface name="corenet_sendrecv_radius_client_packets" lineno="69039">
<summary>
Send and receive radius_client packets.
</summary>
@@ -53113,7 +53159,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="72543">
+<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="69055">
<summary>
Do not audit attempts to send and receive radius_client packets.
</summary>
@@ -53124,7 +53170,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radius_client_packets" lineno="72558">
+<interface name="corenet_relabelto_radius_client_packets" lineno="69070">
<summary>
Relabel packets to radius_client the packet type.
</summary>
@@ -53134,7 +53180,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radius_server_packets" lineno="72578">
+<interface name="corenet_send_radius_server_packets" lineno="69090">
<summary>
Send radius_server packets.
</summary>
@@ -53145,7 +53191,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radius_server_packets" lineno="72597">
+<interface name="corenet_dontaudit_send_radius_server_packets" lineno="69109">
<summary>
Do not audit attempts to send radius_server packets.
</summary>
@@ -53156,7 +53202,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radius_server_packets" lineno="72616">
+<interface name="corenet_receive_radius_server_packets" lineno="69128">
<summary>
Receive radius_server packets.
</summary>
@@ -53167,7 +53213,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="72635">
+<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="69147">
<summary>
Do not audit attempts to receive radius_server packets.
</summary>
@@ -53178,7 +53224,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radius_server_packets" lineno="72654">
+<interface name="corenet_sendrecv_radius_server_packets" lineno="69166">
<summary>
Send and receive radius_server packets.
</summary>
@@ -53189,7 +53235,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="72670">
+<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="69182">
<summary>
Do not audit attempts to send and receive radius_server packets.
</summary>
@@ -53200,7 +53246,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radius_server_packets" lineno="72685">
+<interface name="corenet_relabelto_radius_server_packets" lineno="69197">
<summary>
Relabel packets to radius_server the packet type.
</summary>
@@ -53210,7 +53256,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_radsec_port" lineno="72707">
+<interface name="corenet_tcp_sendrecv_radsec_port" lineno="69219">
<summary>
Send and receive TCP traffic on the radsec port.
</summary>
@@ -53221,7 +53267,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_radsec_port" lineno="72726">
+<interface name="corenet_udp_send_radsec_port" lineno="69234">
<summary>
Send UDP traffic on the radsec port.
</summary>
@@ -53232,7 +53278,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="72745">
+<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="69249">
<summary>
Do not audit attempts to send UDP traffic on the radsec port.
</summary>
@@ -53243,7 +53289,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_radsec_port" lineno="72764">
+<interface name="corenet_udp_receive_radsec_port" lineno="69264">
<summary>
Receive UDP traffic on the radsec port.
</summary>
@@ -53254,7 +53300,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="72783">
+<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="69279">
<summary>
Do not audit attempts to receive UDP traffic on the radsec port.
</summary>
@@ -53265,7 +53311,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_radsec_port" lineno="72802">
+<interface name="corenet_udp_sendrecv_radsec_port" lineno="69294">
<summary>
Send and receive UDP traffic on the radsec port.
</summary>
@@ -53276,7 +53322,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="72819">
+<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="69310">
<summary>
Do not audit attempts to send and receive
UDP traffic on the radsec port.
@@ -53288,7 +53334,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_radsec_port" lineno="72835">
+<interface name="corenet_tcp_bind_radsec_port" lineno="69325">
<summary>
Bind TCP sockets to the radsec port.
</summary>
@@ -53299,7 +53345,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_radsec_port" lineno="72855">
+<interface name="corenet_udp_bind_radsec_port" lineno="69345">
<summary>
Bind UDP sockets to the radsec port.
</summary>
@@ -53310,7 +53356,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_radsec_port" lineno="72874">
+<interface name="corenet_tcp_connect_radsec_port" lineno="69364">
<summary>
Make a TCP connection to the radsec port.
</summary>
@@ -53320,7 +53366,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radsec_client_packets" lineno="72894">
+<interface name="corenet_send_radsec_client_packets" lineno="69384">
<summary>
Send radsec_client packets.
</summary>
@@ -53331,7 +53377,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="72913">
+<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="69403">
<summary>
Do not audit attempts to send radsec_client packets.
</summary>
@@ -53342,7 +53388,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radsec_client_packets" lineno="72932">
+<interface name="corenet_receive_radsec_client_packets" lineno="69422">
<summary>
Receive radsec_client packets.
</summary>
@@ -53353,7 +53399,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="72951">
+<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="69441">
<summary>
Do not audit attempts to receive radsec_client packets.
</summary>
@@ -53364,7 +53410,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radsec_client_packets" lineno="72970">
+<interface name="corenet_sendrecv_radsec_client_packets" lineno="69460">
<summary>
Send and receive radsec_client packets.
</summary>
@@ -53375,7 +53421,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="72986">
+<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="69476">
<summary>
Do not audit attempts to send and receive radsec_client packets.
</summary>
@@ -53386,7 +53432,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radsec_client_packets" lineno="73001">
+<interface name="corenet_relabelto_radsec_client_packets" lineno="69491">
<summary>
Relabel packets to radsec_client the packet type.
</summary>
@@ -53396,7 +53442,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_radsec_server_packets" lineno="73021">
+<interface name="corenet_send_radsec_server_packets" lineno="69511">
<summary>
Send radsec_server packets.
</summary>
@@ -53407,7 +53453,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="73040">
+<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="69530">
<summary>
Do not audit attempts to send radsec_server packets.
</summary>
@@ -53418,7 +53464,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_radsec_server_packets" lineno="73059">
+<interface name="corenet_receive_radsec_server_packets" lineno="69549">
<summary>
Receive radsec_server packets.
</summary>
@@ -53429,7 +53475,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="73078">
+<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="69568">
<summary>
Do not audit attempts to receive radsec_server packets.
</summary>
@@ -53440,7 +53486,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_radsec_server_packets" lineno="73097">
+<interface name="corenet_sendrecv_radsec_server_packets" lineno="69587">
<summary>
Send and receive radsec_server packets.
</summary>
@@ -53451,7 +53497,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="73113">
+<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="69603">
<summary>
Do not audit attempts to send and receive radsec_server packets.
</summary>
@@ -53462,7 +53508,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_radsec_server_packets" lineno="73128">
+<interface name="corenet_relabelto_radsec_server_packets" lineno="69618">
<summary>
Relabel packets to radsec_server the packet type.
</summary>
@@ -53472,7 +53518,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_razor_port" lineno="73150">
+<interface name="corenet_tcp_sendrecv_razor_port" lineno="69640">
<summary>
Send and receive TCP traffic on the razor port.
</summary>
@@ -53483,7 +53529,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_razor_port" lineno="73169">
+<interface name="corenet_udp_send_razor_port" lineno="69655">
<summary>
Send UDP traffic on the razor port.
</summary>
@@ -53494,7 +53540,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_razor_port" lineno="73188">
+<interface name="corenet_dontaudit_udp_send_razor_port" lineno="69670">
<summary>
Do not audit attempts to send UDP traffic on the razor port.
</summary>
@@ -53505,7 +53551,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_razor_port" lineno="73207">
+<interface name="corenet_udp_receive_razor_port" lineno="69685">
<summary>
Receive UDP traffic on the razor port.
</summary>
@@ -53516,7 +53562,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="73226">
+<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="69700">
<summary>
Do not audit attempts to receive UDP traffic on the razor port.
</summary>
@@ -53527,7 +53573,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_razor_port" lineno="73245">
+<interface name="corenet_udp_sendrecv_razor_port" lineno="69715">
<summary>
Send and receive UDP traffic on the razor port.
</summary>
@@ -53538,7 +53584,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="73262">
+<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="69731">
<summary>
Do not audit attempts to send and receive
UDP traffic on the razor port.
@@ -53550,7 +53596,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_razor_port" lineno="73278">
+<interface name="corenet_tcp_bind_razor_port" lineno="69746">
<summary>
Bind TCP sockets to the razor port.
</summary>
@@ -53561,7 +53607,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_razor_port" lineno="73298">
+<interface name="corenet_udp_bind_razor_port" lineno="69766">
<summary>
Bind UDP sockets to the razor port.
</summary>
@@ -53572,7 +53618,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_razor_port" lineno="73317">
+<interface name="corenet_tcp_connect_razor_port" lineno="69785">
<summary>
Make a TCP connection to the razor port.
</summary>
@@ -53582,7 +53628,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_razor_client_packets" lineno="73337">
+<interface name="corenet_send_razor_client_packets" lineno="69805">
<summary>
Send razor_client packets.
</summary>
@@ -53593,7 +53639,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_razor_client_packets" lineno="73356">
+<interface name="corenet_dontaudit_send_razor_client_packets" lineno="69824">
<summary>
Do not audit attempts to send razor_client packets.
</summary>
@@ -53604,7 +53650,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_razor_client_packets" lineno="73375">
+<interface name="corenet_receive_razor_client_packets" lineno="69843">
<summary>
Receive razor_client packets.
</summary>
@@ -53615,7 +53661,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="73394">
+<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="69862">
<summary>
Do not audit attempts to receive razor_client packets.
</summary>
@@ -53626,7 +53672,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_razor_client_packets" lineno="73413">
+<interface name="corenet_sendrecv_razor_client_packets" lineno="69881">
<summary>
Send and receive razor_client packets.
</summary>
@@ -53637,7 +53683,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="73429">
+<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="69897">
<summary>
Do not audit attempts to send and receive razor_client packets.
</summary>
@@ -53648,7 +53694,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_razor_client_packets" lineno="73444">
+<interface name="corenet_relabelto_razor_client_packets" lineno="69912">
<summary>
Relabel packets to razor_client the packet type.
</summary>
@@ -53658,7 +53704,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_razor_server_packets" lineno="73464">
+<interface name="corenet_send_razor_server_packets" lineno="69932">
<summary>
Send razor_server packets.
</summary>
@@ -53669,7 +53715,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_razor_server_packets" lineno="73483">
+<interface name="corenet_dontaudit_send_razor_server_packets" lineno="69951">
<summary>
Do not audit attempts to send razor_server packets.
</summary>
@@ -53680,7 +53726,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_razor_server_packets" lineno="73502">
+<interface name="corenet_receive_razor_server_packets" lineno="69970">
<summary>
Receive razor_server packets.
</summary>
@@ -53691,7 +53737,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="73521">
+<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="69989">
<summary>
Do not audit attempts to receive razor_server packets.
</summary>
@@ -53702,7 +53748,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_razor_server_packets" lineno="73540">
+<interface name="corenet_sendrecv_razor_server_packets" lineno="70008">
<summary>
Send and receive razor_server packets.
</summary>
@@ -53713,7 +53759,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="73556">
+<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="70024">
<summary>
Do not audit attempts to send and receive razor_server packets.
</summary>
@@ -53724,7 +53770,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_razor_server_packets" lineno="73571">
+<interface name="corenet_relabelto_razor_server_packets" lineno="70039">
<summary>
Relabel packets to razor_server the packet type.
</summary>
@@ -53734,7 +53780,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_redis_port" lineno="73593">
+<interface name="corenet_tcp_sendrecv_redis_port" lineno="70061">
<summary>
Send and receive TCP traffic on the redis port.
</summary>
@@ -53745,7 +53791,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_redis_port" lineno="73612">
+<interface name="corenet_udp_send_redis_port" lineno="70076">
<summary>
Send UDP traffic on the redis port.
</summary>
@@ -53756,7 +53802,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_redis_port" lineno="73631">
+<interface name="corenet_dontaudit_udp_send_redis_port" lineno="70091">
<summary>
Do not audit attempts to send UDP traffic on the redis port.
</summary>
@@ -53767,7 +53813,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_redis_port" lineno="73650">
+<interface name="corenet_udp_receive_redis_port" lineno="70106">
<summary>
Receive UDP traffic on the redis port.
</summary>
@@ -53778,7 +53824,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="73669">
+<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="70121">
<summary>
Do not audit attempts to receive UDP traffic on the redis port.
</summary>
@@ -53789,7 +53835,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_redis_port" lineno="73688">
+<interface name="corenet_udp_sendrecv_redis_port" lineno="70136">
<summary>
Send and receive UDP traffic on the redis port.
</summary>
@@ -53800,7 +53846,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="73705">
+<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="70152">
<summary>
Do not audit attempts to send and receive
UDP traffic on the redis port.
@@ -53812,7 +53858,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_redis_port" lineno="73721">
+<interface name="corenet_tcp_bind_redis_port" lineno="70167">
<summary>
Bind TCP sockets to the redis port.
</summary>
@@ -53823,7 +53869,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_redis_port" lineno="73741">
+<interface name="corenet_udp_bind_redis_port" lineno="70187">
<summary>
Bind UDP sockets to the redis port.
</summary>
@@ -53834,7 +53880,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_redis_port" lineno="73760">
+<interface name="corenet_tcp_connect_redis_port" lineno="70206">
<summary>
Make a TCP connection to the redis port.
</summary>
@@ -53844,7 +53890,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_redis_client_packets" lineno="73780">
+<interface name="corenet_send_redis_client_packets" lineno="70226">
<summary>
Send redis_client packets.
</summary>
@@ -53855,7 +53901,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_redis_client_packets" lineno="73799">
+<interface name="corenet_dontaudit_send_redis_client_packets" lineno="70245">
<summary>
Do not audit attempts to send redis_client packets.
</summary>
@@ -53866,7 +53912,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_redis_client_packets" lineno="73818">
+<interface name="corenet_receive_redis_client_packets" lineno="70264">
<summary>
Receive redis_client packets.
</summary>
@@ -53877,7 +53923,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="73837">
+<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="70283">
<summary>
Do not audit attempts to receive redis_client packets.
</summary>
@@ -53888,7 +53934,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_redis_client_packets" lineno="73856">
+<interface name="corenet_sendrecv_redis_client_packets" lineno="70302">
<summary>
Send and receive redis_client packets.
</summary>
@@ -53899,7 +53945,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="73872">
+<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="70318">
<summary>
Do not audit attempts to send and receive redis_client packets.
</summary>
@@ -53910,7 +53956,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_redis_client_packets" lineno="73887">
+<interface name="corenet_relabelto_redis_client_packets" lineno="70333">
<summary>
Relabel packets to redis_client the packet type.
</summary>
@@ -53920,7 +53966,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_redis_server_packets" lineno="73907">
+<interface name="corenet_send_redis_server_packets" lineno="70353">
<summary>
Send redis_server packets.
</summary>
@@ -53931,7 +53977,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_redis_server_packets" lineno="73926">
+<interface name="corenet_dontaudit_send_redis_server_packets" lineno="70372">
<summary>
Do not audit attempts to send redis_server packets.
</summary>
@@ -53942,7 +53988,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_redis_server_packets" lineno="73945">
+<interface name="corenet_receive_redis_server_packets" lineno="70391">
<summary>
Receive redis_server packets.
</summary>
@@ -53953,7 +53999,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="73964">
+<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="70410">
<summary>
Do not audit attempts to receive redis_server packets.
</summary>
@@ -53964,7 +54010,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_redis_server_packets" lineno="73983">
+<interface name="corenet_sendrecv_redis_server_packets" lineno="70429">
<summary>
Send and receive redis_server packets.
</summary>
@@ -53975,7 +54021,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="73999">
+<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="70445">
<summary>
Do not audit attempts to send and receive redis_server packets.
</summary>
@@ -53986,7 +54032,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_redis_server_packets" lineno="74014">
+<interface name="corenet_relabelto_redis_server_packets" lineno="70460">
<summary>
Relabel packets to redis_server the packet type.
</summary>
@@ -53996,7 +54042,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_repository_port" lineno="74036">
+<interface name="corenet_tcp_sendrecv_repository_port" lineno="70482">
<summary>
Send and receive TCP traffic on the repository port.
</summary>
@@ -54007,7 +54053,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_repository_port" lineno="74055">
+<interface name="corenet_udp_send_repository_port" lineno="70497">
<summary>
Send UDP traffic on the repository port.
</summary>
@@ -54018,7 +54064,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_repository_port" lineno="74074">
+<interface name="corenet_dontaudit_udp_send_repository_port" lineno="70512">
<summary>
Do not audit attempts to send UDP traffic on the repository port.
</summary>
@@ -54029,7 +54075,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_repository_port" lineno="74093">
+<interface name="corenet_udp_receive_repository_port" lineno="70527">
<summary>
Receive UDP traffic on the repository port.
</summary>
@@ -54040,7 +54086,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="74112">
+<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="70542">
<summary>
Do not audit attempts to receive UDP traffic on the repository port.
</summary>
@@ -54051,7 +54097,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_repository_port" lineno="74131">
+<interface name="corenet_udp_sendrecv_repository_port" lineno="70557">
<summary>
Send and receive UDP traffic on the repository port.
</summary>
@@ -54062,7 +54108,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="74148">
+<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="70573">
<summary>
Do not audit attempts to send and receive
UDP traffic on the repository port.
@@ -54074,7 +54120,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_repository_port" lineno="74164">
+<interface name="corenet_tcp_bind_repository_port" lineno="70588">
<summary>
Bind TCP sockets to the repository port.
</summary>
@@ -54085,7 +54131,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_repository_port" lineno="74184">
+<interface name="corenet_udp_bind_repository_port" lineno="70608">
<summary>
Bind UDP sockets to the repository port.
</summary>
@@ -54096,7 +54142,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_repository_port" lineno="74203">
+<interface name="corenet_tcp_connect_repository_port" lineno="70627">
<summary>
Make a TCP connection to the repository port.
</summary>
@@ -54106,7 +54152,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_repository_client_packets" lineno="74223">
+<interface name="corenet_send_repository_client_packets" lineno="70647">
<summary>
Send repository_client packets.
</summary>
@@ -54117,7 +54163,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_repository_client_packets" lineno="74242">
+<interface name="corenet_dontaudit_send_repository_client_packets" lineno="70666">
<summary>
Do not audit attempts to send repository_client packets.
</summary>
@@ -54128,7 +54174,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_repository_client_packets" lineno="74261">
+<interface name="corenet_receive_repository_client_packets" lineno="70685">
<summary>
Receive repository_client packets.
</summary>
@@ -54139,7 +54185,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="74280">
+<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="70704">
<summary>
Do not audit attempts to receive repository_client packets.
</summary>
@@ -54150,7 +54196,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_repository_client_packets" lineno="74299">
+<interface name="corenet_sendrecv_repository_client_packets" lineno="70723">
<summary>
Send and receive repository_client packets.
</summary>
@@ -54161,7 +54207,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="74315">
+<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="70739">
<summary>
Do not audit attempts to send and receive repository_client packets.
</summary>
@@ -54172,7 +54218,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_repository_client_packets" lineno="74330">
+<interface name="corenet_relabelto_repository_client_packets" lineno="70754">
<summary>
Relabel packets to repository_client the packet type.
</summary>
@@ -54182,7 +54228,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_repository_server_packets" lineno="74350">
+<interface name="corenet_send_repository_server_packets" lineno="70774">
<summary>
Send repository_server packets.
</summary>
@@ -54193,7 +54239,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_repository_server_packets" lineno="74369">
+<interface name="corenet_dontaudit_send_repository_server_packets" lineno="70793">
<summary>
Do not audit attempts to send repository_server packets.
</summary>
@@ -54204,7 +54250,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_repository_server_packets" lineno="74388">
+<interface name="corenet_receive_repository_server_packets" lineno="70812">
<summary>
Receive repository_server packets.
</summary>
@@ -54215,7 +54261,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="74407">
+<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="70831">
<summary>
Do not audit attempts to receive repository_server packets.
</summary>
@@ -54226,7 +54272,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_repository_server_packets" lineno="74426">
+<interface name="corenet_sendrecv_repository_server_packets" lineno="70850">
<summary>
Send and receive repository_server packets.
</summary>
@@ -54237,7 +54283,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="74442">
+<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="70866">
<summary>
Do not audit attempts to send and receive repository_server packets.
</summary>
@@ -54248,7 +54294,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_repository_server_packets" lineno="74457">
+<interface name="corenet_relabelto_repository_server_packets" lineno="70881">
<summary>
Relabel packets to repository_server the packet type.
</summary>
@@ -54258,7 +54304,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ricci_port" lineno="74479">
+<interface name="corenet_tcp_sendrecv_ricci_port" lineno="70903">
<summary>
Send and receive TCP traffic on the ricci port.
</summary>
@@ -54269,7 +54315,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ricci_port" lineno="74498">
+<interface name="corenet_udp_send_ricci_port" lineno="70918">
<summary>
Send UDP traffic on the ricci port.
</summary>
@@ -54280,7 +54326,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="74517">
+<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="70933">
<summary>
Do not audit attempts to send UDP traffic on the ricci port.
</summary>
@@ -54291,7 +54337,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ricci_port" lineno="74536">
+<interface name="corenet_udp_receive_ricci_port" lineno="70948">
<summary>
Receive UDP traffic on the ricci port.
</summary>
@@ -54302,7 +54348,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="74555">
+<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="70963">
<summary>
Do not audit attempts to receive UDP traffic on the ricci port.
</summary>
@@ -54313,7 +54359,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ricci_port" lineno="74574">
+<interface name="corenet_udp_sendrecv_ricci_port" lineno="70978">
<summary>
Send and receive UDP traffic on the ricci port.
</summary>
@@ -54324,7 +54370,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="74591">
+<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="70994">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ricci port.
@@ -54336,7 +54382,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ricci_port" lineno="74607">
+<interface name="corenet_tcp_bind_ricci_port" lineno="71009">
<summary>
Bind TCP sockets to the ricci port.
</summary>
@@ -54347,7 +54393,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ricci_port" lineno="74627">
+<interface name="corenet_udp_bind_ricci_port" lineno="71029">
<summary>
Bind UDP sockets to the ricci port.
</summary>
@@ -54358,7 +54404,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ricci_port" lineno="74646">
+<interface name="corenet_tcp_connect_ricci_port" lineno="71048">
<summary>
Make a TCP connection to the ricci port.
</summary>
@@ -54368,7 +54414,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ricci_client_packets" lineno="74666">
+<interface name="corenet_send_ricci_client_packets" lineno="71068">
<summary>
Send ricci_client packets.
</summary>
@@ -54379,7 +54425,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="74685">
+<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="71087">
<summary>
Do not audit attempts to send ricci_client packets.
</summary>
@@ -54390,7 +54436,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ricci_client_packets" lineno="74704">
+<interface name="corenet_receive_ricci_client_packets" lineno="71106">
<summary>
Receive ricci_client packets.
</summary>
@@ -54401,7 +54447,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="74723">
+<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="71125">
<summary>
Do not audit attempts to receive ricci_client packets.
</summary>
@@ -54412,7 +54458,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ricci_client_packets" lineno="74742">
+<interface name="corenet_sendrecv_ricci_client_packets" lineno="71144">
<summary>
Send and receive ricci_client packets.
</summary>
@@ -54423,7 +54469,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="74758">
+<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="71160">
<summary>
Do not audit attempts to send and receive ricci_client packets.
</summary>
@@ -54434,7 +54480,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ricci_client_packets" lineno="74773">
+<interface name="corenet_relabelto_ricci_client_packets" lineno="71175">
<summary>
Relabel packets to ricci_client the packet type.
</summary>
@@ -54444,7 +54490,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ricci_server_packets" lineno="74793">
+<interface name="corenet_send_ricci_server_packets" lineno="71195">
<summary>
Send ricci_server packets.
</summary>
@@ -54455,7 +54501,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="74812">
+<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="71214">
<summary>
Do not audit attempts to send ricci_server packets.
</summary>
@@ -54466,7 +54512,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ricci_server_packets" lineno="74831">
+<interface name="corenet_receive_ricci_server_packets" lineno="71233">
<summary>
Receive ricci_server packets.
</summary>
@@ -54477,7 +54523,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="74850">
+<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="71252">
<summary>
Do not audit attempts to receive ricci_server packets.
</summary>
@@ -54488,7 +54534,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ricci_server_packets" lineno="74869">
+<interface name="corenet_sendrecv_ricci_server_packets" lineno="71271">
<summary>
Send and receive ricci_server packets.
</summary>
@@ -54499,7 +54545,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="74885">
+<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="71287">
<summary>
Do not audit attempts to send and receive ricci_server packets.
</summary>
@@ -54510,7 +54556,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ricci_server_packets" lineno="74900">
+<interface name="corenet_relabelto_ricci_server_packets" lineno="71302">
<summary>
Relabel packets to ricci_server the packet type.
</summary>
@@ -54520,7 +54566,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="74922">
+<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="71324">
<summary>
Send and receive TCP traffic on the ricci_modcluster port.
</summary>
@@ -54531,7 +54577,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ricci_modcluster_port" lineno="74941">
+<interface name="corenet_udp_send_ricci_modcluster_port" lineno="71339">
<summary>
Send UDP traffic on the ricci_modcluster port.
</summary>
@@ -54542,7 +54588,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="74960">
+<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="71354">
<summary>
Do not audit attempts to send UDP traffic on the ricci_modcluster port.
</summary>
@@ -54553,7 +54599,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="74979">
+<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="71369">
<summary>
Receive UDP traffic on the ricci_modcluster port.
</summary>
@@ -54564,7 +54610,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="74998">
+<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="71384">
<summary>
Do not audit attempts to receive UDP traffic on the ricci_modcluster port.
</summary>
@@ -54575,7 +54621,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="75017">
+<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="71399">
<summary>
Send and receive UDP traffic on the ricci_modcluster port.
</summary>
@@ -54586,7 +54632,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="75034">
+<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="71415">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ricci_modcluster port.
@@ -54598,7 +54644,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="75050">
+<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="71430">
<summary>
Bind TCP sockets to the ricci_modcluster port.
</summary>
@@ -54609,7 +54655,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="75070">
+<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="71450">
<summary>
Bind UDP sockets to the ricci_modcluster port.
</summary>
@@ -54620,7 +54666,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="75089">
+<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="71469">
<summary>
Make a TCP connection to the ricci_modcluster port.
</summary>
@@ -54630,7 +54676,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ricci_modcluster_client_packets" lineno="75109">
+<interface name="corenet_send_ricci_modcluster_client_packets" lineno="71489">
<summary>
Send ricci_modcluster_client packets.
</summary>
@@ -54641,7 +54687,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="75128">
+<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="71508">
<summary>
Do not audit attempts to send ricci_modcluster_client packets.
</summary>
@@ -54652,7 +54698,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="75147">
+<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="71527">
<summary>
Receive ricci_modcluster_client packets.
</summary>
@@ -54663,7 +54709,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="75166">
+<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="71546">
<summary>
Do not audit attempts to receive ricci_modcluster_client packets.
</summary>
@@ -54674,7 +54720,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="75185">
+<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="71565">
<summary>
Send and receive ricci_modcluster_client packets.
</summary>
@@ -54685,7 +54731,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="75201">
+<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="71581">
<summary>
Do not audit attempts to send and receive ricci_modcluster_client packets.
</summary>
@@ -54696,7 +54742,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="75216">
+<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="71596">
<summary>
Relabel packets to ricci_modcluster_client the packet type.
</summary>
@@ -54706,7 +54752,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ricci_modcluster_server_packets" lineno="75236">
+<interface name="corenet_send_ricci_modcluster_server_packets" lineno="71616">
<summary>
Send ricci_modcluster_server packets.
</summary>
@@ -54717,7 +54763,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="75255">
+<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="71635">
<summary>
Do not audit attempts to send ricci_modcluster_server packets.
</summary>
@@ -54728,7 +54774,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="75274">
+<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="71654">
<summary>
Receive ricci_modcluster_server packets.
</summary>
@@ -54739,7 +54785,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="75293">
+<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="71673">
<summary>
Do not audit attempts to receive ricci_modcluster_server packets.
</summary>
@@ -54750,7 +54796,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="75312">
+<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="71692">
<summary>
Send and receive ricci_modcluster_server packets.
</summary>
@@ -54761,7 +54807,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="75328">
+<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="71708">
<summary>
Do not audit attempts to send and receive ricci_modcluster_server packets.
</summary>
@@ -54772,7 +54818,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="75343">
+<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="71723">
<summary>
Relabel packets to ricci_modcluster_server the packet type.
</summary>
@@ -54782,7 +54828,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="75365">
+<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="71745">
<summary>
Send and receive TCP traffic on the rlogind port.
</summary>
@@ -54793,7 +54839,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_rlogind_port" lineno="75384">
+<interface name="corenet_udp_send_rlogind_port" lineno="71760">
<summary>
Send UDP traffic on the rlogind port.
</summary>
@@ -54804,7 +54850,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="75403">
+<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="71775">
<summary>
Do not audit attempts to send UDP traffic on the rlogind port.
</summary>
@@ -54815,7 +54861,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_rlogind_port" lineno="75422">
+<interface name="corenet_udp_receive_rlogind_port" lineno="71790">
<summary>
Receive UDP traffic on the rlogind port.
</summary>
@@ -54826,7 +54872,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="75441">
+<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="71805">
<summary>
Do not audit attempts to receive UDP traffic on the rlogind port.
</summary>
@@ -54837,7 +54883,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_rlogind_port" lineno="75460">
+<interface name="corenet_udp_sendrecv_rlogind_port" lineno="71820">
<summary>
Send and receive UDP traffic on the rlogind port.
</summary>
@@ -54848,7 +54894,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="75477">
+<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="71836">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rlogind port.
@@ -54860,7 +54906,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_rlogind_port" lineno="75493">
+<interface name="corenet_tcp_bind_rlogind_port" lineno="71851">
<summary>
Bind TCP sockets to the rlogind port.
</summary>
@@ -54871,7 +54917,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rlogind_port" lineno="75513">
+<interface name="corenet_udp_bind_rlogind_port" lineno="71871">
<summary>
Bind UDP sockets to the rlogind port.
</summary>
@@ -54882,7 +54928,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rlogind_port" lineno="75532">
+<interface name="corenet_tcp_connect_rlogind_port" lineno="71890">
<summary>
Make a TCP connection to the rlogind port.
</summary>
@@ -54892,7 +54938,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rlogind_client_packets" lineno="75552">
+<interface name="corenet_send_rlogind_client_packets" lineno="71910">
<summary>
Send rlogind_client packets.
</summary>
@@ -54903,7 +54949,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="75571">
+<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="71929">
<summary>
Do not audit attempts to send rlogind_client packets.
</summary>
@@ -54914,7 +54960,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rlogind_client_packets" lineno="75590">
+<interface name="corenet_receive_rlogind_client_packets" lineno="71948">
<summary>
Receive rlogind_client packets.
</summary>
@@ -54925,7 +54971,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="75609">
+<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="71967">
<summary>
Do not audit attempts to receive rlogind_client packets.
</summary>
@@ -54936,7 +54982,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rlogind_client_packets" lineno="75628">
+<interface name="corenet_sendrecv_rlogind_client_packets" lineno="71986">
<summary>
Send and receive rlogind_client packets.
</summary>
@@ -54947,7 +54993,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="75644">
+<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="72002">
<summary>
Do not audit attempts to send and receive rlogind_client packets.
</summary>
@@ -54958,7 +55004,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rlogind_client_packets" lineno="75659">
+<interface name="corenet_relabelto_rlogind_client_packets" lineno="72017">
<summary>
Relabel packets to rlogind_client the packet type.
</summary>
@@ -54968,7 +55014,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rlogind_server_packets" lineno="75679">
+<interface name="corenet_send_rlogind_server_packets" lineno="72037">
<summary>
Send rlogind_server packets.
</summary>
@@ -54979,7 +55025,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="75698">
+<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="72056">
<summary>
Do not audit attempts to send rlogind_server packets.
</summary>
@@ -54990,7 +55036,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rlogind_server_packets" lineno="75717">
+<interface name="corenet_receive_rlogind_server_packets" lineno="72075">
<summary>
Receive rlogind_server packets.
</summary>
@@ -55001,7 +55047,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="75736">
+<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="72094">
<summary>
Do not audit attempts to receive rlogind_server packets.
</summary>
@@ -55012,7 +55058,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rlogind_server_packets" lineno="75755">
+<interface name="corenet_sendrecv_rlogind_server_packets" lineno="72113">
<summary>
Send and receive rlogind_server packets.
</summary>
@@ -55023,7 +55069,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="75771">
+<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="72129">
<summary>
Do not audit attempts to send and receive rlogind_server packets.
</summary>
@@ -55034,7 +55080,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rlogind_server_packets" lineno="75786">
+<interface name="corenet_relabelto_rlogind_server_packets" lineno="72144">
<summary>
Relabel packets to rlogind_server the packet type.
</summary>
@@ -55044,7 +55090,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rndc_port" lineno="75808">
+<interface name="corenet_tcp_sendrecv_rndc_port" lineno="72166">
<summary>
Send and receive TCP traffic on the rndc port.
</summary>
@@ -55055,7 +55101,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_rndc_port" lineno="75827">
+<interface name="corenet_udp_send_rndc_port" lineno="72181">
<summary>
Send UDP traffic on the rndc port.
</summary>
@@ -55066,7 +55112,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="75846">
+<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="72196">
<summary>
Do not audit attempts to send UDP traffic on the rndc port.
</summary>
@@ -55077,7 +55123,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_rndc_port" lineno="75865">
+<interface name="corenet_udp_receive_rndc_port" lineno="72211">
<summary>
Receive UDP traffic on the rndc port.
</summary>
@@ -55088,7 +55134,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="75884">
+<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="72226">
<summary>
Do not audit attempts to receive UDP traffic on the rndc port.
</summary>
@@ -55099,7 +55145,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_rndc_port" lineno="75903">
+<interface name="corenet_udp_sendrecv_rndc_port" lineno="72241">
<summary>
Send and receive UDP traffic on the rndc port.
</summary>
@@ -55110,7 +55156,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="75920">
+<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="72257">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rndc port.
@@ -55122,7 +55168,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_rndc_port" lineno="75936">
+<interface name="corenet_tcp_bind_rndc_port" lineno="72272">
<summary>
Bind TCP sockets to the rndc port.
</summary>
@@ -55133,7 +55179,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rndc_port" lineno="75956">
+<interface name="corenet_udp_bind_rndc_port" lineno="72292">
<summary>
Bind UDP sockets to the rndc port.
</summary>
@@ -55144,7 +55190,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rndc_port" lineno="75975">
+<interface name="corenet_tcp_connect_rndc_port" lineno="72311">
<summary>
Make a TCP connection to the rndc port.
</summary>
@@ -55154,7 +55200,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rndc_client_packets" lineno="75995">
+<interface name="corenet_send_rndc_client_packets" lineno="72331">
<summary>
Send rndc_client packets.
</summary>
@@ -55165,7 +55211,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="76014">
+<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="72350">
<summary>
Do not audit attempts to send rndc_client packets.
</summary>
@@ -55176,7 +55222,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rndc_client_packets" lineno="76033">
+<interface name="corenet_receive_rndc_client_packets" lineno="72369">
<summary>
Receive rndc_client packets.
</summary>
@@ -55187,7 +55233,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="76052">
+<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="72388">
<summary>
Do not audit attempts to receive rndc_client packets.
</summary>
@@ -55198,7 +55244,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rndc_client_packets" lineno="76071">
+<interface name="corenet_sendrecv_rndc_client_packets" lineno="72407">
<summary>
Send and receive rndc_client packets.
</summary>
@@ -55209,7 +55255,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="76087">
+<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="72423">
<summary>
Do not audit attempts to send and receive rndc_client packets.
</summary>
@@ -55220,7 +55266,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rndc_client_packets" lineno="76102">
+<interface name="corenet_relabelto_rndc_client_packets" lineno="72438">
<summary>
Relabel packets to rndc_client the packet type.
</summary>
@@ -55230,7 +55276,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rndc_server_packets" lineno="76122">
+<interface name="corenet_send_rndc_server_packets" lineno="72458">
<summary>
Send rndc_server packets.
</summary>
@@ -55241,7 +55287,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="76141">
+<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="72477">
<summary>
Do not audit attempts to send rndc_server packets.
</summary>
@@ -55252,7 +55298,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rndc_server_packets" lineno="76160">
+<interface name="corenet_receive_rndc_server_packets" lineno="72496">
<summary>
Receive rndc_server packets.
</summary>
@@ -55263,7 +55309,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="76179">
+<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="72515">
<summary>
Do not audit attempts to receive rndc_server packets.
</summary>
@@ -55274,7 +55320,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rndc_server_packets" lineno="76198">
+<interface name="corenet_sendrecv_rndc_server_packets" lineno="72534">
<summary>
Send and receive rndc_server packets.
</summary>
@@ -55285,7 +55331,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="76214">
+<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="72550">
<summary>
Do not audit attempts to send and receive rndc_server packets.
</summary>
@@ -55296,7 +55342,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rndc_server_packets" lineno="76229">
+<interface name="corenet_relabelto_rndc_server_packets" lineno="72565">
<summary>
Relabel packets to rndc_server the packet type.
</summary>
@@ -55306,7 +55352,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_router_port" lineno="76251">
+<interface name="corenet_tcp_sendrecv_router_port" lineno="72587">
<summary>
Send and receive TCP traffic on the router port.
</summary>
@@ -55317,7 +55363,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_router_port" lineno="76270">
+<interface name="corenet_udp_send_router_port" lineno="72602">
<summary>
Send UDP traffic on the router port.
</summary>
@@ -55328,7 +55374,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_router_port" lineno="76289">
+<interface name="corenet_dontaudit_udp_send_router_port" lineno="72617">
<summary>
Do not audit attempts to send UDP traffic on the router port.
</summary>
@@ -55339,7 +55385,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_router_port" lineno="76308">
+<interface name="corenet_udp_receive_router_port" lineno="72632">
<summary>
Receive UDP traffic on the router port.
</summary>
@@ -55350,7 +55396,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_router_port" lineno="76327">
+<interface name="corenet_dontaudit_udp_receive_router_port" lineno="72647">
<summary>
Do not audit attempts to receive UDP traffic on the router port.
</summary>
@@ -55361,7 +55407,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_router_port" lineno="76346">
+<interface name="corenet_udp_sendrecv_router_port" lineno="72662">
<summary>
Send and receive UDP traffic on the router port.
</summary>
@@ -55372,7 +55418,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="76363">
+<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="72678">
<summary>
Do not audit attempts to send and receive
UDP traffic on the router port.
@@ -55384,7 +55430,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_router_port" lineno="76379">
+<interface name="corenet_tcp_bind_router_port" lineno="72693">
<summary>
Bind TCP sockets to the router port.
</summary>
@@ -55395,7 +55441,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_router_port" lineno="76399">
+<interface name="corenet_udp_bind_router_port" lineno="72713">
<summary>
Bind UDP sockets to the router port.
</summary>
@@ -55406,7 +55452,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_router_port" lineno="76418">
+<interface name="corenet_tcp_connect_router_port" lineno="72732">
<summary>
Make a TCP connection to the router port.
</summary>
@@ -55416,7 +55462,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_router_client_packets" lineno="76438">
+<interface name="corenet_send_router_client_packets" lineno="72752">
<summary>
Send router_client packets.
</summary>
@@ -55427,7 +55473,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_router_client_packets" lineno="76457">
+<interface name="corenet_dontaudit_send_router_client_packets" lineno="72771">
<summary>
Do not audit attempts to send router_client packets.
</summary>
@@ -55438,7 +55484,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_router_client_packets" lineno="76476">
+<interface name="corenet_receive_router_client_packets" lineno="72790">
<summary>
Receive router_client packets.
</summary>
@@ -55449,7 +55495,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_router_client_packets" lineno="76495">
+<interface name="corenet_dontaudit_receive_router_client_packets" lineno="72809">
<summary>
Do not audit attempts to receive router_client packets.
</summary>
@@ -55460,7 +55506,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_router_client_packets" lineno="76514">
+<interface name="corenet_sendrecv_router_client_packets" lineno="72828">
<summary>
Send and receive router_client packets.
</summary>
@@ -55471,7 +55517,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="76530">
+<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="72844">
<summary>
Do not audit attempts to send and receive router_client packets.
</summary>
@@ -55482,7 +55528,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_router_client_packets" lineno="76545">
+<interface name="corenet_relabelto_router_client_packets" lineno="72859">
<summary>
Relabel packets to router_client the packet type.
</summary>
@@ -55492,7 +55538,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_router_server_packets" lineno="76565">
+<interface name="corenet_send_router_server_packets" lineno="72879">
<summary>
Send router_server packets.
</summary>
@@ -55503,7 +55549,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_router_server_packets" lineno="76584">
+<interface name="corenet_dontaudit_send_router_server_packets" lineno="72898">
<summary>
Do not audit attempts to send router_server packets.
</summary>
@@ -55514,7 +55560,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_router_server_packets" lineno="76603">
+<interface name="corenet_receive_router_server_packets" lineno="72917">
<summary>
Receive router_server packets.
</summary>
@@ -55525,7 +55571,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_router_server_packets" lineno="76622">
+<interface name="corenet_dontaudit_receive_router_server_packets" lineno="72936">
<summary>
Do not audit attempts to receive router_server packets.
</summary>
@@ -55536,7 +55582,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_router_server_packets" lineno="76641">
+<interface name="corenet_sendrecv_router_server_packets" lineno="72955">
<summary>
Send and receive router_server packets.
</summary>
@@ -55547,7 +55593,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="76657">
+<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="72971">
<summary>
Do not audit attempts to send and receive router_server packets.
</summary>
@@ -55558,7 +55604,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_router_server_packets" lineno="76672">
+<interface name="corenet_relabelto_router_server_packets" lineno="72986">
<summary>
Relabel packets to router_server the packet type.
</summary>
@@ -55568,7 +55614,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rsh_port" lineno="76694">
+<interface name="corenet_tcp_sendrecv_rsh_port" lineno="73008">
<summary>
Send and receive TCP traffic on the rsh port.
</summary>
@@ -55579,7 +55625,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_rsh_port" lineno="76713">
+<interface name="corenet_udp_send_rsh_port" lineno="73023">
<summary>
Send UDP traffic on the rsh port.
</summary>
@@ -55590,7 +55636,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="76732">
+<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="73038">
<summary>
Do not audit attempts to send UDP traffic on the rsh port.
</summary>
@@ -55601,7 +55647,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_rsh_port" lineno="76751">
+<interface name="corenet_udp_receive_rsh_port" lineno="73053">
<summary>
Receive UDP traffic on the rsh port.
</summary>
@@ -55612,7 +55658,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="76770">
+<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="73068">
<summary>
Do not audit attempts to receive UDP traffic on the rsh port.
</summary>
@@ -55623,7 +55669,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_rsh_port" lineno="76789">
+<interface name="corenet_udp_sendrecv_rsh_port" lineno="73083">
<summary>
Send and receive UDP traffic on the rsh port.
</summary>
@@ -55634,7 +55680,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="76806">
+<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="73099">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rsh port.
@@ -55646,7 +55692,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_rsh_port" lineno="76822">
+<interface name="corenet_tcp_bind_rsh_port" lineno="73114">
<summary>
Bind TCP sockets to the rsh port.
</summary>
@@ -55657,7 +55703,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rsh_port" lineno="76842">
+<interface name="corenet_udp_bind_rsh_port" lineno="73134">
<summary>
Bind UDP sockets to the rsh port.
</summary>
@@ -55668,7 +55714,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rsh_port" lineno="76861">
+<interface name="corenet_tcp_connect_rsh_port" lineno="73153">
<summary>
Make a TCP connection to the rsh port.
</summary>
@@ -55678,7 +55724,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rsh_client_packets" lineno="76881">
+<interface name="corenet_send_rsh_client_packets" lineno="73173">
<summary>
Send rsh_client packets.
</summary>
@@ -55689,7 +55735,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="76900">
+<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="73192">
<summary>
Do not audit attempts to send rsh_client packets.
</summary>
@@ -55700,7 +55746,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rsh_client_packets" lineno="76919">
+<interface name="corenet_receive_rsh_client_packets" lineno="73211">
<summary>
Receive rsh_client packets.
</summary>
@@ -55711,7 +55757,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="76938">
+<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="73230">
<summary>
Do not audit attempts to receive rsh_client packets.
</summary>
@@ -55722,7 +55768,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rsh_client_packets" lineno="76957">
+<interface name="corenet_sendrecv_rsh_client_packets" lineno="73249">
<summary>
Send and receive rsh_client packets.
</summary>
@@ -55733,7 +55779,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="76973">
+<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="73265">
<summary>
Do not audit attempts to send and receive rsh_client packets.
</summary>
@@ -55744,7 +55790,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rsh_client_packets" lineno="76988">
+<interface name="corenet_relabelto_rsh_client_packets" lineno="73280">
<summary>
Relabel packets to rsh_client the packet type.
</summary>
@@ -55754,7 +55800,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rsh_server_packets" lineno="77008">
+<interface name="corenet_send_rsh_server_packets" lineno="73300">
<summary>
Send rsh_server packets.
</summary>
@@ -55765,7 +55811,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="77027">
+<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="73319">
<summary>
Do not audit attempts to send rsh_server packets.
</summary>
@@ -55776,7 +55822,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rsh_server_packets" lineno="77046">
+<interface name="corenet_receive_rsh_server_packets" lineno="73338">
<summary>
Receive rsh_server packets.
</summary>
@@ -55787,7 +55833,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="77065">
+<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="73357">
<summary>
Do not audit attempts to receive rsh_server packets.
</summary>
@@ -55798,7 +55844,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rsh_server_packets" lineno="77084">
+<interface name="corenet_sendrecv_rsh_server_packets" lineno="73376">
<summary>
Send and receive rsh_server packets.
</summary>
@@ -55809,7 +55855,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="77100">
+<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="73392">
<summary>
Do not audit attempts to send and receive rsh_server packets.
</summary>
@@ -55820,7 +55866,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rsh_server_packets" lineno="77115">
+<interface name="corenet_relabelto_rsh_server_packets" lineno="73407">
<summary>
Relabel packets to rsh_server the packet type.
</summary>
@@ -55830,7 +55876,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rsync_port" lineno="77137">
+<interface name="corenet_tcp_sendrecv_rsync_port" lineno="73429">
<summary>
Send and receive TCP traffic on the rsync port.
</summary>
@@ -55841,7 +55887,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_rsync_port" lineno="77156">
+<interface name="corenet_udp_send_rsync_port" lineno="73444">
<summary>
Send UDP traffic on the rsync port.
</summary>
@@ -55852,7 +55898,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="77175">
+<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="73459">
<summary>
Do not audit attempts to send UDP traffic on the rsync port.
</summary>
@@ -55863,7 +55909,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_rsync_port" lineno="77194">
+<interface name="corenet_udp_receive_rsync_port" lineno="73474">
<summary>
Receive UDP traffic on the rsync port.
</summary>
@@ -55874,7 +55920,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="77213">
+<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="73489">
<summary>
Do not audit attempts to receive UDP traffic on the rsync port.
</summary>
@@ -55885,7 +55931,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_rsync_port" lineno="77232">
+<interface name="corenet_udp_sendrecv_rsync_port" lineno="73504">
<summary>
Send and receive UDP traffic on the rsync port.
</summary>
@@ -55896,7 +55942,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="77249">
+<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="73520">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rsync port.
@@ -55908,7 +55954,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_rsync_port" lineno="77265">
+<interface name="corenet_tcp_bind_rsync_port" lineno="73535">
<summary>
Bind TCP sockets to the rsync port.
</summary>
@@ -55919,7 +55965,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rsync_port" lineno="77285">
+<interface name="corenet_udp_bind_rsync_port" lineno="73555">
<summary>
Bind UDP sockets to the rsync port.
</summary>
@@ -55930,7 +55976,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rsync_port" lineno="77304">
+<interface name="corenet_tcp_connect_rsync_port" lineno="73574">
<summary>
Make a TCP connection to the rsync port.
</summary>
@@ -55940,7 +55986,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rsync_client_packets" lineno="77324">
+<interface name="corenet_send_rsync_client_packets" lineno="73594">
<summary>
Send rsync_client packets.
</summary>
@@ -55951,7 +55997,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="77343">
+<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="73613">
<summary>
Do not audit attempts to send rsync_client packets.
</summary>
@@ -55962,7 +56008,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rsync_client_packets" lineno="77362">
+<interface name="corenet_receive_rsync_client_packets" lineno="73632">
<summary>
Receive rsync_client packets.
</summary>
@@ -55973,7 +56019,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="77381">
+<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="73651">
<summary>
Do not audit attempts to receive rsync_client packets.
</summary>
@@ -55984,7 +56030,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rsync_client_packets" lineno="77400">
+<interface name="corenet_sendrecv_rsync_client_packets" lineno="73670">
<summary>
Send and receive rsync_client packets.
</summary>
@@ -55995,7 +56041,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="77416">
+<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="73686">
<summary>
Do not audit attempts to send and receive rsync_client packets.
</summary>
@@ -56006,7 +56052,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rsync_client_packets" lineno="77431">
+<interface name="corenet_relabelto_rsync_client_packets" lineno="73701">
<summary>
Relabel packets to rsync_client the packet type.
</summary>
@@ -56016,7 +56062,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rsync_server_packets" lineno="77451">
+<interface name="corenet_send_rsync_server_packets" lineno="73721">
<summary>
Send rsync_server packets.
</summary>
@@ -56027,7 +56073,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="77470">
+<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="73740">
<summary>
Do not audit attempts to send rsync_server packets.
</summary>
@@ -56038,7 +56084,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rsync_server_packets" lineno="77489">
+<interface name="corenet_receive_rsync_server_packets" lineno="73759">
<summary>
Receive rsync_server packets.
</summary>
@@ -56049,7 +56095,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="77508">
+<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="73778">
<summary>
Do not audit attempts to receive rsync_server packets.
</summary>
@@ -56060,7 +56106,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rsync_server_packets" lineno="77527">
+<interface name="corenet_sendrecv_rsync_server_packets" lineno="73797">
<summary>
Send and receive rsync_server packets.
</summary>
@@ -56071,7 +56117,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="77543">
+<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="73813">
<summary>
Do not audit attempts to send and receive rsync_server packets.
</summary>
@@ -56082,7 +56128,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rsync_server_packets" lineno="77558">
+<interface name="corenet_relabelto_rsync_server_packets" lineno="73828">
<summary>
Relabel packets to rsync_server the packet type.
</summary>
@@ -56092,7 +56138,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="77580">
+<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="73850">
<summary>
Send and receive TCP traffic on the rtorrent port.
</summary>
@@ -56103,7 +56149,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_rtorrent_port" lineno="77599">
+<interface name="corenet_udp_send_rtorrent_port" lineno="73865">
<summary>
Send UDP traffic on the rtorrent port.
</summary>
@@ -56114,7 +56160,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="77618">
+<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="73880">
<summary>
Do not audit attempts to send UDP traffic on the rtorrent port.
</summary>
@@ -56125,7 +56171,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_rtorrent_port" lineno="77637">
+<interface name="corenet_udp_receive_rtorrent_port" lineno="73895">
<summary>
Receive UDP traffic on the rtorrent port.
</summary>
@@ -56136,7 +56182,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="77656">
+<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="73910">
<summary>
Do not audit attempts to receive UDP traffic on the rtorrent port.
</summary>
@@ -56147,7 +56193,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="77675">
+<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="73925">
<summary>
Send and receive UDP traffic on the rtorrent port.
</summary>
@@ -56158,7 +56204,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="77692">
+<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="73941">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rtorrent port.
@@ -56170,7 +56216,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_rtorrent_port" lineno="77708">
+<interface name="corenet_tcp_bind_rtorrent_port" lineno="73956">
<summary>
Bind TCP sockets to the rtorrent port.
</summary>
@@ -56181,7 +56227,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rtorrent_port" lineno="77728">
+<interface name="corenet_udp_bind_rtorrent_port" lineno="73976">
<summary>
Bind UDP sockets to the rtorrent port.
</summary>
@@ -56192,7 +56238,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rtorrent_port" lineno="77747">
+<interface name="corenet_tcp_connect_rtorrent_port" lineno="73995">
<summary>
Make a TCP connection to the rtorrent port.
</summary>
@@ -56202,7 +56248,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rtorrent_client_packets" lineno="77767">
+<interface name="corenet_send_rtorrent_client_packets" lineno="74015">
<summary>
Send rtorrent_client packets.
</summary>
@@ -56213,7 +56259,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="77786">
+<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="74034">
<summary>
Do not audit attempts to send rtorrent_client packets.
</summary>
@@ -56224,7 +56270,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rtorrent_client_packets" lineno="77805">
+<interface name="corenet_receive_rtorrent_client_packets" lineno="74053">
<summary>
Receive rtorrent_client packets.
</summary>
@@ -56235,7 +56281,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="77824">
+<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="74072">
<summary>
Do not audit attempts to receive rtorrent_client packets.
</summary>
@@ -56246,7 +56292,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="77843">
+<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="74091">
<summary>
Send and receive rtorrent_client packets.
</summary>
@@ -56257,7 +56303,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="77859">
+<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="74107">
<summary>
Do not audit attempts to send and receive rtorrent_client packets.
</summary>
@@ -56268,7 +56314,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rtorrent_client_packets" lineno="77874">
+<interface name="corenet_relabelto_rtorrent_client_packets" lineno="74122">
<summary>
Relabel packets to rtorrent_client the packet type.
</summary>
@@ -56278,7 +56324,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rtorrent_server_packets" lineno="77894">
+<interface name="corenet_send_rtorrent_server_packets" lineno="74142">
<summary>
Send rtorrent_server packets.
</summary>
@@ -56289,7 +56335,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="77913">
+<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="74161">
<summary>
Do not audit attempts to send rtorrent_server packets.
</summary>
@@ -56300,7 +56346,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rtorrent_server_packets" lineno="77932">
+<interface name="corenet_receive_rtorrent_server_packets" lineno="74180">
<summary>
Receive rtorrent_server packets.
</summary>
@@ -56311,7 +56357,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="77951">
+<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="74199">
<summary>
Do not audit attempts to receive rtorrent_server packets.
</summary>
@@ -56322,7 +56368,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="77970">
+<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="74218">
<summary>
Send and receive rtorrent_server packets.
</summary>
@@ -56333,7 +56379,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="77986">
+<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="74234">
<summary>
Do not audit attempts to send and receive rtorrent_server packets.
</summary>
@@ -56344,7 +56390,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rtorrent_server_packets" lineno="78001">
+<interface name="corenet_relabelto_rtorrent_server_packets" lineno="74249">
<summary>
Relabel packets to rtorrent_server the packet type.
</summary>
@@ -56354,7 +56400,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="78023">
+<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="74271">
<summary>
Send and receive TCP traffic on the rtsp port.
</summary>
@@ -56365,7 +56411,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_rtsp_port" lineno="78042">
+<interface name="corenet_udp_send_rtsp_port" lineno="74286">
<summary>
Send UDP traffic on the rtsp port.
</summary>
@@ -56376,7 +56422,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="78061">
+<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="74301">
<summary>
Do not audit attempts to send UDP traffic on the rtsp port.
</summary>
@@ -56387,7 +56433,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_rtsp_port" lineno="78080">
+<interface name="corenet_udp_receive_rtsp_port" lineno="74316">
<summary>
Receive UDP traffic on the rtsp port.
</summary>
@@ -56398,7 +56444,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="78099">
+<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="74331">
<summary>
Do not audit attempts to receive UDP traffic on the rtsp port.
</summary>
@@ -56409,7 +56455,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_rtsp_port" lineno="78118">
+<interface name="corenet_udp_sendrecv_rtsp_port" lineno="74346">
<summary>
Send and receive UDP traffic on the rtsp port.
</summary>
@@ -56420,7 +56466,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="78135">
+<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="74362">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rtsp port.
@@ -56432,7 +56478,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_rtsp_port" lineno="78151">
+<interface name="corenet_tcp_bind_rtsp_port" lineno="74377">
<summary>
Bind TCP sockets to the rtsp port.
</summary>
@@ -56443,7 +56489,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rtsp_port" lineno="78171">
+<interface name="corenet_udp_bind_rtsp_port" lineno="74397">
<summary>
Bind UDP sockets to the rtsp port.
</summary>
@@ -56454,7 +56500,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rtsp_port" lineno="78190">
+<interface name="corenet_tcp_connect_rtsp_port" lineno="74416">
<summary>
Make a TCP connection to the rtsp port.
</summary>
@@ -56464,7 +56510,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rtsp_client_packets" lineno="78210">
+<interface name="corenet_send_rtsp_client_packets" lineno="74436">
<summary>
Send rtsp_client packets.
</summary>
@@ -56475,7 +56521,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="78229">
+<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="74455">
<summary>
Do not audit attempts to send rtsp_client packets.
</summary>
@@ -56486,7 +56532,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rtsp_client_packets" lineno="78248">
+<interface name="corenet_receive_rtsp_client_packets" lineno="74474">
<summary>
Receive rtsp_client packets.
</summary>
@@ -56497,7 +56543,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="78267">
+<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="74493">
<summary>
Do not audit attempts to receive rtsp_client packets.
</summary>
@@ -56508,7 +56554,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rtsp_client_packets" lineno="78286">
+<interface name="corenet_sendrecv_rtsp_client_packets" lineno="74512">
<summary>
Send and receive rtsp_client packets.
</summary>
@@ -56519,7 +56565,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="78302">
+<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="74528">
<summary>
Do not audit attempts to send and receive rtsp_client packets.
</summary>
@@ -56530,7 +56576,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rtsp_client_packets" lineno="78317">
+<interface name="corenet_relabelto_rtsp_client_packets" lineno="74543">
<summary>
Relabel packets to rtsp_client the packet type.
</summary>
@@ -56540,7 +56586,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rtsp_server_packets" lineno="78337">
+<interface name="corenet_send_rtsp_server_packets" lineno="74563">
<summary>
Send rtsp_server packets.
</summary>
@@ -56551,7 +56597,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="78356">
+<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="74582">
<summary>
Do not audit attempts to send rtsp_server packets.
</summary>
@@ -56562,7 +56608,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rtsp_server_packets" lineno="78375">
+<interface name="corenet_receive_rtsp_server_packets" lineno="74601">
<summary>
Receive rtsp_server packets.
</summary>
@@ -56573,7 +56619,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="78394">
+<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="74620">
<summary>
Do not audit attempts to receive rtsp_server packets.
</summary>
@@ -56584,7 +56630,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rtsp_server_packets" lineno="78413">
+<interface name="corenet_sendrecv_rtsp_server_packets" lineno="74639">
<summary>
Send and receive rtsp_server packets.
</summary>
@@ -56595,7 +56641,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="78429">
+<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="74655">
<summary>
Do not audit attempts to send and receive rtsp_server packets.
</summary>
@@ -56606,7 +56652,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rtsp_server_packets" lineno="78444">
+<interface name="corenet_relabelto_rtsp_server_packets" lineno="74670">
<summary>
Relabel packets to rtsp_server the packet type.
</summary>
@@ -56616,7 +56662,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_rwho_port" lineno="78466">
+<interface name="corenet_tcp_sendrecv_rwho_port" lineno="74692">
<summary>
Send and receive TCP traffic on the rwho port.
</summary>
@@ -56627,7 +56673,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_rwho_port" lineno="78485">
+<interface name="corenet_udp_send_rwho_port" lineno="74707">
<summary>
Send UDP traffic on the rwho port.
</summary>
@@ -56638,7 +56684,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="78504">
+<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="74722">
<summary>
Do not audit attempts to send UDP traffic on the rwho port.
</summary>
@@ -56649,7 +56695,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_rwho_port" lineno="78523">
+<interface name="corenet_udp_receive_rwho_port" lineno="74737">
<summary>
Receive UDP traffic on the rwho port.
</summary>
@@ -56660,7 +56706,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="78542">
+<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="74752">
<summary>
Do not audit attempts to receive UDP traffic on the rwho port.
</summary>
@@ -56671,7 +56717,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_rwho_port" lineno="78561">
+<interface name="corenet_udp_sendrecv_rwho_port" lineno="74767">
<summary>
Send and receive UDP traffic on the rwho port.
</summary>
@@ -56682,7 +56728,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="78578">
+<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="74783">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rwho port.
@@ -56694,7 +56740,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_rwho_port" lineno="78594">
+<interface name="corenet_tcp_bind_rwho_port" lineno="74798">
<summary>
Bind TCP sockets to the rwho port.
</summary>
@@ -56705,7 +56751,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_rwho_port" lineno="78614">
+<interface name="corenet_udp_bind_rwho_port" lineno="74818">
<summary>
Bind UDP sockets to the rwho port.
</summary>
@@ -56716,7 +56762,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_rwho_port" lineno="78633">
+<interface name="corenet_tcp_connect_rwho_port" lineno="74837">
<summary>
Make a TCP connection to the rwho port.
</summary>
@@ -56726,7 +56772,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rwho_client_packets" lineno="78653">
+<interface name="corenet_send_rwho_client_packets" lineno="74857">
<summary>
Send rwho_client packets.
</summary>
@@ -56737,7 +56783,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="78672">
+<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="74876">
<summary>
Do not audit attempts to send rwho_client packets.
</summary>
@@ -56748,7 +56794,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rwho_client_packets" lineno="78691">
+<interface name="corenet_receive_rwho_client_packets" lineno="74895">
<summary>
Receive rwho_client packets.
</summary>
@@ -56759,7 +56805,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="78710">
+<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="74914">
<summary>
Do not audit attempts to receive rwho_client packets.
</summary>
@@ -56770,7 +56816,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rwho_client_packets" lineno="78729">
+<interface name="corenet_sendrecv_rwho_client_packets" lineno="74933">
<summary>
Send and receive rwho_client packets.
</summary>
@@ -56781,7 +56827,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="78745">
+<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="74949">
<summary>
Do not audit attempts to send and receive rwho_client packets.
</summary>
@@ -56792,7 +56838,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rwho_client_packets" lineno="78760">
+<interface name="corenet_relabelto_rwho_client_packets" lineno="74964">
<summary>
Relabel packets to rwho_client the packet type.
</summary>
@@ -56802,7 +56848,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_rwho_server_packets" lineno="78780">
+<interface name="corenet_send_rwho_server_packets" lineno="74984">
<summary>
Send rwho_server packets.
</summary>
@@ -56813,7 +56859,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="78799">
+<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="75003">
<summary>
Do not audit attempts to send rwho_server packets.
</summary>
@@ -56824,7 +56870,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_rwho_server_packets" lineno="78818">
+<interface name="corenet_receive_rwho_server_packets" lineno="75022">
<summary>
Receive rwho_server packets.
</summary>
@@ -56835,7 +56881,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="78837">
+<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="75041">
<summary>
Do not audit attempts to receive rwho_server packets.
</summary>
@@ -56846,7 +56892,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_rwho_server_packets" lineno="78856">
+<interface name="corenet_sendrecv_rwho_server_packets" lineno="75060">
<summary>
Send and receive rwho_server packets.
</summary>
@@ -56857,7 +56903,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="78872">
+<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="75076">
<summary>
Do not audit attempts to send and receive rwho_server packets.
</summary>
@@ -56868,7 +56914,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_rwho_server_packets" lineno="78887">
+<interface name="corenet_relabelto_rwho_server_packets" lineno="75091">
<summary>
Relabel packets to rwho_server the packet type.
</summary>
@@ -56878,7 +56924,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_salt_port" lineno="78909">
+<interface name="corenet_tcp_sendrecv_salt_port" lineno="75113">
<summary>
Send and receive TCP traffic on the salt port.
</summary>
@@ -56889,7 +56935,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_salt_port" lineno="78928">
+<interface name="corenet_udp_send_salt_port" lineno="75128">
<summary>
Send UDP traffic on the salt port.
</summary>
@@ -56900,7 +56946,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_salt_port" lineno="78947">
+<interface name="corenet_dontaudit_udp_send_salt_port" lineno="75143">
<summary>
Do not audit attempts to send UDP traffic on the salt port.
</summary>
@@ -56911,7 +56957,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_salt_port" lineno="78966">
+<interface name="corenet_udp_receive_salt_port" lineno="75158">
<summary>
Receive UDP traffic on the salt port.
</summary>
@@ -56922,7 +56968,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="78985">
+<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="75173">
<summary>
Do not audit attempts to receive UDP traffic on the salt port.
</summary>
@@ -56933,7 +56979,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_salt_port" lineno="79004">
+<interface name="corenet_udp_sendrecv_salt_port" lineno="75188">
<summary>
Send and receive UDP traffic on the salt port.
</summary>
@@ -56944,7 +56990,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="79021">
+<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="75204">
<summary>
Do not audit attempts to send and receive
UDP traffic on the salt port.
@@ -56956,7 +57002,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_salt_port" lineno="79037">
+<interface name="corenet_tcp_bind_salt_port" lineno="75219">
<summary>
Bind TCP sockets to the salt port.
</summary>
@@ -56967,7 +57013,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_salt_port" lineno="79057">
+<interface name="corenet_udp_bind_salt_port" lineno="75239">
<summary>
Bind UDP sockets to the salt port.
</summary>
@@ -56978,7 +57024,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_salt_port" lineno="79076">
+<interface name="corenet_tcp_connect_salt_port" lineno="75258">
<summary>
Make a TCP connection to the salt port.
</summary>
@@ -56988,7 +57034,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_salt_client_packets" lineno="79096">
+<interface name="corenet_send_salt_client_packets" lineno="75278">
<summary>
Send salt_client packets.
</summary>
@@ -56999,7 +57045,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_salt_client_packets" lineno="79115">
+<interface name="corenet_dontaudit_send_salt_client_packets" lineno="75297">
<summary>
Do not audit attempts to send salt_client packets.
</summary>
@@ -57010,7 +57056,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_salt_client_packets" lineno="79134">
+<interface name="corenet_receive_salt_client_packets" lineno="75316">
<summary>
Receive salt_client packets.
</summary>
@@ -57021,7 +57067,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="79153">
+<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="75335">
<summary>
Do not audit attempts to receive salt_client packets.
</summary>
@@ -57032,7 +57078,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_salt_client_packets" lineno="79172">
+<interface name="corenet_sendrecv_salt_client_packets" lineno="75354">
<summary>
Send and receive salt_client packets.
</summary>
@@ -57043,7 +57089,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="79188">
+<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="75370">
<summary>
Do not audit attempts to send and receive salt_client packets.
</summary>
@@ -57054,7 +57100,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_salt_client_packets" lineno="79203">
+<interface name="corenet_relabelto_salt_client_packets" lineno="75385">
<summary>
Relabel packets to salt_client the packet type.
</summary>
@@ -57064,7 +57110,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_salt_server_packets" lineno="79223">
+<interface name="corenet_send_salt_server_packets" lineno="75405">
<summary>
Send salt_server packets.
</summary>
@@ -57075,7 +57121,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_salt_server_packets" lineno="79242">
+<interface name="corenet_dontaudit_send_salt_server_packets" lineno="75424">
<summary>
Do not audit attempts to send salt_server packets.
</summary>
@@ -57086,7 +57132,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_salt_server_packets" lineno="79261">
+<interface name="corenet_receive_salt_server_packets" lineno="75443">
<summary>
Receive salt_server packets.
</summary>
@@ -57097,7 +57143,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="79280">
+<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="75462">
<summary>
Do not audit attempts to receive salt_server packets.
</summary>
@@ -57108,7 +57154,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_salt_server_packets" lineno="79299">
+<interface name="corenet_sendrecv_salt_server_packets" lineno="75481">
<summary>
Send and receive salt_server packets.
</summary>
@@ -57119,7 +57165,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="79315">
+<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="75497">
<summary>
Do not audit attempts to send and receive salt_server packets.
</summary>
@@ -57130,7 +57176,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_salt_server_packets" lineno="79330">
+<interface name="corenet_relabelto_salt_server_packets" lineno="75512">
<summary>
Relabel packets to salt_server the packet type.
</summary>
@@ -57140,7 +57186,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_sap_port" lineno="79352">
+<interface name="corenet_tcp_sendrecv_sap_port" lineno="75534">
<summary>
Send and receive TCP traffic on the sap port.
</summary>
@@ -57151,7 +57197,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_sap_port" lineno="79371">
+<interface name="corenet_udp_send_sap_port" lineno="75549">
<summary>
Send UDP traffic on the sap port.
</summary>
@@ -57162,7 +57208,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_sap_port" lineno="79390">
+<interface name="corenet_dontaudit_udp_send_sap_port" lineno="75564">
<summary>
Do not audit attempts to send UDP traffic on the sap port.
</summary>
@@ -57173,7 +57219,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_sap_port" lineno="79409">
+<interface name="corenet_udp_receive_sap_port" lineno="75579">
<summary>
Receive UDP traffic on the sap port.
</summary>
@@ -57184,7 +57230,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="79428">
+<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="75594">
<summary>
Do not audit attempts to receive UDP traffic on the sap port.
</summary>
@@ -57195,7 +57241,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_sap_port" lineno="79447">
+<interface name="corenet_udp_sendrecv_sap_port" lineno="75609">
<summary>
Send and receive UDP traffic on the sap port.
</summary>
@@ -57206,7 +57252,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="79464">
+<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="75625">
<summary>
Do not audit attempts to send and receive
UDP traffic on the sap port.
@@ -57218,7 +57264,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_sap_port" lineno="79480">
+<interface name="corenet_tcp_bind_sap_port" lineno="75640">
<summary>
Bind TCP sockets to the sap port.
</summary>
@@ -57229,7 +57275,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_sap_port" lineno="79500">
+<interface name="corenet_udp_bind_sap_port" lineno="75660">
<summary>
Bind UDP sockets to the sap port.
</summary>
@@ -57240,7 +57286,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_sap_port" lineno="79519">
+<interface name="corenet_tcp_connect_sap_port" lineno="75679">
<summary>
Make a TCP connection to the sap port.
</summary>
@@ -57250,7 +57296,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sap_client_packets" lineno="79539">
+<interface name="corenet_send_sap_client_packets" lineno="75699">
<summary>
Send sap_client packets.
</summary>
@@ -57261,7 +57307,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sap_client_packets" lineno="79558">
+<interface name="corenet_dontaudit_send_sap_client_packets" lineno="75718">
<summary>
Do not audit attempts to send sap_client packets.
</summary>
@@ -57272,7 +57318,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sap_client_packets" lineno="79577">
+<interface name="corenet_receive_sap_client_packets" lineno="75737">
<summary>
Receive sap_client packets.
</summary>
@@ -57283,7 +57329,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="79596">
+<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="75756">
<summary>
Do not audit attempts to receive sap_client packets.
</summary>
@@ -57294,7 +57340,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sap_client_packets" lineno="79615">
+<interface name="corenet_sendrecv_sap_client_packets" lineno="75775">
<summary>
Send and receive sap_client packets.
</summary>
@@ -57305,7 +57351,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="79631">
+<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="75791">
<summary>
Do not audit attempts to send and receive sap_client packets.
</summary>
@@ -57316,7 +57362,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sap_client_packets" lineno="79646">
+<interface name="corenet_relabelto_sap_client_packets" lineno="75806">
<summary>
Relabel packets to sap_client the packet type.
</summary>
@@ -57326,7 +57372,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sap_server_packets" lineno="79666">
+<interface name="corenet_send_sap_server_packets" lineno="75826">
<summary>
Send sap_server packets.
</summary>
@@ -57337,7 +57383,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sap_server_packets" lineno="79685">
+<interface name="corenet_dontaudit_send_sap_server_packets" lineno="75845">
<summary>
Do not audit attempts to send sap_server packets.
</summary>
@@ -57348,7 +57394,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sap_server_packets" lineno="79704">
+<interface name="corenet_receive_sap_server_packets" lineno="75864">
<summary>
Receive sap_server packets.
</summary>
@@ -57359,7 +57405,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="79723">
+<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="75883">
<summary>
Do not audit attempts to receive sap_server packets.
</summary>
@@ -57370,7 +57416,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sap_server_packets" lineno="79742">
+<interface name="corenet_sendrecv_sap_server_packets" lineno="75902">
<summary>
Send and receive sap_server packets.
</summary>
@@ -57381,7 +57427,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="79758">
+<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="75918">
<summary>
Do not audit attempts to send and receive sap_server packets.
</summary>
@@ -57392,7 +57438,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sap_server_packets" lineno="79773">
+<interface name="corenet_relabelto_sap_server_packets" lineno="75933">
<summary>
Relabel packets to sap_server the packet type.
</summary>
@@ -57402,7 +57448,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="79795">
+<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="75955">
<summary>
Send and receive TCP traffic on the servistaitsm port.
</summary>
@@ -57413,7 +57459,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_servistaitsm_port" lineno="79814">
+<interface name="corenet_udp_send_servistaitsm_port" lineno="75970">
<summary>
Send UDP traffic on the servistaitsm port.
</summary>
@@ -57424,7 +57470,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="79833">
+<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="75985">
<summary>
Do not audit attempts to send UDP traffic on the servistaitsm port.
</summary>
@@ -57435,7 +57481,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_servistaitsm_port" lineno="79852">
+<interface name="corenet_udp_receive_servistaitsm_port" lineno="76000">
<summary>
Receive UDP traffic on the servistaitsm port.
</summary>
@@ -57446,7 +57492,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="79871">
+<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="76015">
<summary>
Do not audit attempts to receive UDP traffic on the servistaitsm port.
</summary>
@@ -57457,7 +57503,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="79890">
+<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="76030">
<summary>
Send and receive UDP traffic on the servistaitsm port.
</summary>
@@ -57468,7 +57514,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="79907">
+<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="76046">
<summary>
Do not audit attempts to send and receive
UDP traffic on the servistaitsm port.
@@ -57480,7 +57526,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_servistaitsm_port" lineno="79923">
+<interface name="corenet_tcp_bind_servistaitsm_port" lineno="76061">
<summary>
Bind TCP sockets to the servistaitsm port.
</summary>
@@ -57491,7 +57537,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_servistaitsm_port" lineno="79943">
+<interface name="corenet_udp_bind_servistaitsm_port" lineno="76081">
<summary>
Bind UDP sockets to the servistaitsm port.
</summary>
@@ -57502,7 +57548,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_servistaitsm_port" lineno="79962">
+<interface name="corenet_tcp_connect_servistaitsm_port" lineno="76100">
<summary>
Make a TCP connection to the servistaitsm port.
</summary>
@@ -57512,7 +57558,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_servistaitsm_client_packets" lineno="79982">
+<interface name="corenet_send_servistaitsm_client_packets" lineno="76120">
<summary>
Send servistaitsm_client packets.
</summary>
@@ -57523,7 +57569,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="80001">
+<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="76139">
<summary>
Do not audit attempts to send servistaitsm_client packets.
</summary>
@@ -57534,7 +57580,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_servistaitsm_client_packets" lineno="80020">
+<interface name="corenet_receive_servistaitsm_client_packets" lineno="76158">
<summary>
Receive servistaitsm_client packets.
</summary>
@@ -57545,7 +57591,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="80039">
+<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="76177">
<summary>
Do not audit attempts to receive servistaitsm_client packets.
</summary>
@@ -57556,7 +57602,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="80058">
+<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="76196">
<summary>
Send and receive servistaitsm_client packets.
</summary>
@@ -57567,7 +57613,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="80074">
+<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="76212">
<summary>
Do not audit attempts to send and receive servistaitsm_client packets.
</summary>
@@ -57578,7 +57624,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="80089">
+<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="76227">
<summary>
Relabel packets to servistaitsm_client the packet type.
</summary>
@@ -57588,7 +57634,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_servistaitsm_server_packets" lineno="80109">
+<interface name="corenet_send_servistaitsm_server_packets" lineno="76247">
<summary>
Send servistaitsm_server packets.
</summary>
@@ -57599,7 +57645,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="80128">
+<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="76266">
<summary>
Do not audit attempts to send servistaitsm_server packets.
</summary>
@@ -57610,7 +57656,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_servistaitsm_server_packets" lineno="80147">
+<interface name="corenet_receive_servistaitsm_server_packets" lineno="76285">
<summary>
Receive servistaitsm_server packets.
</summary>
@@ -57621,7 +57667,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="80166">
+<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="76304">
<summary>
Do not audit attempts to receive servistaitsm_server packets.
</summary>
@@ -57632,7 +57678,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="80185">
+<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="76323">
<summary>
Send and receive servistaitsm_server packets.
</summary>
@@ -57643,7 +57689,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="80201">
+<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="76339">
<summary>
Do not audit attempts to send and receive servistaitsm_server packets.
</summary>
@@ -57654,7 +57700,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="80216">
+<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="76354">
<summary>
Relabel packets to servistaitsm_server the packet type.
</summary>
@@ -57664,7 +57710,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_sieve_port" lineno="80238">
+<interface name="corenet_tcp_sendrecv_sieve_port" lineno="76376">
<summary>
Send and receive TCP traffic on the sieve port.
</summary>
@@ -57675,7 +57721,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_sieve_port" lineno="80257">
+<interface name="corenet_udp_send_sieve_port" lineno="76391">
<summary>
Send UDP traffic on the sieve port.
</summary>
@@ -57686,7 +57732,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="80276">
+<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="76406">
<summary>
Do not audit attempts to send UDP traffic on the sieve port.
</summary>
@@ -57697,7 +57743,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_sieve_port" lineno="80295">
+<interface name="corenet_udp_receive_sieve_port" lineno="76421">
<summary>
Receive UDP traffic on the sieve port.
</summary>
@@ -57708,7 +57754,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="80314">
+<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="76436">
<summary>
Do not audit attempts to receive UDP traffic on the sieve port.
</summary>
@@ -57719,7 +57765,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_sieve_port" lineno="80333">
+<interface name="corenet_udp_sendrecv_sieve_port" lineno="76451">
<summary>
Send and receive UDP traffic on the sieve port.
</summary>
@@ -57730,7 +57776,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="80350">
+<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="76467">
<summary>
Do not audit attempts to send and receive
UDP traffic on the sieve port.
@@ -57742,7 +57788,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_sieve_port" lineno="80366">
+<interface name="corenet_tcp_bind_sieve_port" lineno="76482">
<summary>
Bind TCP sockets to the sieve port.
</summary>
@@ -57753,7 +57799,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_sieve_port" lineno="80386">
+<interface name="corenet_udp_bind_sieve_port" lineno="76502">
<summary>
Bind UDP sockets to the sieve port.
</summary>
@@ -57764,7 +57810,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_sieve_port" lineno="80405">
+<interface name="corenet_tcp_connect_sieve_port" lineno="76521">
<summary>
Make a TCP connection to the sieve port.
</summary>
@@ -57774,7 +57820,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sieve_client_packets" lineno="80425">
+<interface name="corenet_send_sieve_client_packets" lineno="76541">
<summary>
Send sieve_client packets.
</summary>
@@ -57785,7 +57831,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="80444">
+<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="76560">
<summary>
Do not audit attempts to send sieve_client packets.
</summary>
@@ -57796,7 +57842,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sieve_client_packets" lineno="80463">
+<interface name="corenet_receive_sieve_client_packets" lineno="76579">
<summary>
Receive sieve_client packets.
</summary>
@@ -57807,7 +57853,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="80482">
+<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="76598">
<summary>
Do not audit attempts to receive sieve_client packets.
</summary>
@@ -57818,7 +57864,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sieve_client_packets" lineno="80501">
+<interface name="corenet_sendrecv_sieve_client_packets" lineno="76617">
<summary>
Send and receive sieve_client packets.
</summary>
@@ -57829,7 +57875,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="80517">
+<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="76633">
<summary>
Do not audit attempts to send and receive sieve_client packets.
</summary>
@@ -57840,7 +57886,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sieve_client_packets" lineno="80532">
+<interface name="corenet_relabelto_sieve_client_packets" lineno="76648">
<summary>
Relabel packets to sieve_client the packet type.
</summary>
@@ -57850,7 +57896,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sieve_server_packets" lineno="80552">
+<interface name="corenet_send_sieve_server_packets" lineno="76668">
<summary>
Send sieve_server packets.
</summary>
@@ -57861,7 +57907,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="80571">
+<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="76687">
<summary>
Do not audit attempts to send sieve_server packets.
</summary>
@@ -57872,7 +57918,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sieve_server_packets" lineno="80590">
+<interface name="corenet_receive_sieve_server_packets" lineno="76706">
<summary>
Receive sieve_server packets.
</summary>
@@ -57883,7 +57929,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="80609">
+<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="76725">
<summary>
Do not audit attempts to receive sieve_server packets.
</summary>
@@ -57894,7 +57940,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sieve_server_packets" lineno="80628">
+<interface name="corenet_sendrecv_sieve_server_packets" lineno="76744">
<summary>
Send and receive sieve_server packets.
</summary>
@@ -57905,7 +57951,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="80644">
+<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="76760">
<summary>
Do not audit attempts to send and receive sieve_server packets.
</summary>
@@ -57916,7 +57962,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sieve_server_packets" lineno="80659">
+<interface name="corenet_relabelto_sieve_server_packets" lineno="76775">
<summary>
Relabel packets to sieve_server the packet type.
</summary>
@@ -57926,7 +57972,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_sip_port" lineno="80681">
+<interface name="corenet_tcp_sendrecv_sip_port" lineno="76797">
<summary>
Send and receive TCP traffic on the sip port.
</summary>
@@ -57937,7 +57983,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_sip_port" lineno="80700">
+<interface name="corenet_udp_send_sip_port" lineno="76812">
<summary>
Send UDP traffic on the sip port.
</summary>
@@ -57948,7 +57994,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_sip_port" lineno="80719">
+<interface name="corenet_dontaudit_udp_send_sip_port" lineno="76827">
<summary>
Do not audit attempts to send UDP traffic on the sip port.
</summary>
@@ -57959,7 +58005,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_sip_port" lineno="80738">
+<interface name="corenet_udp_receive_sip_port" lineno="76842">
<summary>
Receive UDP traffic on the sip port.
</summary>
@@ -57970,7 +58016,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="80757">
+<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="76857">
<summary>
Do not audit attempts to receive UDP traffic on the sip port.
</summary>
@@ -57981,7 +58027,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_sip_port" lineno="80776">
+<interface name="corenet_udp_sendrecv_sip_port" lineno="76872">
<summary>
Send and receive UDP traffic on the sip port.
</summary>
@@ -57992,7 +58038,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="80793">
+<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="76888">
<summary>
Do not audit attempts to send and receive
UDP traffic on the sip port.
@@ -58004,7 +58050,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_sip_port" lineno="80809">
+<interface name="corenet_tcp_bind_sip_port" lineno="76903">
<summary>
Bind TCP sockets to the sip port.
</summary>
@@ -58015,7 +58061,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_sip_port" lineno="80829">
+<interface name="corenet_udp_bind_sip_port" lineno="76923">
<summary>
Bind UDP sockets to the sip port.
</summary>
@@ -58026,7 +58072,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_sip_port" lineno="80848">
+<interface name="corenet_tcp_connect_sip_port" lineno="76942">
<summary>
Make a TCP connection to the sip port.
</summary>
@@ -58036,7 +58082,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sip_client_packets" lineno="80868">
+<interface name="corenet_send_sip_client_packets" lineno="76962">
<summary>
Send sip_client packets.
</summary>
@@ -58047,7 +58093,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sip_client_packets" lineno="80887">
+<interface name="corenet_dontaudit_send_sip_client_packets" lineno="76981">
<summary>
Do not audit attempts to send sip_client packets.
</summary>
@@ -58058,7 +58104,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sip_client_packets" lineno="80906">
+<interface name="corenet_receive_sip_client_packets" lineno="77000">
<summary>
Receive sip_client packets.
</summary>
@@ -58069,7 +58115,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="80925">
+<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="77019">
<summary>
Do not audit attempts to receive sip_client packets.
</summary>
@@ -58080,7 +58126,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sip_client_packets" lineno="80944">
+<interface name="corenet_sendrecv_sip_client_packets" lineno="77038">
<summary>
Send and receive sip_client packets.
</summary>
@@ -58091,7 +58137,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="80960">
+<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="77054">
<summary>
Do not audit attempts to send and receive sip_client packets.
</summary>
@@ -58102,7 +58148,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sip_client_packets" lineno="80975">
+<interface name="corenet_relabelto_sip_client_packets" lineno="77069">
<summary>
Relabel packets to sip_client the packet type.
</summary>
@@ -58112,7 +58158,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sip_server_packets" lineno="80995">
+<interface name="corenet_send_sip_server_packets" lineno="77089">
<summary>
Send sip_server packets.
</summary>
@@ -58123,7 +58169,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sip_server_packets" lineno="81014">
+<interface name="corenet_dontaudit_send_sip_server_packets" lineno="77108">
<summary>
Do not audit attempts to send sip_server packets.
</summary>
@@ -58134,7 +58180,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sip_server_packets" lineno="81033">
+<interface name="corenet_receive_sip_server_packets" lineno="77127">
<summary>
Receive sip_server packets.
</summary>
@@ -58145,7 +58191,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="81052">
+<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="77146">
<summary>
Do not audit attempts to receive sip_server packets.
</summary>
@@ -58156,7 +58202,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sip_server_packets" lineno="81071">
+<interface name="corenet_sendrecv_sip_server_packets" lineno="77165">
<summary>
Send and receive sip_server packets.
</summary>
@@ -58167,7 +58213,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="81087">
+<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="77181">
<summary>
Do not audit attempts to send and receive sip_server packets.
</summary>
@@ -58178,7 +58224,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sip_server_packets" lineno="81102">
+<interface name="corenet_relabelto_sip_server_packets" lineno="77196">
<summary>
Relabel packets to sip_server the packet type.
</summary>
@@ -58188,7 +58234,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="81124">
+<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="77218">
<summary>
Send and receive TCP traffic on the sixxsconfig port.
</summary>
@@ -58199,7 +58245,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_sixxsconfig_port" lineno="81143">
+<interface name="corenet_udp_send_sixxsconfig_port" lineno="77233">
<summary>
Send UDP traffic on the sixxsconfig port.
</summary>
@@ -58210,7 +58256,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="81162">
+<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="77248">
<summary>
Do not audit attempts to send UDP traffic on the sixxsconfig port.
</summary>
@@ -58221,7 +58267,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_sixxsconfig_port" lineno="81181">
+<interface name="corenet_udp_receive_sixxsconfig_port" lineno="77263">
<summary>
Receive UDP traffic on the sixxsconfig port.
</summary>
@@ -58232,7 +58278,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="81200">
+<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="77278">
<summary>
Do not audit attempts to receive UDP traffic on the sixxsconfig port.
</summary>
@@ -58243,7 +58289,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="81219">
+<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="77293">
<summary>
Send and receive UDP traffic on the sixxsconfig port.
</summary>
@@ -58254,7 +58300,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="81236">
+<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="77309">
<summary>
Do not audit attempts to send and receive
UDP traffic on the sixxsconfig port.
@@ -58266,7 +58312,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="81252">
+<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="77324">
<summary>
Bind TCP sockets to the sixxsconfig port.
</summary>
@@ -58277,7 +58323,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_sixxsconfig_port" lineno="81272">
+<interface name="corenet_udp_bind_sixxsconfig_port" lineno="77344">
<summary>
Bind UDP sockets to the sixxsconfig port.
</summary>
@@ -58288,7 +58334,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="81291">
+<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="77363">
<summary>
Make a TCP connection to the sixxsconfig port.
</summary>
@@ -58298,7 +58344,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sixxsconfig_client_packets" lineno="81311">
+<interface name="corenet_send_sixxsconfig_client_packets" lineno="77383">
<summary>
Send sixxsconfig_client packets.
</summary>
@@ -58309,7 +58355,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="81330">
+<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="77402">
<summary>
Do not audit attempts to send sixxsconfig_client packets.
</summary>
@@ -58320,7 +58366,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sixxsconfig_client_packets" lineno="81349">
+<interface name="corenet_receive_sixxsconfig_client_packets" lineno="77421">
<summary>
Receive sixxsconfig_client packets.
</summary>
@@ -58331,7 +58377,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="81368">
+<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="77440">
<summary>
Do not audit attempts to receive sixxsconfig_client packets.
</summary>
@@ -58342,7 +58388,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="81387">
+<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="77459">
<summary>
Send and receive sixxsconfig_client packets.
</summary>
@@ -58353,7 +58399,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="81403">
+<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="77475">
<summary>
Do not audit attempts to send and receive sixxsconfig_client packets.
</summary>
@@ -58364,7 +58410,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="81418">
+<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="77490">
<summary>
Relabel packets to sixxsconfig_client the packet type.
</summary>
@@ -58374,7 +58420,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sixxsconfig_server_packets" lineno="81438">
+<interface name="corenet_send_sixxsconfig_server_packets" lineno="77510">
<summary>
Send sixxsconfig_server packets.
</summary>
@@ -58385,7 +58431,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="81457">
+<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="77529">
<summary>
Do not audit attempts to send sixxsconfig_server packets.
</summary>
@@ -58396,7 +58442,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sixxsconfig_server_packets" lineno="81476">
+<interface name="corenet_receive_sixxsconfig_server_packets" lineno="77548">
<summary>
Receive sixxsconfig_server packets.
</summary>
@@ -58407,7 +58453,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="81495">
+<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="77567">
<summary>
Do not audit attempts to receive sixxsconfig_server packets.
</summary>
@@ -58418,7 +58464,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="81514">
+<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="77586">
<summary>
Send and receive sixxsconfig_server packets.
</summary>
@@ -58429,7 +58475,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="81530">
+<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="77602">
<summary>
Do not audit attempts to send and receive sixxsconfig_server packets.
</summary>
@@ -58440,7 +58486,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="81545">
+<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="77617">
<summary>
Relabel packets to sixxsconfig_server the packet type.
</summary>
@@ -58450,7 +58496,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_smbd_port" lineno="81567">
+<interface name="corenet_tcp_sendrecv_smbd_port" lineno="77639">
<summary>
Send and receive TCP traffic on the smbd port.
</summary>
@@ -58461,7 +58507,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_smbd_port" lineno="81586">
+<interface name="corenet_udp_send_smbd_port" lineno="77654">
<summary>
Send UDP traffic on the smbd port.
</summary>
@@ -58472,7 +58518,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="81605">
+<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="77669">
<summary>
Do not audit attempts to send UDP traffic on the smbd port.
</summary>
@@ -58483,7 +58529,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_smbd_port" lineno="81624">
+<interface name="corenet_udp_receive_smbd_port" lineno="77684">
<summary>
Receive UDP traffic on the smbd port.
</summary>
@@ -58494,7 +58540,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="81643">
+<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="77699">
<summary>
Do not audit attempts to receive UDP traffic on the smbd port.
</summary>
@@ -58505,7 +58551,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_smbd_port" lineno="81662">
+<interface name="corenet_udp_sendrecv_smbd_port" lineno="77714">
<summary>
Send and receive UDP traffic on the smbd port.
</summary>
@@ -58516,7 +58562,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="81679">
+<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="77730">
<summary>
Do not audit attempts to send and receive
UDP traffic on the smbd port.
@@ -58528,7 +58574,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_smbd_port" lineno="81695">
+<interface name="corenet_tcp_bind_smbd_port" lineno="77745">
<summary>
Bind TCP sockets to the smbd port.
</summary>
@@ -58539,7 +58585,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_smbd_port" lineno="81715">
+<interface name="corenet_udp_bind_smbd_port" lineno="77765">
<summary>
Bind UDP sockets to the smbd port.
</summary>
@@ -58550,7 +58596,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_smbd_port" lineno="81734">
+<interface name="corenet_tcp_connect_smbd_port" lineno="77784">
<summary>
Make a TCP connection to the smbd port.
</summary>
@@ -58560,7 +58606,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_smbd_client_packets" lineno="81754">
+<interface name="corenet_send_smbd_client_packets" lineno="77804">
<summary>
Send smbd_client packets.
</summary>
@@ -58571,7 +58617,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="81773">
+<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="77823">
<summary>
Do not audit attempts to send smbd_client packets.
</summary>
@@ -58582,7 +58628,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_smbd_client_packets" lineno="81792">
+<interface name="corenet_receive_smbd_client_packets" lineno="77842">
<summary>
Receive smbd_client packets.
</summary>
@@ -58593,7 +58639,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="81811">
+<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="77861">
<summary>
Do not audit attempts to receive smbd_client packets.
</summary>
@@ -58604,7 +58650,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_smbd_client_packets" lineno="81830">
+<interface name="corenet_sendrecv_smbd_client_packets" lineno="77880">
<summary>
Send and receive smbd_client packets.
</summary>
@@ -58615,7 +58661,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="81846">
+<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="77896">
<summary>
Do not audit attempts to send and receive smbd_client packets.
</summary>
@@ -58626,7 +58672,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_smbd_client_packets" lineno="81861">
+<interface name="corenet_relabelto_smbd_client_packets" lineno="77911">
<summary>
Relabel packets to smbd_client the packet type.
</summary>
@@ -58636,7 +58682,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_smbd_server_packets" lineno="81881">
+<interface name="corenet_send_smbd_server_packets" lineno="77931">
<summary>
Send smbd_server packets.
</summary>
@@ -58647,7 +58693,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="81900">
+<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="77950">
<summary>
Do not audit attempts to send smbd_server packets.
</summary>
@@ -58658,7 +58704,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_smbd_server_packets" lineno="81919">
+<interface name="corenet_receive_smbd_server_packets" lineno="77969">
<summary>
Receive smbd_server packets.
</summary>
@@ -58669,7 +58715,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="81938">
+<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="77988">
<summary>
Do not audit attempts to receive smbd_server packets.
</summary>
@@ -58680,7 +58726,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_smbd_server_packets" lineno="81957">
+<interface name="corenet_sendrecv_smbd_server_packets" lineno="78007">
<summary>
Send and receive smbd_server packets.
</summary>
@@ -58691,7 +58737,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="81973">
+<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="78023">
<summary>
Do not audit attempts to send and receive smbd_server packets.
</summary>
@@ -58702,7 +58748,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_smbd_server_packets" lineno="81988">
+<interface name="corenet_relabelto_smbd_server_packets" lineno="78038">
<summary>
Relabel packets to smbd_server the packet type.
</summary>
@@ -58712,7 +58758,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_smtp_port" lineno="82010">
+<interface name="corenet_tcp_sendrecv_smtp_port" lineno="78060">
<summary>
Send and receive TCP traffic on the smtp port.
</summary>
@@ -58723,7 +58769,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_smtp_port" lineno="82029">
+<interface name="corenet_udp_send_smtp_port" lineno="78075">
<summary>
Send UDP traffic on the smtp port.
</summary>
@@ -58734,7 +58780,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="82048">
+<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="78090">
<summary>
Do not audit attempts to send UDP traffic on the smtp port.
</summary>
@@ -58745,7 +58791,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_smtp_port" lineno="82067">
+<interface name="corenet_udp_receive_smtp_port" lineno="78105">
<summary>
Receive UDP traffic on the smtp port.
</summary>
@@ -58756,7 +58802,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="82086">
+<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="78120">
<summary>
Do not audit attempts to receive UDP traffic on the smtp port.
</summary>
@@ -58767,7 +58813,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_smtp_port" lineno="82105">
+<interface name="corenet_udp_sendrecv_smtp_port" lineno="78135">
<summary>
Send and receive UDP traffic on the smtp port.
</summary>
@@ -58778,7 +58824,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="82122">
+<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="78151">
<summary>
Do not audit attempts to send and receive
UDP traffic on the smtp port.
@@ -58790,7 +58836,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_smtp_port" lineno="82138">
+<interface name="corenet_tcp_bind_smtp_port" lineno="78166">
<summary>
Bind TCP sockets to the smtp port.
</summary>
@@ -58801,7 +58847,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_smtp_port" lineno="82158">
+<interface name="corenet_udp_bind_smtp_port" lineno="78186">
<summary>
Bind UDP sockets to the smtp port.
</summary>
@@ -58812,7 +58858,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_smtp_port" lineno="82177">
+<interface name="corenet_tcp_connect_smtp_port" lineno="78205">
<summary>
Make a TCP connection to the smtp port.
</summary>
@@ -58822,7 +58868,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_smtp_client_packets" lineno="82197">
+<interface name="corenet_send_smtp_client_packets" lineno="78225">
<summary>
Send smtp_client packets.
</summary>
@@ -58833,7 +58879,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="82216">
+<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="78244">
<summary>
Do not audit attempts to send smtp_client packets.
</summary>
@@ -58844,7 +58890,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_smtp_client_packets" lineno="82235">
+<interface name="corenet_receive_smtp_client_packets" lineno="78263">
<summary>
Receive smtp_client packets.
</summary>
@@ -58855,7 +58901,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="82254">
+<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="78282">
<summary>
Do not audit attempts to receive smtp_client packets.
</summary>
@@ -58866,7 +58912,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_smtp_client_packets" lineno="82273">
+<interface name="corenet_sendrecv_smtp_client_packets" lineno="78301">
<summary>
Send and receive smtp_client packets.
</summary>
@@ -58877,7 +58923,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="82289">
+<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="78317">
<summary>
Do not audit attempts to send and receive smtp_client packets.
</summary>
@@ -58888,7 +58934,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_smtp_client_packets" lineno="82304">
+<interface name="corenet_relabelto_smtp_client_packets" lineno="78332">
<summary>
Relabel packets to smtp_client the packet type.
</summary>
@@ -58898,7 +58944,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_smtp_server_packets" lineno="82324">
+<interface name="corenet_send_smtp_server_packets" lineno="78352">
<summary>
Send smtp_server packets.
</summary>
@@ -58909,7 +58955,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="82343">
+<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="78371">
<summary>
Do not audit attempts to send smtp_server packets.
</summary>
@@ -58920,7 +58966,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_smtp_server_packets" lineno="82362">
+<interface name="corenet_receive_smtp_server_packets" lineno="78390">
<summary>
Receive smtp_server packets.
</summary>
@@ -58931,7 +58977,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="82381">
+<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="78409">
<summary>
Do not audit attempts to receive smtp_server packets.
</summary>
@@ -58942,7 +58988,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_smtp_server_packets" lineno="82400">
+<interface name="corenet_sendrecv_smtp_server_packets" lineno="78428">
<summary>
Send and receive smtp_server packets.
</summary>
@@ -58953,7 +58999,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="82416">
+<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="78444">
<summary>
Do not audit attempts to send and receive smtp_server packets.
</summary>
@@ -58964,7 +59010,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_smtp_server_packets" lineno="82431">
+<interface name="corenet_relabelto_smtp_server_packets" lineno="78459">
<summary>
Relabel packets to smtp_server the packet type.
</summary>
@@ -58974,7 +59020,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_snmp_port" lineno="82453">
+<interface name="corenet_tcp_sendrecv_snmp_port" lineno="78481">
<summary>
Send and receive TCP traffic on the snmp port.
</summary>
@@ -58985,7 +59031,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_snmp_port" lineno="82472">
+<interface name="corenet_udp_send_snmp_port" lineno="78496">
<summary>
Send UDP traffic on the snmp port.
</summary>
@@ -58996,7 +59042,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="82491">
+<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="78511">
<summary>
Do not audit attempts to send UDP traffic on the snmp port.
</summary>
@@ -59007,7 +59053,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_snmp_port" lineno="82510">
+<interface name="corenet_udp_receive_snmp_port" lineno="78526">
<summary>
Receive UDP traffic on the snmp port.
</summary>
@@ -59018,7 +59064,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="82529">
+<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="78541">
<summary>
Do not audit attempts to receive UDP traffic on the snmp port.
</summary>
@@ -59029,7 +59075,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_snmp_port" lineno="82548">
+<interface name="corenet_udp_sendrecv_snmp_port" lineno="78556">
<summary>
Send and receive UDP traffic on the snmp port.
</summary>
@@ -59040,7 +59086,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="82565">
+<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="78572">
<summary>
Do not audit attempts to send and receive
UDP traffic on the snmp port.
@@ -59052,7 +59098,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_snmp_port" lineno="82581">
+<interface name="corenet_tcp_bind_snmp_port" lineno="78587">
<summary>
Bind TCP sockets to the snmp port.
</summary>
@@ -59063,7 +59109,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_snmp_port" lineno="82601">
+<interface name="corenet_udp_bind_snmp_port" lineno="78607">
<summary>
Bind UDP sockets to the snmp port.
</summary>
@@ -59074,7 +59120,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_snmp_port" lineno="82620">
+<interface name="corenet_tcp_connect_snmp_port" lineno="78626">
<summary>
Make a TCP connection to the snmp port.
</summary>
@@ -59084,7 +59130,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_snmp_client_packets" lineno="82640">
+<interface name="corenet_send_snmp_client_packets" lineno="78646">
<summary>
Send snmp_client packets.
</summary>
@@ -59095,7 +59141,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="82659">
+<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="78665">
<summary>
Do not audit attempts to send snmp_client packets.
</summary>
@@ -59106,7 +59152,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_snmp_client_packets" lineno="82678">
+<interface name="corenet_receive_snmp_client_packets" lineno="78684">
<summary>
Receive snmp_client packets.
</summary>
@@ -59117,7 +59163,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="82697">
+<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="78703">
<summary>
Do not audit attempts to receive snmp_client packets.
</summary>
@@ -59128,7 +59174,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_snmp_client_packets" lineno="82716">
+<interface name="corenet_sendrecv_snmp_client_packets" lineno="78722">
<summary>
Send and receive snmp_client packets.
</summary>
@@ -59139,7 +59185,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="82732">
+<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="78738">
<summary>
Do not audit attempts to send and receive snmp_client packets.
</summary>
@@ -59150,7 +59196,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_snmp_client_packets" lineno="82747">
+<interface name="corenet_relabelto_snmp_client_packets" lineno="78753">
<summary>
Relabel packets to snmp_client the packet type.
</summary>
@@ -59160,7 +59206,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_snmp_server_packets" lineno="82767">
+<interface name="corenet_send_snmp_server_packets" lineno="78773">
<summary>
Send snmp_server packets.
</summary>
@@ -59171,7 +59217,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="82786">
+<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="78792">
<summary>
Do not audit attempts to send snmp_server packets.
</summary>
@@ -59182,7 +59228,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_snmp_server_packets" lineno="82805">
+<interface name="corenet_receive_snmp_server_packets" lineno="78811">
<summary>
Receive snmp_server packets.
</summary>
@@ -59193,7 +59239,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="82824">
+<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="78830">
<summary>
Do not audit attempts to receive snmp_server packets.
</summary>
@@ -59204,7 +59250,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_snmp_server_packets" lineno="82843">
+<interface name="corenet_sendrecv_snmp_server_packets" lineno="78849">
<summary>
Send and receive snmp_server packets.
</summary>
@@ -59215,7 +59261,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="82859">
+<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="78865">
<summary>
Do not audit attempts to send and receive snmp_server packets.
</summary>
@@ -59226,7 +59272,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_snmp_server_packets" lineno="82874">
+<interface name="corenet_relabelto_snmp_server_packets" lineno="78880">
<summary>
Relabel packets to snmp_server the packet type.
</summary>
@@ -59236,7 +59282,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_socks_port" lineno="82896">
+<interface name="corenet_tcp_sendrecv_socks_port" lineno="78902">
<summary>
Send and receive TCP traffic on the socks port.
</summary>
@@ -59247,7 +59293,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_socks_port" lineno="82915">
+<interface name="corenet_udp_send_socks_port" lineno="78917">
<summary>
Send UDP traffic on the socks port.
</summary>
@@ -59258,7 +59304,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_socks_port" lineno="82934">
+<interface name="corenet_dontaudit_udp_send_socks_port" lineno="78932">
<summary>
Do not audit attempts to send UDP traffic on the socks port.
</summary>
@@ -59269,7 +59315,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_socks_port" lineno="82953">
+<interface name="corenet_udp_receive_socks_port" lineno="78947">
<summary>
Receive UDP traffic on the socks port.
</summary>
@@ -59280,7 +59326,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="82972">
+<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="78962">
<summary>
Do not audit attempts to receive UDP traffic on the socks port.
</summary>
@@ -59291,7 +59337,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_socks_port" lineno="82991">
+<interface name="corenet_udp_sendrecv_socks_port" lineno="78977">
<summary>
Send and receive UDP traffic on the socks port.
</summary>
@@ -59302,7 +59348,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="83008">
+<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="78993">
<summary>
Do not audit attempts to send and receive
UDP traffic on the socks port.
@@ -59314,7 +59360,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_socks_port" lineno="83024">
+<interface name="corenet_tcp_bind_socks_port" lineno="79008">
<summary>
Bind TCP sockets to the socks port.
</summary>
@@ -59325,7 +59371,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_socks_port" lineno="83044">
+<interface name="corenet_udp_bind_socks_port" lineno="79028">
<summary>
Bind UDP sockets to the socks port.
</summary>
@@ -59336,7 +59382,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_socks_port" lineno="83063">
+<interface name="corenet_tcp_connect_socks_port" lineno="79047">
<summary>
Make a TCP connection to the socks port.
</summary>
@@ -59346,7 +59392,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_socks_client_packets" lineno="83083">
+<interface name="corenet_send_socks_client_packets" lineno="79067">
<summary>
Send socks_client packets.
</summary>
@@ -59357,7 +59403,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_socks_client_packets" lineno="83102">
+<interface name="corenet_dontaudit_send_socks_client_packets" lineno="79086">
<summary>
Do not audit attempts to send socks_client packets.
</summary>
@@ -59368,7 +59414,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_socks_client_packets" lineno="83121">
+<interface name="corenet_receive_socks_client_packets" lineno="79105">
<summary>
Receive socks_client packets.
</summary>
@@ -59379,7 +59425,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="83140">
+<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="79124">
<summary>
Do not audit attempts to receive socks_client packets.
</summary>
@@ -59390,7 +59436,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_socks_client_packets" lineno="83159">
+<interface name="corenet_sendrecv_socks_client_packets" lineno="79143">
<summary>
Send and receive socks_client packets.
</summary>
@@ -59401,7 +59447,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="83175">
+<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="79159">
<summary>
Do not audit attempts to send and receive socks_client packets.
</summary>
@@ -59412,7 +59458,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_socks_client_packets" lineno="83190">
+<interface name="corenet_relabelto_socks_client_packets" lineno="79174">
<summary>
Relabel packets to socks_client the packet type.
</summary>
@@ -59422,7 +59468,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_socks_server_packets" lineno="83210">
+<interface name="corenet_send_socks_server_packets" lineno="79194">
<summary>
Send socks_server packets.
</summary>
@@ -59433,7 +59479,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_socks_server_packets" lineno="83229">
+<interface name="corenet_dontaudit_send_socks_server_packets" lineno="79213">
<summary>
Do not audit attempts to send socks_server packets.
</summary>
@@ -59444,7 +59490,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_socks_server_packets" lineno="83248">
+<interface name="corenet_receive_socks_server_packets" lineno="79232">
<summary>
Receive socks_server packets.
</summary>
@@ -59455,7 +59501,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="83267">
+<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="79251">
<summary>
Do not audit attempts to receive socks_server packets.
</summary>
@@ -59466,7 +59512,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_socks_server_packets" lineno="83286">
+<interface name="corenet_sendrecv_socks_server_packets" lineno="79270">
<summary>
Send and receive socks_server packets.
</summary>
@@ -59477,7 +59523,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="83302">
+<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="79286">
<summary>
Do not audit attempts to send and receive socks_server packets.
</summary>
@@ -59488,7 +59534,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_socks_server_packets" lineno="83317">
+<interface name="corenet_relabelto_socks_server_packets" lineno="79301">
<summary>
Relabel packets to socks_server the packet type.
</summary>
@@ -59498,7 +59544,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_soundd_port" lineno="83339">
+<interface name="corenet_tcp_sendrecv_soundd_port" lineno="79323">
<summary>
Send and receive TCP traffic on the soundd port.
</summary>
@@ -59509,7 +59555,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_soundd_port" lineno="83358">
+<interface name="corenet_udp_send_soundd_port" lineno="79338">
<summary>
Send UDP traffic on the soundd port.
</summary>
@@ -59520,7 +59566,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="83377">
+<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="79353">
<summary>
Do not audit attempts to send UDP traffic on the soundd port.
</summary>
@@ -59531,7 +59577,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_soundd_port" lineno="83396">
+<interface name="corenet_udp_receive_soundd_port" lineno="79368">
<summary>
Receive UDP traffic on the soundd port.
</summary>
@@ -59542,7 +59588,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="83415">
+<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="79383">
<summary>
Do not audit attempts to receive UDP traffic on the soundd port.
</summary>
@@ -59553,7 +59599,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_soundd_port" lineno="83434">
+<interface name="corenet_udp_sendrecv_soundd_port" lineno="79398">
<summary>
Send and receive UDP traffic on the soundd port.
</summary>
@@ -59564,7 +59610,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="83451">
+<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="79414">
<summary>
Do not audit attempts to send and receive
UDP traffic on the soundd port.
@@ -59576,7 +59622,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_soundd_port" lineno="83467">
+<interface name="corenet_tcp_bind_soundd_port" lineno="79429">
<summary>
Bind TCP sockets to the soundd port.
</summary>
@@ -59587,7 +59633,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_soundd_port" lineno="83487">
+<interface name="corenet_udp_bind_soundd_port" lineno="79449">
<summary>
Bind UDP sockets to the soundd port.
</summary>
@@ -59598,7 +59644,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_soundd_port" lineno="83506">
+<interface name="corenet_tcp_connect_soundd_port" lineno="79468">
<summary>
Make a TCP connection to the soundd port.
</summary>
@@ -59608,7 +59654,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_soundd_client_packets" lineno="83526">
+<interface name="corenet_send_soundd_client_packets" lineno="79488">
<summary>
Send soundd_client packets.
</summary>
@@ -59619,7 +59665,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="83545">
+<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="79507">
<summary>
Do not audit attempts to send soundd_client packets.
</summary>
@@ -59630,7 +59676,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_soundd_client_packets" lineno="83564">
+<interface name="corenet_receive_soundd_client_packets" lineno="79526">
<summary>
Receive soundd_client packets.
</summary>
@@ -59641,7 +59687,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="83583">
+<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="79545">
<summary>
Do not audit attempts to receive soundd_client packets.
</summary>
@@ -59652,7 +59698,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_soundd_client_packets" lineno="83602">
+<interface name="corenet_sendrecv_soundd_client_packets" lineno="79564">
<summary>
Send and receive soundd_client packets.
</summary>
@@ -59663,7 +59709,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="83618">
+<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="79580">
<summary>
Do not audit attempts to send and receive soundd_client packets.
</summary>
@@ -59674,7 +59720,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_soundd_client_packets" lineno="83633">
+<interface name="corenet_relabelto_soundd_client_packets" lineno="79595">
<summary>
Relabel packets to soundd_client the packet type.
</summary>
@@ -59684,7 +59730,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_soundd_server_packets" lineno="83653">
+<interface name="corenet_send_soundd_server_packets" lineno="79615">
<summary>
Send soundd_server packets.
</summary>
@@ -59695,7 +59741,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="83672">
+<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="79634">
<summary>
Do not audit attempts to send soundd_server packets.
</summary>
@@ -59706,7 +59752,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_soundd_server_packets" lineno="83691">
+<interface name="corenet_receive_soundd_server_packets" lineno="79653">
<summary>
Receive soundd_server packets.
</summary>
@@ -59717,7 +59763,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="83710">
+<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="79672">
<summary>
Do not audit attempts to receive soundd_server packets.
</summary>
@@ -59728,7 +59774,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_soundd_server_packets" lineno="83729">
+<interface name="corenet_sendrecv_soundd_server_packets" lineno="79691">
<summary>
Send and receive soundd_server packets.
</summary>
@@ -59739,7 +59785,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="83745">
+<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="79707">
<summary>
Do not audit attempts to send and receive soundd_server packets.
</summary>
@@ -59750,7 +59796,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_soundd_server_packets" lineno="83760">
+<interface name="corenet_relabelto_soundd_server_packets" lineno="79722">
<summary>
Relabel packets to soundd_server the packet type.
</summary>
@@ -59760,7 +59806,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_spamd_port" lineno="83782">
+<interface name="corenet_tcp_sendrecv_spamd_port" lineno="79744">
<summary>
Send and receive TCP traffic on the spamd port.
</summary>
@@ -59771,7 +59817,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_spamd_port" lineno="83801">
+<interface name="corenet_udp_send_spamd_port" lineno="79759">
<summary>
Send UDP traffic on the spamd port.
</summary>
@@ -59782,7 +59828,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="83820">
+<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="79774">
<summary>
Do not audit attempts to send UDP traffic on the spamd port.
</summary>
@@ -59793,7 +59839,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_spamd_port" lineno="83839">
+<interface name="corenet_udp_receive_spamd_port" lineno="79789">
<summary>
Receive UDP traffic on the spamd port.
</summary>
@@ -59804,7 +59850,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="83858">
+<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="79804">
<summary>
Do not audit attempts to receive UDP traffic on the spamd port.
</summary>
@@ -59815,7 +59861,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_spamd_port" lineno="83877">
+<interface name="corenet_udp_sendrecv_spamd_port" lineno="79819">
<summary>
Send and receive UDP traffic on the spamd port.
</summary>
@@ -59826,7 +59872,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="83894">
+<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="79835">
<summary>
Do not audit attempts to send and receive
UDP traffic on the spamd port.
@@ -59838,7 +59884,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_spamd_port" lineno="83910">
+<interface name="corenet_tcp_bind_spamd_port" lineno="79850">
<summary>
Bind TCP sockets to the spamd port.
</summary>
@@ -59849,7 +59895,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_spamd_port" lineno="83930">
+<interface name="corenet_udp_bind_spamd_port" lineno="79870">
<summary>
Bind UDP sockets to the spamd port.
</summary>
@@ -59860,7 +59906,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_spamd_port" lineno="83949">
+<interface name="corenet_tcp_connect_spamd_port" lineno="79889">
<summary>
Make a TCP connection to the spamd port.
</summary>
@@ -59870,7 +59916,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_spamd_client_packets" lineno="83969">
+<interface name="corenet_send_spamd_client_packets" lineno="79909">
<summary>
Send spamd_client packets.
</summary>
@@ -59881,7 +59927,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="83988">
+<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="79928">
<summary>
Do not audit attempts to send spamd_client packets.
</summary>
@@ -59892,7 +59938,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_spamd_client_packets" lineno="84007">
+<interface name="corenet_receive_spamd_client_packets" lineno="79947">
<summary>
Receive spamd_client packets.
</summary>
@@ -59903,7 +59949,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="84026">
+<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="79966">
<summary>
Do not audit attempts to receive spamd_client packets.
</summary>
@@ -59914,7 +59960,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_spamd_client_packets" lineno="84045">
+<interface name="corenet_sendrecv_spamd_client_packets" lineno="79985">
<summary>
Send and receive spamd_client packets.
</summary>
@@ -59925,7 +59971,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="84061">
+<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="80001">
<summary>
Do not audit attempts to send and receive spamd_client packets.
</summary>
@@ -59936,7 +59982,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_spamd_client_packets" lineno="84076">
+<interface name="corenet_relabelto_spamd_client_packets" lineno="80016">
<summary>
Relabel packets to spamd_client the packet type.
</summary>
@@ -59946,7 +59992,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_spamd_server_packets" lineno="84096">
+<interface name="corenet_send_spamd_server_packets" lineno="80036">
<summary>
Send spamd_server packets.
</summary>
@@ -59957,7 +60003,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="84115">
+<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="80055">
<summary>
Do not audit attempts to send spamd_server packets.
</summary>
@@ -59968,7 +60014,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_spamd_server_packets" lineno="84134">
+<interface name="corenet_receive_spamd_server_packets" lineno="80074">
<summary>
Receive spamd_server packets.
</summary>
@@ -59979,7 +60025,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="84153">
+<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="80093">
<summary>
Do not audit attempts to receive spamd_server packets.
</summary>
@@ -59990,7 +60036,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_spamd_server_packets" lineno="84172">
+<interface name="corenet_sendrecv_spamd_server_packets" lineno="80112">
<summary>
Send and receive spamd_server packets.
</summary>
@@ -60001,7 +60047,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="84188">
+<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="80128">
<summary>
Do not audit attempts to send and receive spamd_server packets.
</summary>
@@ -60012,7 +60058,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_spamd_server_packets" lineno="84203">
+<interface name="corenet_relabelto_spamd_server_packets" lineno="80143">
<summary>
Relabel packets to spamd_server the packet type.
</summary>
@@ -60022,7 +60068,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_speech_port" lineno="84225">
+<interface name="corenet_tcp_sendrecv_speech_port" lineno="80165">
<summary>
Send and receive TCP traffic on the speech port.
</summary>
@@ -60033,7 +60079,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_speech_port" lineno="84244">
+<interface name="corenet_udp_send_speech_port" lineno="80180">
<summary>
Send UDP traffic on the speech port.
</summary>
@@ -60044,7 +60090,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_speech_port" lineno="84263">
+<interface name="corenet_dontaudit_udp_send_speech_port" lineno="80195">
<summary>
Do not audit attempts to send UDP traffic on the speech port.
</summary>
@@ -60055,7 +60101,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_speech_port" lineno="84282">
+<interface name="corenet_udp_receive_speech_port" lineno="80210">
<summary>
Receive UDP traffic on the speech port.
</summary>
@@ -60066,7 +60112,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="84301">
+<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="80225">
<summary>
Do not audit attempts to receive UDP traffic on the speech port.
</summary>
@@ -60077,7 +60123,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_speech_port" lineno="84320">
+<interface name="corenet_udp_sendrecv_speech_port" lineno="80240">
<summary>
Send and receive UDP traffic on the speech port.
</summary>
@@ -60088,7 +60134,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="84337">
+<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="80256">
<summary>
Do not audit attempts to send and receive
UDP traffic on the speech port.
@@ -60100,7 +60146,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_speech_port" lineno="84353">
+<interface name="corenet_tcp_bind_speech_port" lineno="80271">
<summary>
Bind TCP sockets to the speech port.
</summary>
@@ -60111,7 +60157,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_speech_port" lineno="84373">
+<interface name="corenet_udp_bind_speech_port" lineno="80291">
<summary>
Bind UDP sockets to the speech port.
</summary>
@@ -60122,7 +60168,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_speech_port" lineno="84392">
+<interface name="corenet_tcp_connect_speech_port" lineno="80310">
<summary>
Make a TCP connection to the speech port.
</summary>
@@ -60132,7 +60178,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_speech_client_packets" lineno="84412">
+<interface name="corenet_send_speech_client_packets" lineno="80330">
<summary>
Send speech_client packets.
</summary>
@@ -60143,7 +60189,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_speech_client_packets" lineno="84431">
+<interface name="corenet_dontaudit_send_speech_client_packets" lineno="80349">
<summary>
Do not audit attempts to send speech_client packets.
</summary>
@@ -60154,7 +60200,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_speech_client_packets" lineno="84450">
+<interface name="corenet_receive_speech_client_packets" lineno="80368">
<summary>
Receive speech_client packets.
</summary>
@@ -60165,7 +60211,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="84469">
+<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="80387">
<summary>
Do not audit attempts to receive speech_client packets.
</summary>
@@ -60176,7 +60222,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_speech_client_packets" lineno="84488">
+<interface name="corenet_sendrecv_speech_client_packets" lineno="80406">
<summary>
Send and receive speech_client packets.
</summary>
@@ -60187,7 +60233,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="84504">
+<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="80422">
<summary>
Do not audit attempts to send and receive speech_client packets.
</summary>
@@ -60198,7 +60244,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_speech_client_packets" lineno="84519">
+<interface name="corenet_relabelto_speech_client_packets" lineno="80437">
<summary>
Relabel packets to speech_client the packet type.
</summary>
@@ -60208,7 +60254,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_speech_server_packets" lineno="84539">
+<interface name="corenet_send_speech_server_packets" lineno="80457">
<summary>
Send speech_server packets.
</summary>
@@ -60219,7 +60265,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_speech_server_packets" lineno="84558">
+<interface name="corenet_dontaudit_send_speech_server_packets" lineno="80476">
<summary>
Do not audit attempts to send speech_server packets.
</summary>
@@ -60230,7 +60276,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_speech_server_packets" lineno="84577">
+<interface name="corenet_receive_speech_server_packets" lineno="80495">
<summary>
Receive speech_server packets.
</summary>
@@ -60241,7 +60287,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="84596">
+<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="80514">
<summary>
Do not audit attempts to receive speech_server packets.
</summary>
@@ -60252,7 +60298,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_speech_server_packets" lineno="84615">
+<interface name="corenet_sendrecv_speech_server_packets" lineno="80533">
<summary>
Send and receive speech_server packets.
</summary>
@@ -60263,7 +60309,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="84631">
+<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="80549">
<summary>
Do not audit attempts to send and receive speech_server packets.
</summary>
@@ -60274,7 +60320,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_speech_server_packets" lineno="84646">
+<interface name="corenet_relabelto_speech_server_packets" lineno="80564">
<summary>
Relabel packets to speech_server the packet type.
</summary>
@@ -60284,7 +60330,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_squid_port" lineno="84668">
+<interface name="corenet_tcp_sendrecv_squid_port" lineno="80586">
<summary>
Send and receive TCP traffic on the squid port.
</summary>
@@ -60295,7 +60341,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_squid_port" lineno="84687">
+<interface name="corenet_udp_send_squid_port" lineno="80601">
<summary>
Send UDP traffic on the squid port.
</summary>
@@ -60306,7 +60352,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_squid_port" lineno="84706">
+<interface name="corenet_dontaudit_udp_send_squid_port" lineno="80616">
<summary>
Do not audit attempts to send UDP traffic on the squid port.
</summary>
@@ -60317,7 +60363,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_squid_port" lineno="84725">
+<interface name="corenet_udp_receive_squid_port" lineno="80631">
<summary>
Receive UDP traffic on the squid port.
</summary>
@@ -60328,7 +60374,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="84744">
+<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="80646">
<summary>
Do not audit attempts to receive UDP traffic on the squid port.
</summary>
@@ -60339,7 +60385,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_squid_port" lineno="84763">
+<interface name="corenet_udp_sendrecv_squid_port" lineno="80661">
<summary>
Send and receive UDP traffic on the squid port.
</summary>
@@ -60350,7 +60396,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="84780">
+<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="80677">
<summary>
Do not audit attempts to send and receive
UDP traffic on the squid port.
@@ -60362,7 +60408,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_squid_port" lineno="84796">
+<interface name="corenet_tcp_bind_squid_port" lineno="80692">
<summary>
Bind TCP sockets to the squid port.
</summary>
@@ -60373,7 +60419,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_squid_port" lineno="84816">
+<interface name="corenet_udp_bind_squid_port" lineno="80712">
<summary>
Bind UDP sockets to the squid port.
</summary>
@@ -60384,7 +60430,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_squid_port" lineno="84835">
+<interface name="corenet_tcp_connect_squid_port" lineno="80731">
<summary>
Make a TCP connection to the squid port.
</summary>
@@ -60394,7 +60440,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_squid_client_packets" lineno="84855">
+<interface name="corenet_send_squid_client_packets" lineno="80751">
<summary>
Send squid_client packets.
</summary>
@@ -60405,7 +60451,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_squid_client_packets" lineno="84874">
+<interface name="corenet_dontaudit_send_squid_client_packets" lineno="80770">
<summary>
Do not audit attempts to send squid_client packets.
</summary>
@@ -60416,7 +60462,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_squid_client_packets" lineno="84893">
+<interface name="corenet_receive_squid_client_packets" lineno="80789">
<summary>
Receive squid_client packets.
</summary>
@@ -60427,7 +60473,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="84912">
+<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="80808">
<summary>
Do not audit attempts to receive squid_client packets.
</summary>
@@ -60438,7 +60484,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_squid_client_packets" lineno="84931">
+<interface name="corenet_sendrecv_squid_client_packets" lineno="80827">
<summary>
Send and receive squid_client packets.
</summary>
@@ -60449,7 +60495,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="84947">
+<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="80843">
<summary>
Do not audit attempts to send and receive squid_client packets.
</summary>
@@ -60460,7 +60506,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_squid_client_packets" lineno="84962">
+<interface name="corenet_relabelto_squid_client_packets" lineno="80858">
<summary>
Relabel packets to squid_client the packet type.
</summary>
@@ -60470,7 +60516,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_squid_server_packets" lineno="84982">
+<interface name="corenet_send_squid_server_packets" lineno="80878">
<summary>
Send squid_server packets.
</summary>
@@ -60481,7 +60527,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_squid_server_packets" lineno="85001">
+<interface name="corenet_dontaudit_send_squid_server_packets" lineno="80897">
<summary>
Do not audit attempts to send squid_server packets.
</summary>
@@ -60492,7 +60538,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_squid_server_packets" lineno="85020">
+<interface name="corenet_receive_squid_server_packets" lineno="80916">
<summary>
Receive squid_server packets.
</summary>
@@ -60503,7 +60549,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="85039">
+<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="80935">
<summary>
Do not audit attempts to receive squid_server packets.
</summary>
@@ -60514,7 +60560,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_squid_server_packets" lineno="85058">
+<interface name="corenet_sendrecv_squid_server_packets" lineno="80954">
<summary>
Send and receive squid_server packets.
</summary>
@@ -60525,7 +60571,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="85074">
+<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="80970">
<summary>
Do not audit attempts to send and receive squid_server packets.
</summary>
@@ -60536,7 +60582,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_squid_server_packets" lineno="85089">
+<interface name="corenet_relabelto_squid_server_packets" lineno="80985">
<summary>
Relabel packets to squid_server the packet type.
</summary>
@@ -60546,7 +60592,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="85111">
+<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="81007">
<summary>
Send and receive TCP traffic on the ssdp port.
</summary>
@@ -60557,7 +60603,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ssdp_port" lineno="85130">
+<interface name="corenet_udp_send_ssdp_port" lineno="81022">
<summary>
Send UDP traffic on the ssdp port.
</summary>
@@ -60568,7 +60614,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="85149">
+<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="81037">
<summary>
Do not audit attempts to send UDP traffic on the ssdp port.
</summary>
@@ -60579,7 +60625,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ssdp_port" lineno="85168">
+<interface name="corenet_udp_receive_ssdp_port" lineno="81052">
<summary>
Receive UDP traffic on the ssdp port.
</summary>
@@ -60590,7 +60636,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="85187">
+<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="81067">
<summary>
Do not audit attempts to receive UDP traffic on the ssdp port.
</summary>
@@ -60601,7 +60647,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ssdp_port" lineno="85206">
+<interface name="corenet_udp_sendrecv_ssdp_port" lineno="81082">
<summary>
Send and receive UDP traffic on the ssdp port.
</summary>
@@ -60612,7 +60658,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="85223">
+<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="81098">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ssdp port.
@@ -60624,7 +60670,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ssdp_port" lineno="85239">
+<interface name="corenet_tcp_bind_ssdp_port" lineno="81113">
<summary>
Bind TCP sockets to the ssdp port.
</summary>
@@ -60635,7 +60681,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ssdp_port" lineno="85259">
+<interface name="corenet_udp_bind_ssdp_port" lineno="81133">
<summary>
Bind UDP sockets to the ssdp port.
</summary>
@@ -60646,7 +60692,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ssdp_port" lineno="85278">
+<interface name="corenet_tcp_connect_ssdp_port" lineno="81152">
<summary>
Make a TCP connection to the ssdp port.
</summary>
@@ -60656,7 +60702,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ssdp_client_packets" lineno="85298">
+<interface name="corenet_send_ssdp_client_packets" lineno="81172">
<summary>
Send ssdp_client packets.
</summary>
@@ -60667,7 +60713,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="85317">
+<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="81191">
<summary>
Do not audit attempts to send ssdp_client packets.
</summary>
@@ -60678,7 +60724,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ssdp_client_packets" lineno="85336">
+<interface name="corenet_receive_ssdp_client_packets" lineno="81210">
<summary>
Receive ssdp_client packets.
</summary>
@@ -60689,7 +60735,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="85355">
+<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="81229">
<summary>
Do not audit attempts to receive ssdp_client packets.
</summary>
@@ -60700,7 +60746,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ssdp_client_packets" lineno="85374">
+<interface name="corenet_sendrecv_ssdp_client_packets" lineno="81248">
<summary>
Send and receive ssdp_client packets.
</summary>
@@ -60711,7 +60757,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="85390">
+<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="81264">
<summary>
Do not audit attempts to send and receive ssdp_client packets.
</summary>
@@ -60722,7 +60768,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ssdp_client_packets" lineno="85405">
+<interface name="corenet_relabelto_ssdp_client_packets" lineno="81279">
<summary>
Relabel packets to ssdp_client the packet type.
</summary>
@@ -60732,7 +60778,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ssdp_server_packets" lineno="85425">
+<interface name="corenet_send_ssdp_server_packets" lineno="81299">
<summary>
Send ssdp_server packets.
</summary>
@@ -60743,7 +60789,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="85444">
+<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="81318">
<summary>
Do not audit attempts to send ssdp_server packets.
</summary>
@@ -60754,7 +60800,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ssdp_server_packets" lineno="85463">
+<interface name="corenet_receive_ssdp_server_packets" lineno="81337">
<summary>
Receive ssdp_server packets.
</summary>
@@ -60765,7 +60811,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="85482">
+<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="81356">
<summary>
Do not audit attempts to receive ssdp_server packets.
</summary>
@@ -60776,7 +60822,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ssdp_server_packets" lineno="85501">
+<interface name="corenet_sendrecv_ssdp_server_packets" lineno="81375">
<summary>
Send and receive ssdp_server packets.
</summary>
@@ -60787,7 +60833,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="85517">
+<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="81391">
<summary>
Do not audit attempts to send and receive ssdp_server packets.
</summary>
@@ -60798,7 +60844,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ssdp_server_packets" lineno="85532">
+<interface name="corenet_relabelto_ssdp_server_packets" lineno="81406">
<summary>
Relabel packets to ssdp_server the packet type.
</summary>
@@ -60808,7 +60854,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ssh_port" lineno="85554">
+<interface name="corenet_tcp_sendrecv_ssh_port" lineno="81428">
<summary>
Send and receive TCP traffic on the ssh port.
</summary>
@@ -60819,7 +60865,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ssh_port" lineno="85573">
+<interface name="corenet_udp_send_ssh_port" lineno="81443">
<summary>
Send UDP traffic on the ssh port.
</summary>
@@ -60830,7 +60876,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="85592">
+<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="81458">
<summary>
Do not audit attempts to send UDP traffic on the ssh port.
</summary>
@@ -60841,7 +60887,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ssh_port" lineno="85611">
+<interface name="corenet_udp_receive_ssh_port" lineno="81473">
<summary>
Receive UDP traffic on the ssh port.
</summary>
@@ -60852,7 +60898,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="85630">
+<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="81488">
<summary>
Do not audit attempts to receive UDP traffic on the ssh port.
</summary>
@@ -60863,7 +60909,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ssh_port" lineno="85649">
+<interface name="corenet_udp_sendrecv_ssh_port" lineno="81503">
<summary>
Send and receive UDP traffic on the ssh port.
</summary>
@@ -60874,7 +60920,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="85666">
+<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="81519">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ssh port.
@@ -60886,7 +60932,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ssh_port" lineno="85682">
+<interface name="corenet_tcp_bind_ssh_port" lineno="81534">
<summary>
Bind TCP sockets to the ssh port.
</summary>
@@ -60897,7 +60943,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ssh_port" lineno="85702">
+<interface name="corenet_udp_bind_ssh_port" lineno="81554">
<summary>
Bind UDP sockets to the ssh port.
</summary>
@@ -60908,7 +60954,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ssh_port" lineno="85721">
+<interface name="corenet_tcp_connect_ssh_port" lineno="81573">
<summary>
Make a TCP connection to the ssh port.
</summary>
@@ -60918,7 +60964,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ssh_client_packets" lineno="85741">
+<interface name="corenet_send_ssh_client_packets" lineno="81593">
<summary>
Send ssh_client packets.
</summary>
@@ -60929,7 +60975,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="85760">
+<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="81612">
<summary>
Do not audit attempts to send ssh_client packets.
</summary>
@@ -60940,7 +60986,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ssh_client_packets" lineno="85779">
+<interface name="corenet_receive_ssh_client_packets" lineno="81631">
<summary>
Receive ssh_client packets.
</summary>
@@ -60951,7 +60997,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="85798">
+<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="81650">
<summary>
Do not audit attempts to receive ssh_client packets.
</summary>
@@ -60962,7 +61008,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ssh_client_packets" lineno="85817">
+<interface name="corenet_sendrecv_ssh_client_packets" lineno="81669">
<summary>
Send and receive ssh_client packets.
</summary>
@@ -60973,7 +61019,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="85833">
+<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="81685">
<summary>
Do not audit attempts to send and receive ssh_client packets.
</summary>
@@ -60984,7 +61030,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ssh_client_packets" lineno="85848">
+<interface name="corenet_relabelto_ssh_client_packets" lineno="81700">
<summary>
Relabel packets to ssh_client the packet type.
</summary>
@@ -60994,7 +61040,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ssh_server_packets" lineno="85868">
+<interface name="corenet_send_ssh_server_packets" lineno="81720">
<summary>
Send ssh_server packets.
</summary>
@@ -61005,7 +61051,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="85887">
+<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="81739">
<summary>
Do not audit attempts to send ssh_server packets.
</summary>
@@ -61016,7 +61062,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ssh_server_packets" lineno="85906">
+<interface name="corenet_receive_ssh_server_packets" lineno="81758">
<summary>
Receive ssh_server packets.
</summary>
@@ -61027,7 +61073,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="85925">
+<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="81777">
<summary>
Do not audit attempts to receive ssh_server packets.
</summary>
@@ -61038,7 +61084,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ssh_server_packets" lineno="85944">
+<interface name="corenet_sendrecv_ssh_server_packets" lineno="81796">
<summary>
Send and receive ssh_server packets.
</summary>
@@ -61049,7 +61095,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="85960">
+<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="81812">
<summary>
Do not audit attempts to send and receive ssh_server packets.
</summary>
@@ -61060,7 +61106,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ssh_server_packets" lineno="85975">
+<interface name="corenet_relabelto_ssh_server_packets" lineno="81827">
<summary>
Relabel packets to ssh_server the packet type.
</summary>
@@ -61070,7 +61116,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="85997">
+<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="81849">
<summary>
Send and receive TCP traffic on the stunnel port.
</summary>
@@ -61081,7 +61127,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_stunnel_port" lineno="86016">
+<interface name="corenet_udp_send_stunnel_port" lineno="81864">
<summary>
Send UDP traffic on the stunnel port.
</summary>
@@ -61092,7 +61138,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="86035">
+<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="81879">
<summary>
Do not audit attempts to send UDP traffic on the stunnel port.
</summary>
@@ -61103,7 +61149,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_stunnel_port" lineno="86054">
+<interface name="corenet_udp_receive_stunnel_port" lineno="81894">
<summary>
Receive UDP traffic on the stunnel port.
</summary>
@@ -61114,7 +61160,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="86073">
+<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="81909">
<summary>
Do not audit attempts to receive UDP traffic on the stunnel port.
</summary>
@@ -61125,7 +61171,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_stunnel_port" lineno="86092">
+<interface name="corenet_udp_sendrecv_stunnel_port" lineno="81924">
<summary>
Send and receive UDP traffic on the stunnel port.
</summary>
@@ -61136,7 +61182,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="86109">
+<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="81940">
<summary>
Do not audit attempts to send and receive
UDP traffic on the stunnel port.
@@ -61148,7 +61194,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_stunnel_port" lineno="86125">
+<interface name="corenet_tcp_bind_stunnel_port" lineno="81955">
<summary>
Bind TCP sockets to the stunnel port.
</summary>
@@ -61159,7 +61205,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_stunnel_port" lineno="86145">
+<interface name="corenet_udp_bind_stunnel_port" lineno="81975">
<summary>
Bind UDP sockets to the stunnel port.
</summary>
@@ -61170,7 +61216,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_stunnel_port" lineno="86164">
+<interface name="corenet_tcp_connect_stunnel_port" lineno="81994">
<summary>
Make a TCP connection to the stunnel port.
</summary>
@@ -61180,7 +61226,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_stunnel_client_packets" lineno="86184">
+<interface name="corenet_send_stunnel_client_packets" lineno="82014">
<summary>
Send stunnel_client packets.
</summary>
@@ -61191,7 +61237,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="86203">
+<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="82033">
<summary>
Do not audit attempts to send stunnel_client packets.
</summary>
@@ -61202,7 +61248,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_stunnel_client_packets" lineno="86222">
+<interface name="corenet_receive_stunnel_client_packets" lineno="82052">
<summary>
Receive stunnel_client packets.
</summary>
@@ -61213,7 +61259,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="86241">
+<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="82071">
<summary>
Do not audit attempts to receive stunnel_client packets.
</summary>
@@ -61224,7 +61270,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_stunnel_client_packets" lineno="86260">
+<interface name="corenet_sendrecv_stunnel_client_packets" lineno="82090">
<summary>
Send and receive stunnel_client packets.
</summary>
@@ -61235,7 +61281,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="86276">
+<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="82106">
<summary>
Do not audit attempts to send and receive stunnel_client packets.
</summary>
@@ -61246,7 +61292,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_stunnel_client_packets" lineno="86291">
+<interface name="corenet_relabelto_stunnel_client_packets" lineno="82121">
<summary>
Relabel packets to stunnel_client the packet type.
</summary>
@@ -61256,7 +61302,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_stunnel_server_packets" lineno="86311">
+<interface name="corenet_send_stunnel_server_packets" lineno="82141">
<summary>
Send stunnel_server packets.
</summary>
@@ -61267,7 +61313,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="86330">
+<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="82160">
<summary>
Do not audit attempts to send stunnel_server packets.
</summary>
@@ -61278,7 +61324,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_stunnel_server_packets" lineno="86349">
+<interface name="corenet_receive_stunnel_server_packets" lineno="82179">
<summary>
Receive stunnel_server packets.
</summary>
@@ -61289,7 +61335,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="86368">
+<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="82198">
<summary>
Do not audit attempts to receive stunnel_server packets.
</summary>
@@ -61300,7 +61346,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_stunnel_server_packets" lineno="86387">
+<interface name="corenet_sendrecv_stunnel_server_packets" lineno="82217">
<summary>
Send and receive stunnel_server packets.
</summary>
@@ -61311,7 +61357,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="86403">
+<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="82233">
<summary>
Do not audit attempts to send and receive stunnel_server packets.
</summary>
@@ -61322,7 +61368,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_stunnel_server_packets" lineno="86418">
+<interface name="corenet_relabelto_stunnel_server_packets" lineno="82248">
<summary>
Relabel packets to stunnel_server the packet type.
</summary>
@@ -61332,7 +61378,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_svn_port" lineno="86440">
+<interface name="corenet_tcp_sendrecv_svn_port" lineno="82270">
<summary>
Send and receive TCP traffic on the svn port.
</summary>
@@ -61343,7 +61389,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_svn_port" lineno="86459">
+<interface name="corenet_udp_send_svn_port" lineno="82285">
<summary>
Send UDP traffic on the svn port.
</summary>
@@ -61354,7 +61400,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_svn_port" lineno="86478">
+<interface name="corenet_dontaudit_udp_send_svn_port" lineno="82300">
<summary>
Do not audit attempts to send UDP traffic on the svn port.
</summary>
@@ -61365,7 +61411,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_svn_port" lineno="86497">
+<interface name="corenet_udp_receive_svn_port" lineno="82315">
<summary>
Receive UDP traffic on the svn port.
</summary>
@@ -61376,7 +61422,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="86516">
+<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="82330">
<summary>
Do not audit attempts to receive UDP traffic on the svn port.
</summary>
@@ -61387,7 +61433,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_svn_port" lineno="86535">
+<interface name="corenet_udp_sendrecv_svn_port" lineno="82345">
<summary>
Send and receive UDP traffic on the svn port.
</summary>
@@ -61398,7 +61444,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="86552">
+<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="82361">
<summary>
Do not audit attempts to send and receive
UDP traffic on the svn port.
@@ -61410,7 +61456,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_svn_port" lineno="86568">
+<interface name="corenet_tcp_bind_svn_port" lineno="82376">
<summary>
Bind TCP sockets to the svn port.
</summary>
@@ -61421,7 +61467,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_svn_port" lineno="86588">
+<interface name="corenet_udp_bind_svn_port" lineno="82396">
<summary>
Bind UDP sockets to the svn port.
</summary>
@@ -61432,7 +61478,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_svn_port" lineno="86607">
+<interface name="corenet_tcp_connect_svn_port" lineno="82415">
<summary>
Make a TCP connection to the svn port.
</summary>
@@ -61442,7 +61488,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_svn_client_packets" lineno="86627">
+<interface name="corenet_send_svn_client_packets" lineno="82435">
<summary>
Send svn_client packets.
</summary>
@@ -61453,7 +61499,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_svn_client_packets" lineno="86646">
+<interface name="corenet_dontaudit_send_svn_client_packets" lineno="82454">
<summary>
Do not audit attempts to send svn_client packets.
</summary>
@@ -61464,7 +61510,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_svn_client_packets" lineno="86665">
+<interface name="corenet_receive_svn_client_packets" lineno="82473">
<summary>
Receive svn_client packets.
</summary>
@@ -61475,7 +61521,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="86684">
+<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="82492">
<summary>
Do not audit attempts to receive svn_client packets.
</summary>
@@ -61486,7 +61532,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_svn_client_packets" lineno="86703">
+<interface name="corenet_sendrecv_svn_client_packets" lineno="82511">
<summary>
Send and receive svn_client packets.
</summary>
@@ -61497,7 +61543,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="86719">
+<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="82527">
<summary>
Do not audit attempts to send and receive svn_client packets.
</summary>
@@ -61508,7 +61554,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_svn_client_packets" lineno="86734">
+<interface name="corenet_relabelto_svn_client_packets" lineno="82542">
<summary>
Relabel packets to svn_client the packet type.
</summary>
@@ -61518,7 +61564,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_svn_server_packets" lineno="86754">
+<interface name="corenet_send_svn_server_packets" lineno="82562">
<summary>
Send svn_server packets.
</summary>
@@ -61529,7 +61575,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_svn_server_packets" lineno="86773">
+<interface name="corenet_dontaudit_send_svn_server_packets" lineno="82581">
<summary>
Do not audit attempts to send svn_server packets.
</summary>
@@ -61540,7 +61586,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_svn_server_packets" lineno="86792">
+<interface name="corenet_receive_svn_server_packets" lineno="82600">
<summary>
Receive svn_server packets.
</summary>
@@ -61551,7 +61597,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="86811">
+<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="82619">
<summary>
Do not audit attempts to receive svn_server packets.
</summary>
@@ -61562,7 +61608,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_svn_server_packets" lineno="86830">
+<interface name="corenet_sendrecv_svn_server_packets" lineno="82638">
<summary>
Send and receive svn_server packets.
</summary>
@@ -61573,7 +61619,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="86846">
+<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="82654">
<summary>
Do not audit attempts to send and receive svn_server packets.
</summary>
@@ -61584,7 +61630,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_svn_server_packets" lineno="86861">
+<interface name="corenet_relabelto_svn_server_packets" lineno="82669">
<summary>
Relabel packets to svn_server the packet type.
</summary>
@@ -61594,7 +61640,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="86883">
+<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="82691">
<summary>
Send and receive TCP traffic on the svrloc port.
</summary>
@@ -61605,7 +61651,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_svrloc_port" lineno="86902">
+<interface name="corenet_udp_send_svrloc_port" lineno="82706">
<summary>
Send UDP traffic on the svrloc port.
</summary>
@@ -61616,7 +61662,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="86921">
+<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="82721">
<summary>
Do not audit attempts to send UDP traffic on the svrloc port.
</summary>
@@ -61627,7 +61673,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_svrloc_port" lineno="86940">
+<interface name="corenet_udp_receive_svrloc_port" lineno="82736">
<summary>
Receive UDP traffic on the svrloc port.
</summary>
@@ -61638,7 +61684,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="86959">
+<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="82751">
<summary>
Do not audit attempts to receive UDP traffic on the svrloc port.
</summary>
@@ -61649,7 +61695,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_svrloc_port" lineno="86978">
+<interface name="corenet_udp_sendrecv_svrloc_port" lineno="82766">
<summary>
Send and receive UDP traffic on the svrloc port.
</summary>
@@ -61660,7 +61706,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="86995">
+<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="82782">
<summary>
Do not audit attempts to send and receive
UDP traffic on the svrloc port.
@@ -61672,7 +61718,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_svrloc_port" lineno="87011">
+<interface name="corenet_tcp_bind_svrloc_port" lineno="82797">
<summary>
Bind TCP sockets to the svrloc port.
</summary>
@@ -61683,7 +61729,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_svrloc_port" lineno="87031">
+<interface name="corenet_udp_bind_svrloc_port" lineno="82817">
<summary>
Bind UDP sockets to the svrloc port.
</summary>
@@ -61694,7 +61740,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_svrloc_port" lineno="87050">
+<interface name="corenet_tcp_connect_svrloc_port" lineno="82836">
<summary>
Make a TCP connection to the svrloc port.
</summary>
@@ -61704,7 +61750,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_svrloc_client_packets" lineno="87070">
+<interface name="corenet_send_svrloc_client_packets" lineno="82856">
<summary>
Send svrloc_client packets.
</summary>
@@ -61715,7 +61761,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="87089">
+<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="82875">
<summary>
Do not audit attempts to send svrloc_client packets.
</summary>
@@ -61726,7 +61772,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_svrloc_client_packets" lineno="87108">
+<interface name="corenet_receive_svrloc_client_packets" lineno="82894">
<summary>
Receive svrloc_client packets.
</summary>
@@ -61737,7 +61783,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="87127">
+<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="82913">
<summary>
Do not audit attempts to receive svrloc_client packets.
</summary>
@@ -61748,7 +61794,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_svrloc_client_packets" lineno="87146">
+<interface name="corenet_sendrecv_svrloc_client_packets" lineno="82932">
<summary>
Send and receive svrloc_client packets.
</summary>
@@ -61759,7 +61805,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="87162">
+<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="82948">
<summary>
Do not audit attempts to send and receive svrloc_client packets.
</summary>
@@ -61770,7 +61816,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_svrloc_client_packets" lineno="87177">
+<interface name="corenet_relabelto_svrloc_client_packets" lineno="82963">
<summary>
Relabel packets to svrloc_client the packet type.
</summary>
@@ -61780,7 +61826,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_svrloc_server_packets" lineno="87197">
+<interface name="corenet_send_svrloc_server_packets" lineno="82983">
<summary>
Send svrloc_server packets.
</summary>
@@ -61791,7 +61837,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="87216">
+<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="83002">
<summary>
Do not audit attempts to send svrloc_server packets.
</summary>
@@ -61802,7 +61848,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_svrloc_server_packets" lineno="87235">
+<interface name="corenet_receive_svrloc_server_packets" lineno="83021">
<summary>
Receive svrloc_server packets.
</summary>
@@ -61813,7 +61859,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="87254">
+<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="83040">
<summary>
Do not audit attempts to receive svrloc_server packets.
</summary>
@@ -61824,7 +61870,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_svrloc_server_packets" lineno="87273">
+<interface name="corenet_sendrecv_svrloc_server_packets" lineno="83059">
<summary>
Send and receive svrloc_server packets.
</summary>
@@ -61835,7 +61881,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="87289">
+<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="83075">
<summary>
Do not audit attempts to send and receive svrloc_server packets.
</summary>
@@ -61846,7 +61892,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_svrloc_server_packets" lineno="87304">
+<interface name="corenet_relabelto_svrloc_server_packets" lineno="83090">
<summary>
Relabel packets to svrloc_server the packet type.
</summary>
@@ -61856,7 +61902,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_swat_port" lineno="87326">
+<interface name="corenet_tcp_sendrecv_swat_port" lineno="83112">
<summary>
Send and receive TCP traffic on the swat port.
</summary>
@@ -61867,7 +61913,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_swat_port" lineno="87345">
+<interface name="corenet_udp_send_swat_port" lineno="83127">
<summary>
Send UDP traffic on the swat port.
</summary>
@@ -61878,7 +61924,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_swat_port" lineno="87364">
+<interface name="corenet_dontaudit_udp_send_swat_port" lineno="83142">
<summary>
Do not audit attempts to send UDP traffic on the swat port.
</summary>
@@ -61889,7 +61935,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_swat_port" lineno="87383">
+<interface name="corenet_udp_receive_swat_port" lineno="83157">
<summary>
Receive UDP traffic on the swat port.
</summary>
@@ -61900,7 +61946,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="87402">
+<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="83172">
<summary>
Do not audit attempts to receive UDP traffic on the swat port.
</summary>
@@ -61911,7 +61957,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_swat_port" lineno="87421">
+<interface name="corenet_udp_sendrecv_swat_port" lineno="83187">
<summary>
Send and receive UDP traffic on the swat port.
</summary>
@@ -61922,7 +61968,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="87438">
+<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="83203">
<summary>
Do not audit attempts to send and receive
UDP traffic on the swat port.
@@ -61934,7 +61980,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_swat_port" lineno="87454">
+<interface name="corenet_tcp_bind_swat_port" lineno="83218">
<summary>
Bind TCP sockets to the swat port.
</summary>
@@ -61945,7 +61991,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_swat_port" lineno="87474">
+<interface name="corenet_udp_bind_swat_port" lineno="83238">
<summary>
Bind UDP sockets to the swat port.
</summary>
@@ -61956,7 +62002,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_swat_port" lineno="87493">
+<interface name="corenet_tcp_connect_swat_port" lineno="83257">
<summary>
Make a TCP connection to the swat port.
</summary>
@@ -61966,7 +62012,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_swat_client_packets" lineno="87513">
+<interface name="corenet_send_swat_client_packets" lineno="83277">
<summary>
Send swat_client packets.
</summary>
@@ -61977,7 +62023,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_swat_client_packets" lineno="87532">
+<interface name="corenet_dontaudit_send_swat_client_packets" lineno="83296">
<summary>
Do not audit attempts to send swat_client packets.
</summary>
@@ -61988,7 +62034,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_swat_client_packets" lineno="87551">
+<interface name="corenet_receive_swat_client_packets" lineno="83315">
<summary>
Receive swat_client packets.
</summary>
@@ -61999,7 +62045,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="87570">
+<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="83334">
<summary>
Do not audit attempts to receive swat_client packets.
</summary>
@@ -62010,7 +62056,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_swat_client_packets" lineno="87589">
+<interface name="corenet_sendrecv_swat_client_packets" lineno="83353">
<summary>
Send and receive swat_client packets.
</summary>
@@ -62021,7 +62067,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="87605">
+<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="83369">
<summary>
Do not audit attempts to send and receive swat_client packets.
</summary>
@@ -62032,7 +62078,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_swat_client_packets" lineno="87620">
+<interface name="corenet_relabelto_swat_client_packets" lineno="83384">
<summary>
Relabel packets to swat_client the packet type.
</summary>
@@ -62042,7 +62088,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_swat_server_packets" lineno="87640">
+<interface name="corenet_send_swat_server_packets" lineno="83404">
<summary>
Send swat_server packets.
</summary>
@@ -62053,7 +62099,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_swat_server_packets" lineno="87659">
+<interface name="corenet_dontaudit_send_swat_server_packets" lineno="83423">
<summary>
Do not audit attempts to send swat_server packets.
</summary>
@@ -62064,7 +62110,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_swat_server_packets" lineno="87678">
+<interface name="corenet_receive_swat_server_packets" lineno="83442">
<summary>
Receive swat_server packets.
</summary>
@@ -62075,7 +62121,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="87697">
+<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="83461">
<summary>
Do not audit attempts to receive swat_server packets.
</summary>
@@ -62086,7 +62132,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_swat_server_packets" lineno="87716">
+<interface name="corenet_sendrecv_swat_server_packets" lineno="83480">
<summary>
Send and receive swat_server packets.
</summary>
@@ -62097,7 +62143,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="87732">
+<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="83496">
<summary>
Do not audit attempts to send and receive swat_server packets.
</summary>
@@ -62108,7 +62154,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_swat_server_packets" lineno="87747">
+<interface name="corenet_relabelto_swat_server_packets" lineno="83511">
<summary>
Relabel packets to swat_server the packet type.
</summary>
@@ -62118,7 +62164,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="87769">
+<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="83533">
<summary>
Send and receive TCP traffic on the syncthing port.
</summary>
@@ -62129,7 +62175,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_syncthing_port" lineno="87788">
+<interface name="corenet_udp_send_syncthing_port" lineno="83548">
<summary>
Send UDP traffic on the syncthing port.
</summary>
@@ -62140,7 +62186,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="87807">
+<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="83563">
<summary>
Do not audit attempts to send UDP traffic on the syncthing port.
</summary>
@@ -62151,7 +62197,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_syncthing_port" lineno="87826">
+<interface name="corenet_udp_receive_syncthing_port" lineno="83578">
<summary>
Receive UDP traffic on the syncthing port.
</summary>
@@ -62162,7 +62208,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="87845">
+<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="83593">
<summary>
Do not audit attempts to receive UDP traffic on the syncthing port.
</summary>
@@ -62173,7 +62219,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_syncthing_port" lineno="87864">
+<interface name="corenet_udp_sendrecv_syncthing_port" lineno="83608">
<summary>
Send and receive UDP traffic on the syncthing port.
</summary>
@@ -62184,7 +62230,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="87881">
+<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="83624">
<summary>
Do not audit attempts to send and receive
UDP traffic on the syncthing port.
@@ -62196,7 +62242,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_syncthing_port" lineno="87897">
+<interface name="corenet_tcp_bind_syncthing_port" lineno="83639">
<summary>
Bind TCP sockets to the syncthing port.
</summary>
@@ -62207,7 +62253,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_syncthing_port" lineno="87917">
+<interface name="corenet_udp_bind_syncthing_port" lineno="83659">
<summary>
Bind UDP sockets to the syncthing port.
</summary>
@@ -62218,7 +62264,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_syncthing_port" lineno="87936">
+<interface name="corenet_tcp_connect_syncthing_port" lineno="83678">
<summary>
Make a TCP connection to the syncthing port.
</summary>
@@ -62228,7 +62274,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_client_packets" lineno="87956">
+<interface name="corenet_send_syncthing_client_packets" lineno="83698">
<summary>
Send syncthing_client packets.
</summary>
@@ -62239,7 +62285,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="87975">
+<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="83717">
<summary>
Do not audit attempts to send syncthing_client packets.
</summary>
@@ -62250,7 +62296,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_client_packets" lineno="87994">
+<interface name="corenet_receive_syncthing_client_packets" lineno="83736">
<summary>
Receive syncthing_client packets.
</summary>
@@ -62261,7 +62307,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="88013">
+<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="83755">
<summary>
Do not audit attempts to receive syncthing_client packets.
</summary>
@@ -62272,7 +62318,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_client_packets" lineno="88032">
+<interface name="corenet_sendrecv_syncthing_client_packets" lineno="83774">
<summary>
Send and receive syncthing_client packets.
</summary>
@@ -62283,7 +62329,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="88048">
+<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="83790">
<summary>
Do not audit attempts to send and receive syncthing_client packets.
</summary>
@@ -62294,7 +62340,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_client_packets" lineno="88063">
+<interface name="corenet_relabelto_syncthing_client_packets" lineno="83805">
<summary>
Relabel packets to syncthing_client the packet type.
</summary>
@@ -62304,7 +62350,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_server_packets" lineno="88083">
+<interface name="corenet_send_syncthing_server_packets" lineno="83825">
<summary>
Send syncthing_server packets.
</summary>
@@ -62315,7 +62361,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="88102">
+<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="83844">
<summary>
Do not audit attempts to send syncthing_server packets.
</summary>
@@ -62326,7 +62372,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_server_packets" lineno="88121">
+<interface name="corenet_receive_syncthing_server_packets" lineno="83863">
<summary>
Receive syncthing_server packets.
</summary>
@@ -62337,7 +62383,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="88140">
+<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="83882">
<summary>
Do not audit attempts to receive syncthing_server packets.
</summary>
@@ -62348,7 +62394,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_server_packets" lineno="88159">
+<interface name="corenet_sendrecv_syncthing_server_packets" lineno="83901">
<summary>
Send and receive syncthing_server packets.
</summary>
@@ -62359,7 +62405,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="88175">
+<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="83917">
<summary>
Do not audit attempts to send and receive syncthing_server packets.
</summary>
@@ -62370,7 +62416,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_server_packets" lineno="88190">
+<interface name="corenet_relabelto_syncthing_server_packets" lineno="83932">
<summary>
Relabel packets to syncthing_server the packet type.
</summary>
@@ -62380,7 +62426,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="88212">
+<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="83954">
<summary>
Send and receive TCP traffic on the syncthing_admin port.
</summary>
@@ -62391,7 +62437,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_syncthing_admin_port" lineno="88231">
+<interface name="corenet_udp_send_syncthing_admin_port" lineno="83969">
<summary>
Send UDP traffic on the syncthing_admin port.
</summary>
@@ -62402,7 +62448,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="88250">
+<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="83984">
<summary>
Do not audit attempts to send UDP traffic on the syncthing_admin port.
</summary>
@@ -62413,7 +62459,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_syncthing_admin_port" lineno="88269">
+<interface name="corenet_udp_receive_syncthing_admin_port" lineno="83999">
<summary>
Receive UDP traffic on the syncthing_admin port.
</summary>
@@ -62424,7 +62470,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="88288">
+<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="84014">
<summary>
Do not audit attempts to receive UDP traffic on the syncthing_admin port.
</summary>
@@ -62435,7 +62481,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="88307">
+<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="84029">
<summary>
Send and receive UDP traffic on the syncthing_admin port.
</summary>
@@ -62446,7 +62492,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="88324">
+<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="84045">
<summary>
Do not audit attempts to send and receive
UDP traffic on the syncthing_admin port.
@@ -62458,7 +62504,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="88340">
+<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="84060">
<summary>
Bind TCP sockets to the syncthing_admin port.
</summary>
@@ -62469,7 +62515,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_syncthing_admin_port" lineno="88360">
+<interface name="corenet_udp_bind_syncthing_admin_port" lineno="84080">
<summary>
Bind UDP sockets to the syncthing_admin port.
</summary>
@@ -62480,7 +62526,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="88379">
+<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="84099">
<summary>
Make a TCP connection to the syncthing_admin port.
</summary>
@@ -62490,7 +62536,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_admin_client_packets" lineno="88399">
+<interface name="corenet_send_syncthing_admin_client_packets" lineno="84119">
<summary>
Send syncthing_admin_client packets.
</summary>
@@ -62501,7 +62547,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="88418">
+<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="84138">
<summary>
Do not audit attempts to send syncthing_admin_client packets.
</summary>
@@ -62512,7 +62558,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_admin_client_packets" lineno="88437">
+<interface name="corenet_receive_syncthing_admin_client_packets" lineno="84157">
<summary>
Receive syncthing_admin_client packets.
</summary>
@@ -62523,7 +62569,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="88456">
+<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="84176">
<summary>
Do not audit attempts to receive syncthing_admin_client packets.
</summary>
@@ -62534,7 +62580,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="88475">
+<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="84195">
<summary>
Send and receive syncthing_admin_client packets.
</summary>
@@ -62545,7 +62591,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="88491">
+<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="84211">
<summary>
Do not audit attempts to send and receive syncthing_admin_client packets.
</summary>
@@ -62556,7 +62602,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="88506">
+<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="84226">
<summary>
Relabel packets to syncthing_admin_client the packet type.
</summary>
@@ -62566,7 +62612,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_admin_server_packets" lineno="88526">
+<interface name="corenet_send_syncthing_admin_server_packets" lineno="84246">
<summary>
Send syncthing_admin_server packets.
</summary>
@@ -62577,7 +62623,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="88545">
+<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="84265">
<summary>
Do not audit attempts to send syncthing_admin_server packets.
</summary>
@@ -62588,7 +62634,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_admin_server_packets" lineno="88564">
+<interface name="corenet_receive_syncthing_admin_server_packets" lineno="84284">
<summary>
Receive syncthing_admin_server packets.
</summary>
@@ -62599,7 +62645,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="88583">
+<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="84303">
<summary>
Do not audit attempts to receive syncthing_admin_server packets.
</summary>
@@ -62610,7 +62656,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="88602">
+<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="84322">
<summary>
Send and receive syncthing_admin_server packets.
</summary>
@@ -62621,7 +62667,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="88618">
+<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="84338">
<summary>
Do not audit attempts to send and receive syncthing_admin_server packets.
</summary>
@@ -62632,7 +62678,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="88633">
+<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="84353">
<summary>
Relabel packets to syncthing_admin_server the packet type.
</summary>
@@ -62642,7 +62688,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="88655">
+<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="84375">
<summary>
Send and receive TCP traffic on the syncthing_discovery port.
</summary>
@@ -62653,7 +62699,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_syncthing_discovery_port" lineno="88674">
+<interface name="corenet_udp_send_syncthing_discovery_port" lineno="84390">
<summary>
Send UDP traffic on the syncthing_discovery port.
</summary>
@@ -62664,7 +62710,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="88693">
+<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="84405">
<summary>
Do not audit attempts to send UDP traffic on the syncthing_discovery port.
</summary>
@@ -62675,7 +62721,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="88712">
+<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="84420">
<summary>
Receive UDP traffic on the syncthing_discovery port.
</summary>
@@ -62686,7 +62732,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="88731">
+<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="84435">
<summary>
Do not audit attempts to receive UDP traffic on the syncthing_discovery port.
</summary>
@@ -62697,7 +62743,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="88750">
+<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="84450">
<summary>
Send and receive UDP traffic on the syncthing_discovery port.
</summary>
@@ -62708,7 +62754,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="88767">
+<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="84466">
<summary>
Do not audit attempts to send and receive
UDP traffic on the syncthing_discovery port.
@@ -62720,7 +62766,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="88783">
+<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="84481">
<summary>
Bind TCP sockets to the syncthing_discovery port.
</summary>
@@ -62731,7 +62777,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="88803">
+<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="84501">
<summary>
Bind UDP sockets to the syncthing_discovery port.
</summary>
@@ -62742,7 +62788,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="88822">
+<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="84520">
<summary>
Make a TCP connection to the syncthing_discovery port.
</summary>
@@ -62752,7 +62798,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_discovery_client_packets" lineno="88842">
+<interface name="corenet_send_syncthing_discovery_client_packets" lineno="84540">
<summary>
Send syncthing_discovery_client packets.
</summary>
@@ -62763,7 +62809,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="88861">
+<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="84559">
<summary>
Do not audit attempts to send syncthing_discovery_client packets.
</summary>
@@ -62774,7 +62820,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="88880">
+<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="84578">
<summary>
Receive syncthing_discovery_client packets.
</summary>
@@ -62785,7 +62831,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="88899">
+<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="84597">
<summary>
Do not audit attempts to receive syncthing_discovery_client packets.
</summary>
@@ -62796,7 +62842,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="88918">
+<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="84616">
<summary>
Send and receive syncthing_discovery_client packets.
</summary>
@@ -62807,7 +62853,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="88934">
+<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="84632">
<summary>
Do not audit attempts to send and receive syncthing_discovery_client packets.
</summary>
@@ -62818,7 +62864,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="88949">
+<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="84647">
<summary>
Relabel packets to syncthing_discovery_client the packet type.
</summary>
@@ -62828,7 +62874,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syncthing_discovery_server_packets" lineno="88969">
+<interface name="corenet_send_syncthing_discovery_server_packets" lineno="84667">
<summary>
Send syncthing_discovery_server packets.
</summary>
@@ -62839,7 +62885,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="88988">
+<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="84686">
<summary>
Do not audit attempts to send syncthing_discovery_server packets.
</summary>
@@ -62850,7 +62896,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="89007">
+<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="84705">
<summary>
Receive syncthing_discovery_server packets.
</summary>
@@ -62861,7 +62907,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="89026">
+<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="84724">
<summary>
Do not audit attempts to receive syncthing_discovery_server packets.
</summary>
@@ -62872,7 +62918,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="89045">
+<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="84743">
<summary>
Send and receive syncthing_discovery_server packets.
</summary>
@@ -62883,7 +62929,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="89061">
+<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="84759">
<summary>
Do not audit attempts to send and receive syncthing_discovery_server packets.
</summary>
@@ -62894,7 +62940,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="89076">
+<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="84774">
<summary>
Relabel packets to syncthing_discovery_server the packet type.
</summary>
@@ -62904,7 +62950,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="89098">
+<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="84796">
<summary>
Send and receive TCP traffic on the sype_transport port.
</summary>
@@ -62915,7 +62961,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_sype_transport_port" lineno="89117">
+<interface name="corenet_udp_send_sype_transport_port" lineno="84811">
<summary>
Send UDP traffic on the sype_transport port.
</summary>
@@ -62926,7 +62972,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="89136">
+<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="84826">
<summary>
Do not audit attempts to send UDP traffic on the sype_transport port.
</summary>
@@ -62937,7 +62983,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_sype_transport_port" lineno="89155">
+<interface name="corenet_udp_receive_sype_transport_port" lineno="84841">
<summary>
Receive UDP traffic on the sype_transport port.
</summary>
@@ -62948,7 +62994,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="89174">
+<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="84856">
<summary>
Do not audit attempts to receive UDP traffic on the sype_transport port.
</summary>
@@ -62959,7 +63005,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="89193">
+<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="84871">
<summary>
Send and receive UDP traffic on the sype_transport port.
</summary>
@@ -62970,7 +63016,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="89210">
+<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="84887">
<summary>
Do not audit attempts to send and receive
UDP traffic on the sype_transport port.
@@ -62982,7 +63028,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_sype_transport_port" lineno="89226">
+<interface name="corenet_tcp_bind_sype_transport_port" lineno="84902">
<summary>
Bind TCP sockets to the sype_transport port.
</summary>
@@ -62993,7 +63039,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_sype_transport_port" lineno="89246">
+<interface name="corenet_udp_bind_sype_transport_port" lineno="84922">
<summary>
Bind UDP sockets to the sype_transport port.
</summary>
@@ -63004,7 +63050,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_sype_transport_port" lineno="89265">
+<interface name="corenet_tcp_connect_sype_transport_port" lineno="84941">
<summary>
Make a TCP connection to the sype_transport port.
</summary>
@@ -63014,7 +63060,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sype_transport_client_packets" lineno="89285">
+<interface name="corenet_send_sype_transport_client_packets" lineno="84961">
<summary>
Send sype_transport_client packets.
</summary>
@@ -63025,7 +63071,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="89304">
+<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="84980">
<summary>
Do not audit attempts to send sype_transport_client packets.
</summary>
@@ -63036,7 +63082,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sype_transport_client_packets" lineno="89323">
+<interface name="corenet_receive_sype_transport_client_packets" lineno="84999">
<summary>
Receive sype_transport_client packets.
</summary>
@@ -63047,7 +63093,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="89342">
+<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="85018">
<summary>
Do not audit attempts to receive sype_transport_client packets.
</summary>
@@ -63058,7 +63104,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="89361">
+<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="85037">
<summary>
Send and receive sype_transport_client packets.
</summary>
@@ -63069,7 +63115,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="89377">
+<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="85053">
<summary>
Do not audit attempts to send and receive sype_transport_client packets.
</summary>
@@ -63080,7 +63126,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sype_transport_client_packets" lineno="89392">
+<interface name="corenet_relabelto_sype_transport_client_packets" lineno="85068">
<summary>
Relabel packets to sype_transport_client the packet type.
</summary>
@@ -63090,7 +63136,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_sype_transport_server_packets" lineno="89412">
+<interface name="corenet_send_sype_transport_server_packets" lineno="85088">
<summary>
Send sype_transport_server packets.
</summary>
@@ -63101,7 +63147,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="89431">
+<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="85107">
<summary>
Do not audit attempts to send sype_transport_server packets.
</summary>
@@ -63112,7 +63158,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_sype_transport_server_packets" lineno="89450">
+<interface name="corenet_receive_sype_transport_server_packets" lineno="85126">
<summary>
Receive sype_transport_server packets.
</summary>
@@ -63123,7 +63169,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="89469">
+<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="85145">
<summary>
Do not audit attempts to receive sype_transport_server packets.
</summary>
@@ -63134,7 +63180,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="89488">
+<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="85164">
<summary>
Send and receive sype_transport_server packets.
</summary>
@@ -63145,7 +63191,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="89504">
+<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="85180">
<summary>
Do not audit attempts to send and receive sype_transport_server packets.
</summary>
@@ -63156,7 +63202,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_sype_transport_server_packets" lineno="89519">
+<interface name="corenet_relabelto_sype_transport_server_packets" lineno="85195">
<summary>
Relabel packets to sype_transport_server the packet type.
</summary>
@@ -63166,7 +63212,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="89541">
+<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85217">
<summary>
Send and receive TCP traffic on the syslogd port.
</summary>
@@ -63177,7 +63223,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_syslogd_port" lineno="89560">
+<interface name="corenet_udp_send_syslogd_port" lineno="85232">
<summary>
Send UDP traffic on the syslogd port.
</summary>
@@ -63188,7 +63234,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="89579">
+<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85247">
<summary>
Do not audit attempts to send UDP traffic on the syslogd port.
</summary>
@@ -63199,7 +63245,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_syslogd_port" lineno="89598">
+<interface name="corenet_udp_receive_syslogd_port" lineno="85262">
<summary>
Receive UDP traffic on the syslogd port.
</summary>
@@ -63210,7 +63256,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="89617">
+<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85277">
<summary>
Do not audit attempts to receive UDP traffic on the syslogd port.
</summary>
@@ -63221,7 +63267,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_syslogd_port" lineno="89636">
+<interface name="corenet_udp_sendrecv_syslogd_port" lineno="85292">
<summary>
Send and receive UDP traffic on the syslogd port.
</summary>
@@ -63232,7 +63278,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="89653">
+<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85308">
<summary>
Do not audit attempts to send and receive
UDP traffic on the syslogd port.
@@ -63244,7 +63290,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_syslogd_port" lineno="89669">
+<interface name="corenet_tcp_bind_syslogd_port" lineno="85323">
<summary>
Bind TCP sockets to the syslogd port.
</summary>
@@ -63255,7 +63301,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_syslogd_port" lineno="89689">
+<interface name="corenet_udp_bind_syslogd_port" lineno="85343">
<summary>
Bind UDP sockets to the syslogd port.
</summary>
@@ -63266,7 +63312,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_syslogd_port" lineno="89708">
+<interface name="corenet_tcp_connect_syslogd_port" lineno="85362">
<summary>
Make a TCP connection to the syslogd port.
</summary>
@@ -63276,7 +63322,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syslogd_client_packets" lineno="89728">
+<interface name="corenet_send_syslogd_client_packets" lineno="85382">
<summary>
Send syslogd_client packets.
</summary>
@@ -63287,7 +63333,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="89747">
+<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85401">
<summary>
Do not audit attempts to send syslogd_client packets.
</summary>
@@ -63298,7 +63344,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syslogd_client_packets" lineno="89766">
+<interface name="corenet_receive_syslogd_client_packets" lineno="85420">
<summary>
Receive syslogd_client packets.
</summary>
@@ -63309,7 +63355,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="89785">
+<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="85439">
<summary>
Do not audit attempts to receive syslogd_client packets.
</summary>
@@ -63320,7 +63366,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syslogd_client_packets" lineno="89804">
+<interface name="corenet_sendrecv_syslogd_client_packets" lineno="85458">
<summary>
Send and receive syslogd_client packets.
</summary>
@@ -63331,7 +63377,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="89820">
+<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="85474">
<summary>
Do not audit attempts to send and receive syslogd_client packets.
</summary>
@@ -63342,7 +63388,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syslogd_client_packets" lineno="89835">
+<interface name="corenet_relabelto_syslogd_client_packets" lineno="85489">
<summary>
Relabel packets to syslogd_client the packet type.
</summary>
@@ -63352,7 +63398,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syslogd_server_packets" lineno="89855">
+<interface name="corenet_send_syslogd_server_packets" lineno="85509">
<summary>
Send syslogd_server packets.
</summary>
@@ -63363,7 +63409,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="89874">
+<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="85528">
<summary>
Do not audit attempts to send syslogd_server packets.
</summary>
@@ -63374,7 +63420,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syslogd_server_packets" lineno="89893">
+<interface name="corenet_receive_syslogd_server_packets" lineno="85547">
<summary>
Receive syslogd_server packets.
</summary>
@@ -63385,7 +63431,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="89912">
+<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="85566">
<summary>
Do not audit attempts to receive syslogd_server packets.
</summary>
@@ -63396,7 +63442,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syslogd_server_packets" lineno="89931">
+<interface name="corenet_sendrecv_syslogd_server_packets" lineno="85585">
<summary>
Send and receive syslogd_server packets.
</summary>
@@ -63407,7 +63453,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="89947">
+<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="85601">
<summary>
Do not audit attempts to send and receive syslogd_server packets.
</summary>
@@ -63418,7 +63464,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syslogd_server_packets" lineno="89962">
+<interface name="corenet_relabelto_syslogd_server_packets" lineno="85616">
<summary>
Relabel packets to syslogd_server the packet type.
</summary>
@@ -63428,7 +63474,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="89984">
+<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="85638">
<summary>
Send and receive TCP traffic on the syslog_tls port.
</summary>
@@ -63439,7 +63485,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_syslog_tls_port" lineno="90003">
+<interface name="corenet_udp_send_syslog_tls_port" lineno="85653">
<summary>
Send UDP traffic on the syslog_tls port.
</summary>
@@ -63450,7 +63496,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="90022">
+<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="85668">
<summary>
Do not audit attempts to send UDP traffic on the syslog_tls port.
</summary>
@@ -63461,7 +63507,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_syslog_tls_port" lineno="90041">
+<interface name="corenet_udp_receive_syslog_tls_port" lineno="85683">
<summary>
Receive UDP traffic on the syslog_tls port.
</summary>
@@ -63472,7 +63518,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="90060">
+<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="85698">
<summary>
Do not audit attempts to receive UDP traffic on the syslog_tls port.
</summary>
@@ -63483,7 +63529,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="90079">
+<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="85713">
<summary>
Send and receive UDP traffic on the syslog_tls port.
</summary>
@@ -63494,7 +63540,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="90096">
+<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="85729">
<summary>
Do not audit attempts to send and receive
UDP traffic on the syslog_tls port.
@@ -63506,7 +63552,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_syslog_tls_port" lineno="90112">
+<interface name="corenet_tcp_bind_syslog_tls_port" lineno="85744">
<summary>
Bind TCP sockets to the syslog_tls port.
</summary>
@@ -63517,7 +63563,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_syslog_tls_port" lineno="90132">
+<interface name="corenet_udp_bind_syslog_tls_port" lineno="85764">
<summary>
Bind UDP sockets to the syslog_tls port.
</summary>
@@ -63528,7 +63574,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_syslog_tls_port" lineno="90151">
+<interface name="corenet_tcp_connect_syslog_tls_port" lineno="85783">
<summary>
Make a TCP connection to the syslog_tls port.
</summary>
@@ -63538,7 +63584,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syslog_tls_client_packets" lineno="90171">
+<interface name="corenet_send_syslog_tls_client_packets" lineno="85803">
<summary>
Send syslog_tls_client packets.
</summary>
@@ -63549,7 +63595,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="90190">
+<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="85822">
<summary>
Do not audit attempts to send syslog_tls_client packets.
</summary>
@@ -63560,7 +63606,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syslog_tls_client_packets" lineno="90209">
+<interface name="corenet_receive_syslog_tls_client_packets" lineno="85841">
<summary>
Receive syslog_tls_client packets.
</summary>
@@ -63571,7 +63617,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="90228">
+<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="85860">
<summary>
Do not audit attempts to receive syslog_tls_client packets.
</summary>
@@ -63582,7 +63628,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="90247">
+<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="85879">
<summary>
Send and receive syslog_tls_client packets.
</summary>
@@ -63593,7 +63639,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="90263">
+<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="85895">
<summary>
Do not audit attempts to send and receive syslog_tls_client packets.
</summary>
@@ -63604,7 +63650,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="90278">
+<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="85910">
<summary>
Relabel packets to syslog_tls_client the packet type.
</summary>
@@ -63614,7 +63660,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_syslog_tls_server_packets" lineno="90298">
+<interface name="corenet_send_syslog_tls_server_packets" lineno="85930">
<summary>
Send syslog_tls_server packets.
</summary>
@@ -63625,7 +63671,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="90317">
+<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="85949">
<summary>
Do not audit attempts to send syslog_tls_server packets.
</summary>
@@ -63636,7 +63682,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_syslog_tls_server_packets" lineno="90336">
+<interface name="corenet_receive_syslog_tls_server_packets" lineno="85968">
<summary>
Receive syslog_tls_server packets.
</summary>
@@ -63647,7 +63693,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="90355">
+<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="85987">
<summary>
Do not audit attempts to receive syslog_tls_server packets.
</summary>
@@ -63658,7 +63704,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="90374">
+<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="86006">
<summary>
Send and receive syslog_tls_server packets.
</summary>
@@ -63669,7 +63715,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="90390">
+<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="86022">
<summary>
Do not audit attempts to send and receive syslog_tls_server packets.
</summary>
@@ -63680,7 +63726,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="90405">
+<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="86037">
<summary>
Relabel packets to syslog_tls_server the packet type.
</summary>
@@ -63690,7 +63736,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_tcs_port" lineno="90427">
+<interface name="corenet_tcp_sendrecv_tcs_port" lineno="86059">
<summary>
Send and receive TCP traffic on the tcs port.
</summary>
@@ -63701,7 +63747,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_tcs_port" lineno="90446">
+<interface name="corenet_udp_send_tcs_port" lineno="86074">
<summary>
Send UDP traffic on the tcs port.
</summary>
@@ -63712,7 +63758,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="90465">
+<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="86089">
<summary>
Do not audit attempts to send UDP traffic on the tcs port.
</summary>
@@ -63723,7 +63769,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_tcs_port" lineno="90484">
+<interface name="corenet_udp_receive_tcs_port" lineno="86104">
<summary>
Receive UDP traffic on the tcs port.
</summary>
@@ -63734,7 +63780,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="90503">
+<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="86119">
<summary>
Do not audit attempts to receive UDP traffic on the tcs port.
</summary>
@@ -63745,7 +63791,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_tcs_port" lineno="90522">
+<interface name="corenet_udp_sendrecv_tcs_port" lineno="86134">
<summary>
Send and receive UDP traffic on the tcs port.
</summary>
@@ -63756,7 +63802,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="90539">
+<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="86150">
<summary>
Do not audit attempts to send and receive
UDP traffic on the tcs port.
@@ -63768,7 +63814,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_tcs_port" lineno="90555">
+<interface name="corenet_tcp_bind_tcs_port" lineno="86165">
<summary>
Bind TCP sockets to the tcs port.
</summary>
@@ -63779,7 +63825,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_tcs_port" lineno="90575">
+<interface name="corenet_udp_bind_tcs_port" lineno="86185">
<summary>
Bind UDP sockets to the tcs port.
</summary>
@@ -63790,7 +63836,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_tcs_port" lineno="90594">
+<interface name="corenet_tcp_connect_tcs_port" lineno="86204">
<summary>
Make a TCP connection to the tcs port.
</summary>
@@ -63800,7 +63846,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tcs_client_packets" lineno="90614">
+<interface name="corenet_send_tcs_client_packets" lineno="86224">
<summary>
Send tcs_client packets.
</summary>
@@ -63811,7 +63857,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="90633">
+<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="86243">
<summary>
Do not audit attempts to send tcs_client packets.
</summary>
@@ -63822,7 +63868,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tcs_client_packets" lineno="90652">
+<interface name="corenet_receive_tcs_client_packets" lineno="86262">
<summary>
Receive tcs_client packets.
</summary>
@@ -63833,7 +63879,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="90671">
+<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="86281">
<summary>
Do not audit attempts to receive tcs_client packets.
</summary>
@@ -63844,7 +63890,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tcs_client_packets" lineno="90690">
+<interface name="corenet_sendrecv_tcs_client_packets" lineno="86300">
<summary>
Send and receive tcs_client packets.
</summary>
@@ -63855,7 +63901,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="90706">
+<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="86316">
<summary>
Do not audit attempts to send and receive tcs_client packets.
</summary>
@@ -63866,7 +63912,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tcs_client_packets" lineno="90721">
+<interface name="corenet_relabelto_tcs_client_packets" lineno="86331">
<summary>
Relabel packets to tcs_client the packet type.
</summary>
@@ -63876,7 +63922,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tcs_server_packets" lineno="90741">
+<interface name="corenet_send_tcs_server_packets" lineno="86351">
<summary>
Send tcs_server packets.
</summary>
@@ -63887,7 +63933,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="90760">
+<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="86370">
<summary>
Do not audit attempts to send tcs_server packets.
</summary>
@@ -63898,7 +63944,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tcs_server_packets" lineno="90779">
+<interface name="corenet_receive_tcs_server_packets" lineno="86389">
<summary>
Receive tcs_server packets.
</summary>
@@ -63909,7 +63955,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="90798">
+<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="86408">
<summary>
Do not audit attempts to receive tcs_server packets.
</summary>
@@ -63920,7 +63966,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tcs_server_packets" lineno="90817">
+<interface name="corenet_sendrecv_tcs_server_packets" lineno="86427">
<summary>
Send and receive tcs_server packets.
</summary>
@@ -63931,7 +63977,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="90833">
+<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="86443">
<summary>
Do not audit attempts to send and receive tcs_server packets.
</summary>
@@ -63942,7 +63988,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tcs_server_packets" lineno="90848">
+<interface name="corenet_relabelto_tcs_server_packets" lineno="86458">
<summary>
Relabel packets to tcs_server the packet type.
</summary>
@@ -63952,7 +63998,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="90870">
+<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="86480">
<summary>
Send and receive TCP traffic on the telnetd port.
</summary>
@@ -63963,7 +64009,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_telnetd_port" lineno="90889">
+<interface name="corenet_udp_send_telnetd_port" lineno="86495">
<summary>
Send UDP traffic on the telnetd port.
</summary>
@@ -63974,7 +64020,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="90908">
+<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="86510">
<summary>
Do not audit attempts to send UDP traffic on the telnetd port.
</summary>
@@ -63985,7 +64031,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_telnetd_port" lineno="90927">
+<interface name="corenet_udp_receive_telnetd_port" lineno="86525">
<summary>
Receive UDP traffic on the telnetd port.
</summary>
@@ -63996,7 +64042,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="90946">
+<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="86540">
<summary>
Do not audit attempts to receive UDP traffic on the telnetd port.
</summary>
@@ -64007,7 +64053,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_telnetd_port" lineno="90965">
+<interface name="corenet_udp_sendrecv_telnetd_port" lineno="86555">
<summary>
Send and receive UDP traffic on the telnetd port.
</summary>
@@ -64018,7 +64064,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="90982">
+<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="86571">
<summary>
Do not audit attempts to send and receive
UDP traffic on the telnetd port.
@@ -64030,7 +64076,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_telnetd_port" lineno="90998">
+<interface name="corenet_tcp_bind_telnetd_port" lineno="86586">
<summary>
Bind TCP sockets to the telnetd port.
</summary>
@@ -64041,7 +64087,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_telnetd_port" lineno="91018">
+<interface name="corenet_udp_bind_telnetd_port" lineno="86606">
<summary>
Bind UDP sockets to the telnetd port.
</summary>
@@ -64052,7 +64098,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_telnetd_port" lineno="91037">
+<interface name="corenet_tcp_connect_telnetd_port" lineno="86625">
<summary>
Make a TCP connection to the telnetd port.
</summary>
@@ -64062,7 +64108,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_telnetd_client_packets" lineno="91057">
+<interface name="corenet_send_telnetd_client_packets" lineno="86645">
<summary>
Send telnetd_client packets.
</summary>
@@ -64073,7 +64119,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="91076">
+<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="86664">
<summary>
Do not audit attempts to send telnetd_client packets.
</summary>
@@ -64084,7 +64130,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_telnetd_client_packets" lineno="91095">
+<interface name="corenet_receive_telnetd_client_packets" lineno="86683">
<summary>
Receive telnetd_client packets.
</summary>
@@ -64095,7 +64141,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="91114">
+<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="86702">
<summary>
Do not audit attempts to receive telnetd_client packets.
</summary>
@@ -64106,7 +64152,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_telnetd_client_packets" lineno="91133">
+<interface name="corenet_sendrecv_telnetd_client_packets" lineno="86721">
<summary>
Send and receive telnetd_client packets.
</summary>
@@ -64117,7 +64163,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="91149">
+<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="86737">
<summary>
Do not audit attempts to send and receive telnetd_client packets.
</summary>
@@ -64128,7 +64174,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_telnetd_client_packets" lineno="91164">
+<interface name="corenet_relabelto_telnetd_client_packets" lineno="86752">
<summary>
Relabel packets to telnetd_client the packet type.
</summary>
@@ -64138,7 +64184,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_telnetd_server_packets" lineno="91184">
+<interface name="corenet_send_telnetd_server_packets" lineno="86772">
<summary>
Send telnetd_server packets.
</summary>
@@ -64149,7 +64195,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="91203">
+<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="86791">
<summary>
Do not audit attempts to send telnetd_server packets.
</summary>
@@ -64160,7 +64206,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_telnetd_server_packets" lineno="91222">
+<interface name="corenet_receive_telnetd_server_packets" lineno="86810">
<summary>
Receive telnetd_server packets.
</summary>
@@ -64171,7 +64217,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="91241">
+<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="86829">
<summary>
Do not audit attempts to receive telnetd_server packets.
</summary>
@@ -64182,7 +64228,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_telnetd_server_packets" lineno="91260">
+<interface name="corenet_sendrecv_telnetd_server_packets" lineno="86848">
<summary>
Send and receive telnetd_server packets.
</summary>
@@ -64193,7 +64239,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="91276">
+<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="86864">
<summary>
Do not audit attempts to send and receive telnetd_server packets.
</summary>
@@ -64204,7 +64250,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_telnetd_server_packets" lineno="91291">
+<interface name="corenet_relabelto_telnetd_server_packets" lineno="86879">
<summary>
Relabel packets to telnetd_server the packet type.
</summary>
@@ -64214,7 +64260,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_tftp_port" lineno="91313">
+<interface name="corenet_tcp_sendrecv_tftp_port" lineno="86901">
<summary>
Send and receive TCP traffic on the tftp port.
</summary>
@@ -64225,7 +64271,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_tftp_port" lineno="91332">
+<interface name="corenet_udp_send_tftp_port" lineno="86916">
<summary>
Send UDP traffic on the tftp port.
</summary>
@@ -64236,7 +64282,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="91351">
+<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="86931">
<summary>
Do not audit attempts to send UDP traffic on the tftp port.
</summary>
@@ -64247,7 +64293,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_tftp_port" lineno="91370">
+<interface name="corenet_udp_receive_tftp_port" lineno="86946">
<summary>
Receive UDP traffic on the tftp port.
</summary>
@@ -64258,7 +64304,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="91389">
+<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="86961">
<summary>
Do not audit attempts to receive UDP traffic on the tftp port.
</summary>
@@ -64269,7 +64315,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_tftp_port" lineno="91408">
+<interface name="corenet_udp_sendrecv_tftp_port" lineno="86976">
<summary>
Send and receive UDP traffic on the tftp port.
</summary>
@@ -64280,7 +64326,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="91425">
+<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="86992">
<summary>
Do not audit attempts to send and receive
UDP traffic on the tftp port.
@@ -64292,7 +64338,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_tftp_port" lineno="91441">
+<interface name="corenet_tcp_bind_tftp_port" lineno="87007">
<summary>
Bind TCP sockets to the tftp port.
</summary>
@@ -64303,7 +64349,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_tftp_port" lineno="91461">
+<interface name="corenet_udp_bind_tftp_port" lineno="87027">
<summary>
Bind UDP sockets to the tftp port.
</summary>
@@ -64314,7 +64360,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_tftp_port" lineno="91480">
+<interface name="corenet_tcp_connect_tftp_port" lineno="87046">
<summary>
Make a TCP connection to the tftp port.
</summary>
@@ -64324,7 +64370,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tftp_client_packets" lineno="91500">
+<interface name="corenet_send_tftp_client_packets" lineno="87066">
<summary>
Send tftp_client packets.
</summary>
@@ -64335,7 +64381,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="91519">
+<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="87085">
<summary>
Do not audit attempts to send tftp_client packets.
</summary>
@@ -64346,7 +64392,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tftp_client_packets" lineno="91538">
+<interface name="corenet_receive_tftp_client_packets" lineno="87104">
<summary>
Receive tftp_client packets.
</summary>
@@ -64357,7 +64403,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="91557">
+<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="87123">
<summary>
Do not audit attempts to receive tftp_client packets.
</summary>
@@ -64368,7 +64414,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tftp_client_packets" lineno="91576">
+<interface name="corenet_sendrecv_tftp_client_packets" lineno="87142">
<summary>
Send and receive tftp_client packets.
</summary>
@@ -64379,7 +64425,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="91592">
+<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="87158">
<summary>
Do not audit attempts to send and receive tftp_client packets.
</summary>
@@ -64390,7 +64436,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tftp_client_packets" lineno="91607">
+<interface name="corenet_relabelto_tftp_client_packets" lineno="87173">
<summary>
Relabel packets to tftp_client the packet type.
</summary>
@@ -64400,7 +64446,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tftp_server_packets" lineno="91627">
+<interface name="corenet_send_tftp_server_packets" lineno="87193">
<summary>
Send tftp_server packets.
</summary>
@@ -64411,7 +64457,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="91646">
+<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="87212">
<summary>
Do not audit attempts to send tftp_server packets.
</summary>
@@ -64422,7 +64468,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tftp_server_packets" lineno="91665">
+<interface name="corenet_receive_tftp_server_packets" lineno="87231">
<summary>
Receive tftp_server packets.
</summary>
@@ -64433,7 +64479,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="91684">
+<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="87250">
<summary>
Do not audit attempts to receive tftp_server packets.
</summary>
@@ -64444,7 +64490,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tftp_server_packets" lineno="91703">
+<interface name="corenet_sendrecv_tftp_server_packets" lineno="87269">
<summary>
Send and receive tftp_server packets.
</summary>
@@ -64455,7 +64501,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="91719">
+<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="87285">
<summary>
Do not audit attempts to send and receive tftp_server packets.
</summary>
@@ -64466,7 +64512,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tftp_server_packets" lineno="91734">
+<interface name="corenet_relabelto_tftp_server_packets" lineno="87300">
<summary>
Relabel packets to tftp_server the packet type.
</summary>
@@ -64476,7 +64522,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_tor_port" lineno="91756">
+<interface name="corenet_tcp_sendrecv_tor_port" lineno="87322">
<summary>
Send and receive TCP traffic on the tor port.
</summary>
@@ -64487,7 +64533,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_tor_port" lineno="91775">
+<interface name="corenet_udp_send_tor_port" lineno="87337">
<summary>
Send UDP traffic on the tor port.
</summary>
@@ -64498,7 +64544,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_tor_port" lineno="91794">
+<interface name="corenet_dontaudit_udp_send_tor_port" lineno="87352">
<summary>
Do not audit attempts to send UDP traffic on the tor port.
</summary>
@@ -64509,7 +64555,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_tor_port" lineno="91813">
+<interface name="corenet_udp_receive_tor_port" lineno="87367">
<summary>
Receive UDP traffic on the tor port.
</summary>
@@ -64520,7 +64566,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="91832">
+<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="87382">
<summary>
Do not audit attempts to receive UDP traffic on the tor port.
</summary>
@@ -64531,7 +64577,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_tor_port" lineno="91851">
+<interface name="corenet_udp_sendrecv_tor_port" lineno="87397">
<summary>
Send and receive UDP traffic on the tor port.
</summary>
@@ -64542,7 +64588,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="91868">
+<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="87413">
<summary>
Do not audit attempts to send and receive
UDP traffic on the tor port.
@@ -64554,7 +64600,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_tor_port" lineno="91884">
+<interface name="corenet_tcp_bind_tor_port" lineno="87428">
<summary>
Bind TCP sockets to the tor port.
</summary>
@@ -64565,7 +64611,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_tor_port" lineno="91904">
+<interface name="corenet_udp_bind_tor_port" lineno="87448">
<summary>
Bind UDP sockets to the tor port.
</summary>
@@ -64576,7 +64622,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_tor_port" lineno="91923">
+<interface name="corenet_tcp_connect_tor_port" lineno="87467">
<summary>
Make a TCP connection to the tor port.
</summary>
@@ -64586,7 +64632,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tor_client_packets" lineno="91943">
+<interface name="corenet_send_tor_client_packets" lineno="87487">
<summary>
Send tor_client packets.
</summary>
@@ -64597,7 +64643,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tor_client_packets" lineno="91962">
+<interface name="corenet_dontaudit_send_tor_client_packets" lineno="87506">
<summary>
Do not audit attempts to send tor_client packets.
</summary>
@@ -64608,7 +64654,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tor_client_packets" lineno="91981">
+<interface name="corenet_receive_tor_client_packets" lineno="87525">
<summary>
Receive tor_client packets.
</summary>
@@ -64619,7 +64665,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="92000">
+<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="87544">
<summary>
Do not audit attempts to receive tor_client packets.
</summary>
@@ -64630,7 +64676,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tor_client_packets" lineno="92019">
+<interface name="corenet_sendrecv_tor_client_packets" lineno="87563">
<summary>
Send and receive tor_client packets.
</summary>
@@ -64641,7 +64687,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="92035">
+<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="87579">
<summary>
Do not audit attempts to send and receive tor_client packets.
</summary>
@@ -64652,7 +64698,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tor_client_packets" lineno="92050">
+<interface name="corenet_relabelto_tor_client_packets" lineno="87594">
<summary>
Relabel packets to tor_client the packet type.
</summary>
@@ -64662,7 +64708,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_tor_server_packets" lineno="92070">
+<interface name="corenet_send_tor_server_packets" lineno="87614">
<summary>
Send tor_server packets.
</summary>
@@ -64673,7 +64719,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_tor_server_packets" lineno="92089">
+<interface name="corenet_dontaudit_send_tor_server_packets" lineno="87633">
<summary>
Do not audit attempts to send tor_server packets.
</summary>
@@ -64684,7 +64730,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_tor_server_packets" lineno="92108">
+<interface name="corenet_receive_tor_server_packets" lineno="87652">
<summary>
Receive tor_server packets.
</summary>
@@ -64695,7 +64741,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="92127">
+<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="87671">
<summary>
Do not audit attempts to receive tor_server packets.
</summary>
@@ -64706,7 +64752,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_tor_server_packets" lineno="92146">
+<interface name="corenet_sendrecv_tor_server_packets" lineno="87690">
<summary>
Send and receive tor_server packets.
</summary>
@@ -64717,7 +64763,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="92162">
+<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="87706">
<summary>
Do not audit attempts to send and receive tor_server packets.
</summary>
@@ -64728,7 +64774,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_tor_server_packets" lineno="92177">
+<interface name="corenet_relabelto_tor_server_packets" lineno="87721">
<summary>
Relabel packets to tor_server the packet type.
</summary>
@@ -64738,7 +64784,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="92199">
+<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="87743">
<summary>
Send and receive TCP traffic on the traceroute port.
</summary>
@@ -64749,7 +64795,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_traceroute_port" lineno="92218">
+<interface name="corenet_udp_send_traceroute_port" lineno="87758">
<summary>
Send UDP traffic on the traceroute port.
</summary>
@@ -64760,7 +64806,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="92237">
+<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="87773">
<summary>
Do not audit attempts to send UDP traffic on the traceroute port.
</summary>
@@ -64771,7 +64817,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_traceroute_port" lineno="92256">
+<interface name="corenet_udp_receive_traceroute_port" lineno="87788">
<summary>
Receive UDP traffic on the traceroute port.
</summary>
@@ -64782,7 +64828,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="92275">
+<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="87803">
<summary>
Do not audit attempts to receive UDP traffic on the traceroute port.
</summary>
@@ -64793,7 +64839,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_traceroute_port" lineno="92294">
+<interface name="corenet_udp_sendrecv_traceroute_port" lineno="87818">
<summary>
Send and receive UDP traffic on the traceroute port.
</summary>
@@ -64804,7 +64850,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="92311">
+<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="87834">
<summary>
Do not audit attempts to send and receive
UDP traffic on the traceroute port.
@@ -64816,7 +64862,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_traceroute_port" lineno="92327">
+<interface name="corenet_tcp_bind_traceroute_port" lineno="87849">
<summary>
Bind TCP sockets to the traceroute port.
</summary>
@@ -64827,7 +64873,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_traceroute_port" lineno="92347">
+<interface name="corenet_udp_bind_traceroute_port" lineno="87869">
<summary>
Bind UDP sockets to the traceroute port.
</summary>
@@ -64838,7 +64884,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_traceroute_port" lineno="92366">
+<interface name="corenet_tcp_connect_traceroute_port" lineno="87888">
<summary>
Make a TCP connection to the traceroute port.
</summary>
@@ -64848,7 +64894,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_traceroute_client_packets" lineno="92386">
+<interface name="corenet_send_traceroute_client_packets" lineno="87908">
<summary>
Send traceroute_client packets.
</summary>
@@ -64859,7 +64905,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="92405">
+<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="87927">
<summary>
Do not audit attempts to send traceroute_client packets.
</summary>
@@ -64870,7 +64916,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_traceroute_client_packets" lineno="92424">
+<interface name="corenet_receive_traceroute_client_packets" lineno="87946">
<summary>
Receive traceroute_client packets.
</summary>
@@ -64881,7 +64927,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="92443">
+<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="87965">
<summary>
Do not audit attempts to receive traceroute_client packets.
</summary>
@@ -64892,7 +64938,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_traceroute_client_packets" lineno="92462">
+<interface name="corenet_sendrecv_traceroute_client_packets" lineno="87984">
<summary>
Send and receive traceroute_client packets.
</summary>
@@ -64903,7 +64949,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="92478">
+<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="88000">
<summary>
Do not audit attempts to send and receive traceroute_client packets.
</summary>
@@ -64914,7 +64960,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_traceroute_client_packets" lineno="92493">
+<interface name="corenet_relabelto_traceroute_client_packets" lineno="88015">
<summary>
Relabel packets to traceroute_client the packet type.
</summary>
@@ -64924,7 +64970,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_traceroute_server_packets" lineno="92513">
+<interface name="corenet_send_traceroute_server_packets" lineno="88035">
<summary>
Send traceroute_server packets.
</summary>
@@ -64935,7 +64981,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="92532">
+<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="88054">
<summary>
Do not audit attempts to send traceroute_server packets.
</summary>
@@ -64946,7 +64992,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_traceroute_server_packets" lineno="92551">
+<interface name="corenet_receive_traceroute_server_packets" lineno="88073">
<summary>
Receive traceroute_server packets.
</summary>
@@ -64957,7 +65003,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="92570">
+<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="88092">
<summary>
Do not audit attempts to receive traceroute_server packets.
</summary>
@@ -64968,7 +65014,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_traceroute_server_packets" lineno="92589">
+<interface name="corenet_sendrecv_traceroute_server_packets" lineno="88111">
<summary>
Send and receive traceroute_server packets.
</summary>
@@ -64979,7 +65025,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="92605">
+<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="88127">
<summary>
Do not audit attempts to send and receive traceroute_server packets.
</summary>
@@ -64990,7 +65036,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_traceroute_server_packets" lineno="92620">
+<interface name="corenet_relabelto_traceroute_server_packets" lineno="88142">
<summary>
Relabel packets to traceroute_server the packet type.
</summary>
@@ -65000,7 +65046,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="92642">
+<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="88164">
<summary>
Send and receive TCP traffic on the transproxy port.
</summary>
@@ -65011,7 +65057,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_transproxy_port" lineno="92661">
+<interface name="corenet_udp_send_transproxy_port" lineno="88179">
<summary>
Send UDP traffic on the transproxy port.
</summary>
@@ -65022,7 +65068,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="92680">
+<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="88194">
<summary>
Do not audit attempts to send UDP traffic on the transproxy port.
</summary>
@@ -65033,7 +65079,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_transproxy_port" lineno="92699">
+<interface name="corenet_udp_receive_transproxy_port" lineno="88209">
<summary>
Receive UDP traffic on the transproxy port.
</summary>
@@ -65044,7 +65090,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="92718">
+<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="88224">
<summary>
Do not audit attempts to receive UDP traffic on the transproxy port.
</summary>
@@ -65055,7 +65101,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_transproxy_port" lineno="92737">
+<interface name="corenet_udp_sendrecv_transproxy_port" lineno="88239">
<summary>
Send and receive UDP traffic on the transproxy port.
</summary>
@@ -65066,7 +65112,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="92754">
+<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="88255">
<summary>
Do not audit attempts to send and receive
UDP traffic on the transproxy port.
@@ -65078,7 +65124,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_transproxy_port" lineno="92770">
+<interface name="corenet_tcp_bind_transproxy_port" lineno="88270">
<summary>
Bind TCP sockets to the transproxy port.
</summary>
@@ -65089,7 +65135,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_transproxy_port" lineno="92790">
+<interface name="corenet_udp_bind_transproxy_port" lineno="88290">
<summary>
Bind UDP sockets to the transproxy port.
</summary>
@@ -65100,7 +65146,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_transproxy_port" lineno="92809">
+<interface name="corenet_tcp_connect_transproxy_port" lineno="88309">
<summary>
Make a TCP connection to the transproxy port.
</summary>
@@ -65110,7 +65156,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_transproxy_client_packets" lineno="92829">
+<interface name="corenet_send_transproxy_client_packets" lineno="88329">
<summary>
Send transproxy_client packets.
</summary>
@@ -65121,7 +65167,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="92848">
+<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88348">
<summary>
Do not audit attempts to send transproxy_client packets.
</summary>
@@ -65132,7 +65178,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_transproxy_client_packets" lineno="92867">
+<interface name="corenet_receive_transproxy_client_packets" lineno="88367">
<summary>
Receive transproxy_client packets.
</summary>
@@ -65143,7 +65189,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="92886">
+<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88386">
<summary>
Do not audit attempts to receive transproxy_client packets.
</summary>
@@ -65154,7 +65200,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_transproxy_client_packets" lineno="92905">
+<interface name="corenet_sendrecv_transproxy_client_packets" lineno="88405">
<summary>
Send and receive transproxy_client packets.
</summary>
@@ -65165,7 +65211,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="92921">
+<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88421">
<summary>
Do not audit attempts to send and receive transproxy_client packets.
</summary>
@@ -65176,7 +65222,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_transproxy_client_packets" lineno="92936">
+<interface name="corenet_relabelto_transproxy_client_packets" lineno="88436">
<summary>
Relabel packets to transproxy_client the packet type.
</summary>
@@ -65186,7 +65232,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_transproxy_server_packets" lineno="92956">
+<interface name="corenet_send_transproxy_server_packets" lineno="88456">
<summary>
Send transproxy_server packets.
</summary>
@@ -65197,7 +65243,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="92975">
+<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="88475">
<summary>
Do not audit attempts to send transproxy_server packets.
</summary>
@@ -65208,7 +65254,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_transproxy_server_packets" lineno="92994">
+<interface name="corenet_receive_transproxy_server_packets" lineno="88494">
<summary>
Receive transproxy_server packets.
</summary>
@@ -65219,7 +65265,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="93013">
+<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="88513">
<summary>
Do not audit attempts to receive transproxy_server packets.
</summary>
@@ -65230,7 +65276,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_transproxy_server_packets" lineno="93032">
+<interface name="corenet_sendrecv_transproxy_server_packets" lineno="88532">
<summary>
Send and receive transproxy_server packets.
</summary>
@@ -65241,7 +65287,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="93048">
+<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="88548">
<summary>
Do not audit attempts to send and receive transproxy_server packets.
</summary>
@@ -65252,7 +65298,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_transproxy_server_packets" lineno="93063">
+<interface name="corenet_relabelto_transproxy_server_packets" lineno="88563">
<summary>
Relabel packets to transproxy_server the packet type.
</summary>
@@ -65262,7 +65308,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="93085">
+<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="88585">
<summary>
Send and receive TCP traffic on the trisoap port.
</summary>
@@ -65273,7 +65319,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_trisoap_port" lineno="93104">
+<interface name="corenet_udp_send_trisoap_port" lineno="88600">
<summary>
Send UDP traffic on the trisoap port.
</summary>
@@ -65284,7 +65330,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="93123">
+<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="88615">
<summary>
Do not audit attempts to send UDP traffic on the trisoap port.
</summary>
@@ -65295,7 +65341,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_trisoap_port" lineno="93142">
+<interface name="corenet_udp_receive_trisoap_port" lineno="88630">
<summary>
Receive UDP traffic on the trisoap port.
</summary>
@@ -65306,7 +65352,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="93161">
+<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="88645">
<summary>
Do not audit attempts to receive UDP traffic on the trisoap port.
</summary>
@@ -65317,7 +65363,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_trisoap_port" lineno="93180">
+<interface name="corenet_udp_sendrecv_trisoap_port" lineno="88660">
<summary>
Send and receive UDP traffic on the trisoap port.
</summary>
@@ -65328,7 +65374,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="93197">
+<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="88676">
<summary>
Do not audit attempts to send and receive
UDP traffic on the trisoap port.
@@ -65340,7 +65386,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_trisoap_port" lineno="93213">
+<interface name="corenet_tcp_bind_trisoap_port" lineno="88691">
<summary>
Bind TCP sockets to the trisoap port.
</summary>
@@ -65351,7 +65397,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_trisoap_port" lineno="93233">
+<interface name="corenet_udp_bind_trisoap_port" lineno="88711">
<summary>
Bind UDP sockets to the trisoap port.
</summary>
@@ -65362,7 +65408,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_trisoap_port" lineno="93252">
+<interface name="corenet_tcp_connect_trisoap_port" lineno="88730">
<summary>
Make a TCP connection to the trisoap port.
</summary>
@@ -65372,7 +65418,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_trisoap_client_packets" lineno="93272">
+<interface name="corenet_send_trisoap_client_packets" lineno="88750">
<summary>
Send trisoap_client packets.
</summary>
@@ -65383,7 +65429,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="93291">
+<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="88769">
<summary>
Do not audit attempts to send trisoap_client packets.
</summary>
@@ -65394,7 +65440,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_trisoap_client_packets" lineno="93310">
+<interface name="corenet_receive_trisoap_client_packets" lineno="88788">
<summary>
Receive trisoap_client packets.
</summary>
@@ -65405,7 +65451,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="93329">
+<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="88807">
<summary>
Do not audit attempts to receive trisoap_client packets.
</summary>
@@ -65416,7 +65462,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_trisoap_client_packets" lineno="93348">
+<interface name="corenet_sendrecv_trisoap_client_packets" lineno="88826">
<summary>
Send and receive trisoap_client packets.
</summary>
@@ -65427,7 +65473,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="93364">
+<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="88842">
<summary>
Do not audit attempts to send and receive trisoap_client packets.
</summary>
@@ -65438,7 +65484,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_trisoap_client_packets" lineno="93379">
+<interface name="corenet_relabelto_trisoap_client_packets" lineno="88857">
<summary>
Relabel packets to trisoap_client the packet type.
</summary>
@@ -65448,7 +65494,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_trisoap_server_packets" lineno="93399">
+<interface name="corenet_send_trisoap_server_packets" lineno="88877">
<summary>
Send trisoap_server packets.
</summary>
@@ -65459,7 +65505,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="93418">
+<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="88896">
<summary>
Do not audit attempts to send trisoap_server packets.
</summary>
@@ -65470,7 +65516,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_trisoap_server_packets" lineno="93437">
+<interface name="corenet_receive_trisoap_server_packets" lineno="88915">
<summary>
Receive trisoap_server packets.
</summary>
@@ -65481,7 +65527,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="93456">
+<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="88934">
<summary>
Do not audit attempts to receive trisoap_server packets.
</summary>
@@ -65492,7 +65538,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_trisoap_server_packets" lineno="93475">
+<interface name="corenet_sendrecv_trisoap_server_packets" lineno="88953">
<summary>
Send and receive trisoap_server packets.
</summary>
@@ -65503,7 +65549,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="93491">
+<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="88969">
<summary>
Do not audit attempts to send and receive trisoap_server packets.
</summary>
@@ -65514,7 +65560,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_trisoap_server_packets" lineno="93506">
+<interface name="corenet_relabelto_trisoap_server_packets" lineno="88984">
<summary>
Relabel packets to trisoap_server the packet type.
</summary>
@@ -65524,7 +65570,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="93528">
+<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="89006">
<summary>
Send and receive TCP traffic on the trivnet1 port.
</summary>
@@ -65535,7 +65581,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_trivnet1_port" lineno="93547">
+<interface name="corenet_udp_send_trivnet1_port" lineno="89021">
<summary>
Send UDP traffic on the trivnet1 port.
</summary>
@@ -65546,7 +65592,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="93566">
+<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="89036">
<summary>
Do not audit attempts to send UDP traffic on the trivnet1 port.
</summary>
@@ -65557,7 +65603,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_trivnet1_port" lineno="93585">
+<interface name="corenet_udp_receive_trivnet1_port" lineno="89051">
<summary>
Receive UDP traffic on the trivnet1 port.
</summary>
@@ -65568,7 +65614,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="93604">
+<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="89066">
<summary>
Do not audit attempts to receive UDP traffic on the trivnet1 port.
</summary>
@@ -65579,7 +65625,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="93623">
+<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="89081">
<summary>
Send and receive UDP traffic on the trivnet1 port.
</summary>
@@ -65590,7 +65636,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="93640">
+<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="89097">
<summary>
Do not audit attempts to send and receive
UDP traffic on the trivnet1 port.
@@ -65602,7 +65648,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_trivnet1_port" lineno="93656">
+<interface name="corenet_tcp_bind_trivnet1_port" lineno="89112">
<summary>
Bind TCP sockets to the trivnet1 port.
</summary>
@@ -65613,7 +65659,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_trivnet1_port" lineno="93676">
+<interface name="corenet_udp_bind_trivnet1_port" lineno="89132">
<summary>
Bind UDP sockets to the trivnet1 port.
</summary>
@@ -65624,7 +65670,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_trivnet1_port" lineno="93695">
+<interface name="corenet_tcp_connect_trivnet1_port" lineno="89151">
<summary>
Make a TCP connection to the trivnet1 port.
</summary>
@@ -65634,7 +65680,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_trivnet1_client_packets" lineno="93715">
+<interface name="corenet_send_trivnet1_client_packets" lineno="89171">
<summary>
Send trivnet1_client packets.
</summary>
@@ -65645,7 +65691,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="93734">
+<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="89190">
<summary>
Do not audit attempts to send trivnet1_client packets.
</summary>
@@ -65656,7 +65702,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_trivnet1_client_packets" lineno="93753">
+<interface name="corenet_receive_trivnet1_client_packets" lineno="89209">
<summary>
Receive trivnet1_client packets.
</summary>
@@ -65667,7 +65713,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="93772">
+<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="89228">
<summary>
Do not audit attempts to receive trivnet1_client packets.
</summary>
@@ -65678,7 +65724,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="93791">
+<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="89247">
<summary>
Send and receive trivnet1_client packets.
</summary>
@@ -65689,7 +65735,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="93807">
+<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="89263">
<summary>
Do not audit attempts to send and receive trivnet1_client packets.
</summary>
@@ -65700,7 +65746,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_trivnet1_client_packets" lineno="93822">
+<interface name="corenet_relabelto_trivnet1_client_packets" lineno="89278">
<summary>
Relabel packets to trivnet1_client the packet type.
</summary>
@@ -65710,7 +65756,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_trivnet1_server_packets" lineno="93842">
+<interface name="corenet_send_trivnet1_server_packets" lineno="89298">
<summary>
Send trivnet1_server packets.
</summary>
@@ -65721,7 +65767,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="93861">
+<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="89317">
<summary>
Do not audit attempts to send trivnet1_server packets.
</summary>
@@ -65732,7 +65778,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_trivnet1_server_packets" lineno="93880">
+<interface name="corenet_receive_trivnet1_server_packets" lineno="89336">
<summary>
Receive trivnet1_server packets.
</summary>
@@ -65743,7 +65789,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="93899">
+<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="89355">
<summary>
Do not audit attempts to receive trivnet1_server packets.
</summary>
@@ -65754,7 +65800,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="93918">
+<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="89374">
<summary>
Send and receive trivnet1_server packets.
</summary>
@@ -65765,7 +65811,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="93934">
+<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="89390">
<summary>
Do not audit attempts to send and receive trivnet1_server packets.
</summary>
@@ -65776,7 +65822,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_trivnet1_server_packets" lineno="93949">
+<interface name="corenet_relabelto_trivnet1_server_packets" lineno="89405">
<summary>
Relabel packets to trivnet1_server the packet type.
</summary>
@@ -65786,7 +65832,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_ups_port" lineno="93971">
+<interface name="corenet_tcp_sendrecv_ups_port" lineno="89427">
<summary>
Send and receive TCP traffic on the ups port.
</summary>
@@ -65797,7 +65843,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_ups_port" lineno="93990">
+<interface name="corenet_udp_send_ups_port" lineno="89442">
<summary>
Send UDP traffic on the ups port.
</summary>
@@ -65808,7 +65854,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_ups_port" lineno="94009">
+<interface name="corenet_dontaudit_udp_send_ups_port" lineno="89457">
<summary>
Do not audit attempts to send UDP traffic on the ups port.
</summary>
@@ -65819,7 +65865,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_ups_port" lineno="94028">
+<interface name="corenet_udp_receive_ups_port" lineno="89472">
<summary>
Receive UDP traffic on the ups port.
</summary>
@@ -65830,7 +65876,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="94047">
+<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="89487">
<summary>
Do not audit attempts to receive UDP traffic on the ups port.
</summary>
@@ -65841,7 +65887,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_ups_port" lineno="94066">
+<interface name="corenet_udp_sendrecv_ups_port" lineno="89502">
<summary>
Send and receive UDP traffic on the ups port.
</summary>
@@ -65852,7 +65898,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="94083">
+<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="89518">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ups port.
@@ -65864,7 +65910,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_ups_port" lineno="94099">
+<interface name="corenet_tcp_bind_ups_port" lineno="89533">
<summary>
Bind TCP sockets to the ups port.
</summary>
@@ -65875,7 +65921,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_ups_port" lineno="94119">
+<interface name="corenet_udp_bind_ups_port" lineno="89553">
<summary>
Bind UDP sockets to the ups port.
</summary>
@@ -65886,7 +65932,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_ups_port" lineno="94138">
+<interface name="corenet_tcp_connect_ups_port" lineno="89572">
<summary>
Make a TCP connection to the ups port.
</summary>
@@ -65896,7 +65942,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ups_client_packets" lineno="94158">
+<interface name="corenet_send_ups_client_packets" lineno="89592">
<summary>
Send ups_client packets.
</summary>
@@ -65907,7 +65953,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ups_client_packets" lineno="94177">
+<interface name="corenet_dontaudit_send_ups_client_packets" lineno="89611">
<summary>
Do not audit attempts to send ups_client packets.
</summary>
@@ -65918,7 +65964,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ups_client_packets" lineno="94196">
+<interface name="corenet_receive_ups_client_packets" lineno="89630">
<summary>
Receive ups_client packets.
</summary>
@@ -65929,7 +65975,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="94215">
+<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="89649">
<summary>
Do not audit attempts to receive ups_client packets.
</summary>
@@ -65940,7 +65986,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ups_client_packets" lineno="94234">
+<interface name="corenet_sendrecv_ups_client_packets" lineno="89668">
<summary>
Send and receive ups_client packets.
</summary>
@@ -65951,7 +65997,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="94250">
+<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="89684">
<summary>
Do not audit attempts to send and receive ups_client packets.
</summary>
@@ -65962,7 +66008,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ups_client_packets" lineno="94265">
+<interface name="corenet_relabelto_ups_client_packets" lineno="89699">
<summary>
Relabel packets to ups_client the packet type.
</summary>
@@ -65972,7 +66018,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_ups_server_packets" lineno="94285">
+<interface name="corenet_send_ups_server_packets" lineno="89719">
<summary>
Send ups_server packets.
</summary>
@@ -65983,7 +66029,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_ups_server_packets" lineno="94304">
+<interface name="corenet_dontaudit_send_ups_server_packets" lineno="89738">
<summary>
Do not audit attempts to send ups_server packets.
</summary>
@@ -65994,7 +66040,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_ups_server_packets" lineno="94323">
+<interface name="corenet_receive_ups_server_packets" lineno="89757">
<summary>
Receive ups_server packets.
</summary>
@@ -66005,7 +66051,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="94342">
+<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="89776">
<summary>
Do not audit attempts to receive ups_server packets.
</summary>
@@ -66016,7 +66062,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_ups_server_packets" lineno="94361">
+<interface name="corenet_sendrecv_ups_server_packets" lineno="89795">
<summary>
Send and receive ups_server packets.
</summary>
@@ -66027,7 +66073,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="94377">
+<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="89811">
<summary>
Do not audit attempts to send and receive ups_server packets.
</summary>
@@ -66038,7 +66084,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_ups_server_packets" lineno="94392">
+<interface name="corenet_relabelto_ups_server_packets" lineno="89826">
<summary>
Relabel packets to ups_server the packet type.
</summary>
@@ -66048,7 +66094,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="94414">
+<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="89848">
<summary>
Send and receive TCP traffic on the utcpserver port.
</summary>
@@ -66059,7 +66105,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_utcpserver_port" lineno="94433">
+<interface name="corenet_udp_send_utcpserver_port" lineno="89863">
<summary>
Send UDP traffic on the utcpserver port.
</summary>
@@ -66070,7 +66116,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="94452">
+<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="89878">
<summary>
Do not audit attempts to send UDP traffic on the utcpserver port.
</summary>
@@ -66081,7 +66127,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_utcpserver_port" lineno="94471">
+<interface name="corenet_udp_receive_utcpserver_port" lineno="89893">
<summary>
Receive UDP traffic on the utcpserver port.
</summary>
@@ -66092,7 +66138,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="94490">
+<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="89908">
<summary>
Do not audit attempts to receive UDP traffic on the utcpserver port.
</summary>
@@ -66103,7 +66149,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="94509">
+<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="89923">
<summary>
Send and receive UDP traffic on the utcpserver port.
</summary>
@@ -66114,7 +66160,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="94526">
+<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="89939">
<summary>
Do not audit attempts to send and receive
UDP traffic on the utcpserver port.
@@ -66126,7 +66172,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_utcpserver_port" lineno="94542">
+<interface name="corenet_tcp_bind_utcpserver_port" lineno="89954">
<summary>
Bind TCP sockets to the utcpserver port.
</summary>
@@ -66137,7 +66183,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_utcpserver_port" lineno="94562">
+<interface name="corenet_udp_bind_utcpserver_port" lineno="89974">
<summary>
Bind UDP sockets to the utcpserver port.
</summary>
@@ -66148,7 +66194,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_utcpserver_port" lineno="94581">
+<interface name="corenet_tcp_connect_utcpserver_port" lineno="89993">
<summary>
Make a TCP connection to the utcpserver port.
</summary>
@@ -66158,7 +66204,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_utcpserver_client_packets" lineno="94601">
+<interface name="corenet_send_utcpserver_client_packets" lineno="90013">
<summary>
Send utcpserver_client packets.
</summary>
@@ -66169,7 +66215,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="94620">
+<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="90032">
<summary>
Do not audit attempts to send utcpserver_client packets.
</summary>
@@ -66180,7 +66226,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_utcpserver_client_packets" lineno="94639">
+<interface name="corenet_receive_utcpserver_client_packets" lineno="90051">
<summary>
Receive utcpserver_client packets.
</summary>
@@ -66191,7 +66237,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="94658">
+<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="90070">
<summary>
Do not audit attempts to receive utcpserver_client packets.
</summary>
@@ -66202,7 +66248,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="94677">
+<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="90089">
<summary>
Send and receive utcpserver_client packets.
</summary>
@@ -66213,7 +66259,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="94693">
+<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="90105">
<summary>
Do not audit attempts to send and receive utcpserver_client packets.
</summary>
@@ -66224,7 +66270,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_utcpserver_client_packets" lineno="94708">
+<interface name="corenet_relabelto_utcpserver_client_packets" lineno="90120">
<summary>
Relabel packets to utcpserver_client the packet type.
</summary>
@@ -66234,7 +66280,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_utcpserver_server_packets" lineno="94728">
+<interface name="corenet_send_utcpserver_server_packets" lineno="90140">
<summary>
Send utcpserver_server packets.
</summary>
@@ -66245,7 +66291,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="94747">
+<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="90159">
<summary>
Do not audit attempts to send utcpserver_server packets.
</summary>
@@ -66256,7 +66302,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_utcpserver_server_packets" lineno="94766">
+<interface name="corenet_receive_utcpserver_server_packets" lineno="90178">
<summary>
Receive utcpserver_server packets.
</summary>
@@ -66267,7 +66313,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="94785">
+<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="90197">
<summary>
Do not audit attempts to receive utcpserver_server packets.
</summary>
@@ -66278,7 +66324,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="94804">
+<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="90216">
<summary>
Send and receive utcpserver_server packets.
</summary>
@@ -66289,7 +66335,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="94820">
+<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="90232">
<summary>
Do not audit attempts to send and receive utcpserver_server packets.
</summary>
@@ -66300,7 +66346,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_utcpserver_server_packets" lineno="94835">
+<interface name="corenet_relabelto_utcpserver_server_packets" lineno="90247">
<summary>
Relabel packets to utcpserver_server the packet type.
</summary>
@@ -66310,7 +66356,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="94857">
+<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="90269">
<summary>
Send and receive TCP traffic on the uucpd port.
</summary>
@@ -66321,7 +66367,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_uucpd_port" lineno="94876">
+<interface name="corenet_udp_send_uucpd_port" lineno="90284">
<summary>
Send UDP traffic on the uucpd port.
</summary>
@@ -66332,7 +66378,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="94895">
+<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="90299">
<summary>
Do not audit attempts to send UDP traffic on the uucpd port.
</summary>
@@ -66343,7 +66389,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_uucpd_port" lineno="94914">
+<interface name="corenet_udp_receive_uucpd_port" lineno="90314">
<summary>
Receive UDP traffic on the uucpd port.
</summary>
@@ -66354,7 +66400,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="94933">
+<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="90329">
<summary>
Do not audit attempts to receive UDP traffic on the uucpd port.
</summary>
@@ -66365,7 +66411,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_uucpd_port" lineno="94952">
+<interface name="corenet_udp_sendrecv_uucpd_port" lineno="90344">
<summary>
Send and receive UDP traffic on the uucpd port.
</summary>
@@ -66376,7 +66422,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="94969">
+<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="90360">
<summary>
Do not audit attempts to send and receive
UDP traffic on the uucpd port.
@@ -66388,7 +66434,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_uucpd_port" lineno="94985">
+<interface name="corenet_tcp_bind_uucpd_port" lineno="90375">
<summary>
Bind TCP sockets to the uucpd port.
</summary>
@@ -66399,7 +66445,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_uucpd_port" lineno="95005">
+<interface name="corenet_udp_bind_uucpd_port" lineno="90395">
<summary>
Bind UDP sockets to the uucpd port.
</summary>
@@ -66410,7 +66456,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_uucpd_port" lineno="95024">
+<interface name="corenet_tcp_connect_uucpd_port" lineno="90414">
<summary>
Make a TCP connection to the uucpd port.
</summary>
@@ -66420,7 +66466,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_uucpd_client_packets" lineno="95044">
+<interface name="corenet_send_uucpd_client_packets" lineno="90434">
<summary>
Send uucpd_client packets.
</summary>
@@ -66431,7 +66477,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="95063">
+<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="90453">
<summary>
Do not audit attempts to send uucpd_client packets.
</summary>
@@ -66442,7 +66488,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_uucpd_client_packets" lineno="95082">
+<interface name="corenet_receive_uucpd_client_packets" lineno="90472">
<summary>
Receive uucpd_client packets.
</summary>
@@ -66453,7 +66499,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="95101">
+<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="90491">
<summary>
Do not audit attempts to receive uucpd_client packets.
</summary>
@@ -66464,7 +66510,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_uucpd_client_packets" lineno="95120">
+<interface name="corenet_sendrecv_uucpd_client_packets" lineno="90510">
<summary>
Send and receive uucpd_client packets.
</summary>
@@ -66475,7 +66521,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="95136">
+<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="90526">
<summary>
Do not audit attempts to send and receive uucpd_client packets.
</summary>
@@ -66486,7 +66532,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_uucpd_client_packets" lineno="95151">
+<interface name="corenet_relabelto_uucpd_client_packets" lineno="90541">
<summary>
Relabel packets to uucpd_client the packet type.
</summary>
@@ -66496,7 +66542,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_uucpd_server_packets" lineno="95171">
+<interface name="corenet_send_uucpd_server_packets" lineno="90561">
<summary>
Send uucpd_server packets.
</summary>
@@ -66507,7 +66553,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="95190">
+<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="90580">
<summary>
Do not audit attempts to send uucpd_server packets.
</summary>
@@ -66518,7 +66564,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_uucpd_server_packets" lineno="95209">
+<interface name="corenet_receive_uucpd_server_packets" lineno="90599">
<summary>
Receive uucpd_server packets.
</summary>
@@ -66529,7 +66575,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="95228">
+<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="90618">
<summary>
Do not audit attempts to receive uucpd_server packets.
</summary>
@@ -66540,7 +66586,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_uucpd_server_packets" lineno="95247">
+<interface name="corenet_sendrecv_uucpd_server_packets" lineno="90637">
<summary>
Send and receive uucpd_server packets.
</summary>
@@ -66551,7 +66597,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="95263">
+<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="90653">
<summary>
Do not audit attempts to send and receive uucpd_server packets.
</summary>
@@ -66562,7 +66608,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_uucpd_server_packets" lineno="95278">
+<interface name="corenet_relabelto_uucpd_server_packets" lineno="90668">
<summary>
Relabel packets to uucpd_server the packet type.
</summary>
@@ -66572,7 +66618,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="95300">
+<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="90690">
<summary>
Send and receive TCP traffic on the varnishd port.
</summary>
@@ -66583,7 +66629,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_varnishd_port" lineno="95319">
+<interface name="corenet_udp_send_varnishd_port" lineno="90705">
<summary>
Send UDP traffic on the varnishd port.
</summary>
@@ -66594,7 +66640,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="95338">
+<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="90720">
<summary>
Do not audit attempts to send UDP traffic on the varnishd port.
</summary>
@@ -66605,7 +66651,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_varnishd_port" lineno="95357">
+<interface name="corenet_udp_receive_varnishd_port" lineno="90735">
<summary>
Receive UDP traffic on the varnishd port.
</summary>
@@ -66616,7 +66662,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="95376">
+<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="90750">
<summary>
Do not audit attempts to receive UDP traffic on the varnishd port.
</summary>
@@ -66627,7 +66673,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_varnishd_port" lineno="95395">
+<interface name="corenet_udp_sendrecv_varnishd_port" lineno="90765">
<summary>
Send and receive UDP traffic on the varnishd port.
</summary>
@@ -66638,7 +66684,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="95412">
+<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="90781">
<summary>
Do not audit attempts to send and receive
UDP traffic on the varnishd port.
@@ -66650,7 +66696,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_varnishd_port" lineno="95428">
+<interface name="corenet_tcp_bind_varnishd_port" lineno="90796">
<summary>
Bind TCP sockets to the varnishd port.
</summary>
@@ -66661,7 +66707,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_varnishd_port" lineno="95448">
+<interface name="corenet_udp_bind_varnishd_port" lineno="90816">
<summary>
Bind UDP sockets to the varnishd port.
</summary>
@@ -66672,7 +66718,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_varnishd_port" lineno="95467">
+<interface name="corenet_tcp_connect_varnishd_port" lineno="90835">
<summary>
Make a TCP connection to the varnishd port.
</summary>
@@ -66682,7 +66728,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_varnishd_client_packets" lineno="95487">
+<interface name="corenet_send_varnishd_client_packets" lineno="90855">
<summary>
Send varnishd_client packets.
</summary>
@@ -66693,7 +66739,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="95506">
+<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="90874">
<summary>
Do not audit attempts to send varnishd_client packets.
</summary>
@@ -66704,7 +66750,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_varnishd_client_packets" lineno="95525">
+<interface name="corenet_receive_varnishd_client_packets" lineno="90893">
<summary>
Receive varnishd_client packets.
</summary>
@@ -66715,7 +66761,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="95544">
+<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="90912">
<summary>
Do not audit attempts to receive varnishd_client packets.
</summary>
@@ -66726,7 +66772,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_varnishd_client_packets" lineno="95563">
+<interface name="corenet_sendrecv_varnishd_client_packets" lineno="90931">
<summary>
Send and receive varnishd_client packets.
</summary>
@@ -66737,7 +66783,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="95579">
+<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="90947">
<summary>
Do not audit attempts to send and receive varnishd_client packets.
</summary>
@@ -66748,7 +66794,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_varnishd_client_packets" lineno="95594">
+<interface name="corenet_relabelto_varnishd_client_packets" lineno="90962">
<summary>
Relabel packets to varnishd_client the packet type.
</summary>
@@ -66758,7 +66804,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_varnishd_server_packets" lineno="95614">
+<interface name="corenet_send_varnishd_server_packets" lineno="90982">
<summary>
Send varnishd_server packets.
</summary>
@@ -66769,7 +66815,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="95633">
+<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="91001">
<summary>
Do not audit attempts to send varnishd_server packets.
</summary>
@@ -66780,7 +66826,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_varnishd_server_packets" lineno="95652">
+<interface name="corenet_receive_varnishd_server_packets" lineno="91020">
<summary>
Receive varnishd_server packets.
</summary>
@@ -66791,7 +66837,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="95671">
+<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="91039">
<summary>
Do not audit attempts to receive varnishd_server packets.
</summary>
@@ -66802,7 +66848,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_varnishd_server_packets" lineno="95690">
+<interface name="corenet_sendrecv_varnishd_server_packets" lineno="91058">
<summary>
Send and receive varnishd_server packets.
</summary>
@@ -66813,7 +66859,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="95706">
+<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="91074">
<summary>
Do not audit attempts to send and receive varnishd_server packets.
</summary>
@@ -66824,7 +66870,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_varnishd_server_packets" lineno="95721">
+<interface name="corenet_relabelto_varnishd_server_packets" lineno="91089">
<summary>
Relabel packets to varnishd_server the packet type.
</summary>
@@ -66834,7 +66880,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_virt_port" lineno="95743">
+<interface name="corenet_tcp_sendrecv_virt_port" lineno="91111">
<summary>
Send and receive TCP traffic on the virt port.
</summary>
@@ -66845,7 +66891,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_virt_port" lineno="95762">
+<interface name="corenet_udp_send_virt_port" lineno="91126">
<summary>
Send UDP traffic on the virt port.
</summary>
@@ -66856,7 +66902,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_virt_port" lineno="95781">
+<interface name="corenet_dontaudit_udp_send_virt_port" lineno="91141">
<summary>
Do not audit attempts to send UDP traffic on the virt port.
</summary>
@@ -66867,7 +66913,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_virt_port" lineno="95800">
+<interface name="corenet_udp_receive_virt_port" lineno="91156">
<summary>
Receive UDP traffic on the virt port.
</summary>
@@ -66878,7 +66924,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="95819">
+<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="91171">
<summary>
Do not audit attempts to receive UDP traffic on the virt port.
</summary>
@@ -66889,7 +66935,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_virt_port" lineno="95838">
+<interface name="corenet_udp_sendrecv_virt_port" lineno="91186">
<summary>
Send and receive UDP traffic on the virt port.
</summary>
@@ -66900,7 +66946,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="95855">
+<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="91202">
<summary>
Do not audit attempts to send and receive
UDP traffic on the virt port.
@@ -66912,7 +66958,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_virt_port" lineno="95871">
+<interface name="corenet_tcp_bind_virt_port" lineno="91217">
<summary>
Bind TCP sockets to the virt port.
</summary>
@@ -66923,7 +66969,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_virt_port" lineno="95891">
+<interface name="corenet_udp_bind_virt_port" lineno="91237">
<summary>
Bind UDP sockets to the virt port.
</summary>
@@ -66934,7 +66980,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_virt_port" lineno="95910">
+<interface name="corenet_tcp_connect_virt_port" lineno="91256">
<summary>
Make a TCP connection to the virt port.
</summary>
@@ -66944,7 +66990,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virt_client_packets" lineno="95930">
+<interface name="corenet_send_virt_client_packets" lineno="91276">
<summary>
Send virt_client packets.
</summary>
@@ -66955,7 +67001,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virt_client_packets" lineno="95949">
+<interface name="corenet_dontaudit_send_virt_client_packets" lineno="91295">
<summary>
Do not audit attempts to send virt_client packets.
</summary>
@@ -66966,7 +67012,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virt_client_packets" lineno="95968">
+<interface name="corenet_receive_virt_client_packets" lineno="91314">
<summary>
Receive virt_client packets.
</summary>
@@ -66977,7 +67023,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="95987">
+<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="91333">
<summary>
Do not audit attempts to receive virt_client packets.
</summary>
@@ -66988,7 +67034,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virt_client_packets" lineno="96006">
+<interface name="corenet_sendrecv_virt_client_packets" lineno="91352">
<summary>
Send and receive virt_client packets.
</summary>
@@ -66999,7 +67045,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="96022">
+<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="91368">
<summary>
Do not audit attempts to send and receive virt_client packets.
</summary>
@@ -67010,7 +67056,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virt_client_packets" lineno="96037">
+<interface name="corenet_relabelto_virt_client_packets" lineno="91383">
<summary>
Relabel packets to virt_client the packet type.
</summary>
@@ -67020,7 +67066,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virt_server_packets" lineno="96057">
+<interface name="corenet_send_virt_server_packets" lineno="91403">
<summary>
Send virt_server packets.
</summary>
@@ -67031,7 +67077,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virt_server_packets" lineno="96076">
+<interface name="corenet_dontaudit_send_virt_server_packets" lineno="91422">
<summary>
Do not audit attempts to send virt_server packets.
</summary>
@@ -67042,7 +67088,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virt_server_packets" lineno="96095">
+<interface name="corenet_receive_virt_server_packets" lineno="91441">
<summary>
Receive virt_server packets.
</summary>
@@ -67053,7 +67099,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="96114">
+<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="91460">
<summary>
Do not audit attempts to receive virt_server packets.
</summary>
@@ -67064,7 +67110,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virt_server_packets" lineno="96133">
+<interface name="corenet_sendrecv_virt_server_packets" lineno="91479">
<summary>
Send and receive virt_server packets.
</summary>
@@ -67075,7 +67121,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="96149">
+<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="91495">
<summary>
Do not audit attempts to send and receive virt_server packets.
</summary>
@@ -67086,7 +67132,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virt_server_packets" lineno="96164">
+<interface name="corenet_relabelto_virt_server_packets" lineno="91510">
<summary>
Relabel packets to virt_server the packet type.
</summary>
@@ -67096,7 +67142,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="96186">
+<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="91532">
<summary>
Send and receive TCP traffic on the virtual_places port.
</summary>
@@ -67107,7 +67153,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_virtual_places_port" lineno="96205">
+<interface name="corenet_udp_send_virtual_places_port" lineno="91547">
<summary>
Send UDP traffic on the virtual_places port.
</summary>
@@ -67118,7 +67164,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="96224">
+<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="91562">
<summary>
Do not audit attempts to send UDP traffic on the virtual_places port.
</summary>
@@ -67129,7 +67175,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_virtual_places_port" lineno="96243">
+<interface name="corenet_udp_receive_virtual_places_port" lineno="91577">
<summary>
Receive UDP traffic on the virtual_places port.
</summary>
@@ -67140,7 +67186,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="96262">
+<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="91592">
<summary>
Do not audit attempts to receive UDP traffic on the virtual_places port.
</summary>
@@ -67151,7 +67197,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="96281">
+<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="91607">
<summary>
Send and receive UDP traffic on the virtual_places port.
</summary>
@@ -67162,7 +67208,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="96298">
+<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="91623">
<summary>
Do not audit attempts to send and receive
UDP traffic on the virtual_places port.
@@ -67174,7 +67220,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_virtual_places_port" lineno="96314">
+<interface name="corenet_tcp_bind_virtual_places_port" lineno="91638">
<summary>
Bind TCP sockets to the virtual_places port.
</summary>
@@ -67185,7 +67231,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_virtual_places_port" lineno="96334">
+<interface name="corenet_udp_bind_virtual_places_port" lineno="91658">
<summary>
Bind UDP sockets to the virtual_places port.
</summary>
@@ -67196,7 +67242,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_virtual_places_port" lineno="96353">
+<interface name="corenet_tcp_connect_virtual_places_port" lineno="91677">
<summary>
Make a TCP connection to the virtual_places port.
</summary>
@@ -67206,7 +67252,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virtual_places_client_packets" lineno="96373">
+<interface name="corenet_send_virtual_places_client_packets" lineno="91697">
<summary>
Send virtual_places_client packets.
</summary>
@@ -67217,7 +67263,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="96392">
+<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="91716">
<summary>
Do not audit attempts to send virtual_places_client packets.
</summary>
@@ -67228,7 +67274,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virtual_places_client_packets" lineno="96411">
+<interface name="corenet_receive_virtual_places_client_packets" lineno="91735">
<summary>
Receive virtual_places_client packets.
</summary>
@@ -67239,7 +67285,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="96430">
+<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="91754">
<summary>
Do not audit attempts to receive virtual_places_client packets.
</summary>
@@ -67250,7 +67296,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="96449">
+<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="91773">
<summary>
Send and receive virtual_places_client packets.
</summary>
@@ -67261,7 +67307,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="96465">
+<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="91789">
<summary>
Do not audit attempts to send and receive virtual_places_client packets.
</summary>
@@ -67272,7 +67318,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virtual_places_client_packets" lineno="96480">
+<interface name="corenet_relabelto_virtual_places_client_packets" lineno="91804">
<summary>
Relabel packets to virtual_places_client the packet type.
</summary>
@@ -67282,7 +67328,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virtual_places_server_packets" lineno="96500">
+<interface name="corenet_send_virtual_places_server_packets" lineno="91824">
<summary>
Send virtual_places_server packets.
</summary>
@@ -67293,7 +67339,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="96519">
+<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="91843">
<summary>
Do not audit attempts to send virtual_places_server packets.
</summary>
@@ -67304,7 +67350,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virtual_places_server_packets" lineno="96538">
+<interface name="corenet_receive_virtual_places_server_packets" lineno="91862">
<summary>
Receive virtual_places_server packets.
</summary>
@@ -67315,7 +67361,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="96557">
+<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="91881">
<summary>
Do not audit attempts to receive virtual_places_server packets.
</summary>
@@ -67326,7 +67372,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="96576">
+<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="91900">
<summary>
Send and receive virtual_places_server packets.
</summary>
@@ -67337,7 +67383,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="96592">
+<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="91916">
<summary>
Do not audit attempts to send and receive virtual_places_server packets.
</summary>
@@ -67348,7 +67394,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virtual_places_server_packets" lineno="96607">
+<interface name="corenet_relabelto_virtual_places_server_packets" lineno="91931">
<summary>
Relabel packets to virtual_places_server the packet type.
</summary>
@@ -67358,7 +67404,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="96629">
+<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="91953">
<summary>
Send and receive TCP traffic on the virt_migration port.
</summary>
@@ -67369,7 +67415,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_virt_migration_port" lineno="96648">
+<interface name="corenet_udp_send_virt_migration_port" lineno="91968">
<summary>
Send UDP traffic on the virt_migration port.
</summary>
@@ -67380,7 +67426,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="96667">
+<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="91983">
<summary>
Do not audit attempts to send UDP traffic on the virt_migration port.
</summary>
@@ -67391,7 +67437,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_virt_migration_port" lineno="96686">
+<interface name="corenet_udp_receive_virt_migration_port" lineno="91998">
<summary>
Receive UDP traffic on the virt_migration port.
</summary>
@@ -67402,7 +67448,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="96705">
+<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="92013">
<summary>
Do not audit attempts to receive UDP traffic on the virt_migration port.
</summary>
@@ -67413,7 +67459,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="96724">
+<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="92028">
<summary>
Send and receive UDP traffic on the virt_migration port.
</summary>
@@ -67424,7 +67470,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="96741">
+<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="92044">
<summary>
Do not audit attempts to send and receive
UDP traffic on the virt_migration port.
@@ -67436,7 +67482,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_virt_migration_port" lineno="96757">
+<interface name="corenet_tcp_bind_virt_migration_port" lineno="92059">
<summary>
Bind TCP sockets to the virt_migration port.
</summary>
@@ -67447,7 +67493,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_virt_migration_port" lineno="96777">
+<interface name="corenet_udp_bind_virt_migration_port" lineno="92079">
<summary>
Bind UDP sockets to the virt_migration port.
</summary>
@@ -67458,7 +67504,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_virt_migration_port" lineno="96796">
+<interface name="corenet_tcp_connect_virt_migration_port" lineno="92098">
<summary>
Make a TCP connection to the virt_migration port.
</summary>
@@ -67468,7 +67514,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virt_migration_client_packets" lineno="96816">
+<interface name="corenet_send_virt_migration_client_packets" lineno="92118">
<summary>
Send virt_migration_client packets.
</summary>
@@ -67479,7 +67525,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="96835">
+<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="92137">
<summary>
Do not audit attempts to send virt_migration_client packets.
</summary>
@@ -67490,7 +67536,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virt_migration_client_packets" lineno="96854">
+<interface name="corenet_receive_virt_migration_client_packets" lineno="92156">
<summary>
Receive virt_migration_client packets.
</summary>
@@ -67501,7 +67547,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="96873">
+<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="92175">
<summary>
Do not audit attempts to receive virt_migration_client packets.
</summary>
@@ -67512,7 +67558,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="96892">
+<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="92194">
<summary>
Send and receive virt_migration_client packets.
</summary>
@@ -67523,7 +67569,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="96908">
+<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="92210">
<summary>
Do not audit attempts to send and receive virt_migration_client packets.
</summary>
@@ -67534,7 +67580,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virt_migration_client_packets" lineno="96923">
+<interface name="corenet_relabelto_virt_migration_client_packets" lineno="92225">
<summary>
Relabel packets to virt_migration_client the packet type.
</summary>
@@ -67544,7 +67590,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_virt_migration_server_packets" lineno="96943">
+<interface name="corenet_send_virt_migration_server_packets" lineno="92245">
<summary>
Send virt_migration_server packets.
</summary>
@@ -67555,7 +67601,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="96962">
+<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="92264">
<summary>
Do not audit attempts to send virt_migration_server packets.
</summary>
@@ -67566,7 +67612,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_virt_migration_server_packets" lineno="96981">
+<interface name="corenet_receive_virt_migration_server_packets" lineno="92283">
<summary>
Receive virt_migration_server packets.
</summary>
@@ -67577,7 +67623,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="97000">
+<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="92302">
<summary>
Do not audit attempts to receive virt_migration_server packets.
</summary>
@@ -67588,7 +67634,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="97019">
+<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="92321">
<summary>
Send and receive virt_migration_server packets.
</summary>
@@ -67599,7 +67645,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="97035">
+<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="92337">
<summary>
Do not audit attempts to send and receive virt_migration_server packets.
</summary>
@@ -67610,7 +67656,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_virt_migration_server_packets" lineno="97050">
+<interface name="corenet_relabelto_virt_migration_server_packets" lineno="92352">
<summary>
Relabel packets to virt_migration_server the packet type.
</summary>
@@ -67620,7 +67666,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_vnc_port" lineno="97072">
+<interface name="corenet_tcp_sendrecv_vnc_port" lineno="92374">
<summary>
Send and receive TCP traffic on the vnc port.
</summary>
@@ -67631,7 +67677,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_vnc_port" lineno="97091">
+<interface name="corenet_udp_send_vnc_port" lineno="92389">
<summary>
Send UDP traffic on the vnc port.
</summary>
@@ -67642,7 +67688,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="97110">
+<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="92404">
<summary>
Do not audit attempts to send UDP traffic on the vnc port.
</summary>
@@ -67653,7 +67699,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_vnc_port" lineno="97129">
+<interface name="corenet_udp_receive_vnc_port" lineno="92419">
<summary>
Receive UDP traffic on the vnc port.
</summary>
@@ -67664,7 +67710,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="97148">
+<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="92434">
<summary>
Do not audit attempts to receive UDP traffic on the vnc port.
</summary>
@@ -67675,7 +67721,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_vnc_port" lineno="97167">
+<interface name="corenet_udp_sendrecv_vnc_port" lineno="92449">
<summary>
Send and receive UDP traffic on the vnc port.
</summary>
@@ -67686,7 +67732,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="97184">
+<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="92465">
<summary>
Do not audit attempts to send and receive
UDP traffic on the vnc port.
@@ -67698,7 +67744,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_vnc_port" lineno="97200">
+<interface name="corenet_tcp_bind_vnc_port" lineno="92480">
<summary>
Bind TCP sockets to the vnc port.
</summary>
@@ -67709,7 +67755,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_vnc_port" lineno="97220">
+<interface name="corenet_udp_bind_vnc_port" lineno="92500">
<summary>
Bind UDP sockets to the vnc port.
</summary>
@@ -67720,7 +67766,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_vnc_port" lineno="97239">
+<interface name="corenet_tcp_connect_vnc_port" lineno="92519">
<summary>
Make a TCP connection to the vnc port.
</summary>
@@ -67730,7 +67776,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_vnc_client_packets" lineno="97259">
+<interface name="corenet_send_vnc_client_packets" lineno="92539">
<summary>
Send vnc_client packets.
</summary>
@@ -67741,7 +67787,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="97278">
+<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="92558">
<summary>
Do not audit attempts to send vnc_client packets.
</summary>
@@ -67752,7 +67798,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_vnc_client_packets" lineno="97297">
+<interface name="corenet_receive_vnc_client_packets" lineno="92577">
<summary>
Receive vnc_client packets.
</summary>
@@ -67763,7 +67809,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="97316">
+<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="92596">
<summary>
Do not audit attempts to receive vnc_client packets.
</summary>
@@ -67774,7 +67820,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_vnc_client_packets" lineno="97335">
+<interface name="corenet_sendrecv_vnc_client_packets" lineno="92615">
<summary>
Send and receive vnc_client packets.
</summary>
@@ -67785,7 +67831,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="97351">
+<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="92631">
<summary>
Do not audit attempts to send and receive vnc_client packets.
</summary>
@@ -67796,7 +67842,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_vnc_client_packets" lineno="97366">
+<interface name="corenet_relabelto_vnc_client_packets" lineno="92646">
<summary>
Relabel packets to vnc_client the packet type.
</summary>
@@ -67806,7 +67852,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_vnc_server_packets" lineno="97386">
+<interface name="corenet_send_vnc_server_packets" lineno="92666">
<summary>
Send vnc_server packets.
</summary>
@@ -67817,7 +67863,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="97405">
+<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="92685">
<summary>
Do not audit attempts to send vnc_server packets.
</summary>
@@ -67828,7 +67874,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_vnc_server_packets" lineno="97424">
+<interface name="corenet_receive_vnc_server_packets" lineno="92704">
<summary>
Receive vnc_server packets.
</summary>
@@ -67839,7 +67885,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="97443">
+<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="92723">
<summary>
Do not audit attempts to receive vnc_server packets.
</summary>
@@ -67850,7 +67896,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_vnc_server_packets" lineno="97462">
+<interface name="corenet_sendrecv_vnc_server_packets" lineno="92742">
<summary>
Send and receive vnc_server packets.
</summary>
@@ -67861,7 +67907,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="97478">
+<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="92758">
<summary>
Do not audit attempts to send and receive vnc_server packets.
</summary>
@@ -67872,7 +67918,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_vnc_server_packets" lineno="97493">
+<interface name="corenet_relabelto_vnc_server_packets" lineno="92773">
<summary>
Relabel packets to vnc_server the packet type.
</summary>
@@ -67882,7 +67928,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_wccp_port" lineno="97515">
+<interface name="corenet_tcp_sendrecv_wccp_port" lineno="92795">
<summary>
Send and receive TCP traffic on the wccp port.
</summary>
@@ -67893,7 +67939,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_wccp_port" lineno="97534">
+<interface name="corenet_udp_send_wccp_port" lineno="92810">
<summary>
Send UDP traffic on the wccp port.
</summary>
@@ -67904,7 +67950,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="97553">
+<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="92825">
<summary>
Do not audit attempts to send UDP traffic on the wccp port.
</summary>
@@ -67915,7 +67961,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_wccp_port" lineno="97572">
+<interface name="corenet_udp_receive_wccp_port" lineno="92840">
<summary>
Receive UDP traffic on the wccp port.
</summary>
@@ -67926,7 +67972,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="97591">
+<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="92855">
<summary>
Do not audit attempts to receive UDP traffic on the wccp port.
</summary>
@@ -67937,7 +67983,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_wccp_port" lineno="97610">
+<interface name="corenet_udp_sendrecv_wccp_port" lineno="92870">
<summary>
Send and receive UDP traffic on the wccp port.
</summary>
@@ -67948,7 +67994,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="97627">
+<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="92886">
<summary>
Do not audit attempts to send and receive
UDP traffic on the wccp port.
@@ -67960,7 +68006,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_wccp_port" lineno="97643">
+<interface name="corenet_tcp_bind_wccp_port" lineno="92901">
<summary>
Bind TCP sockets to the wccp port.
</summary>
@@ -67971,7 +68017,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_wccp_port" lineno="97663">
+<interface name="corenet_udp_bind_wccp_port" lineno="92921">
<summary>
Bind UDP sockets to the wccp port.
</summary>
@@ -67982,7 +68028,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_wccp_port" lineno="97682">
+<interface name="corenet_tcp_connect_wccp_port" lineno="92940">
<summary>
Make a TCP connection to the wccp port.
</summary>
@@ -67992,7 +68038,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wccp_client_packets" lineno="97702">
+<interface name="corenet_send_wccp_client_packets" lineno="92960">
<summary>
Send wccp_client packets.
</summary>
@@ -68003,7 +68049,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="97721">
+<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="92979">
<summary>
Do not audit attempts to send wccp_client packets.
</summary>
@@ -68014,7 +68060,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wccp_client_packets" lineno="97740">
+<interface name="corenet_receive_wccp_client_packets" lineno="92998">
<summary>
Receive wccp_client packets.
</summary>
@@ -68025,7 +68071,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="97759">
+<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="93017">
<summary>
Do not audit attempts to receive wccp_client packets.
</summary>
@@ -68036,7 +68082,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wccp_client_packets" lineno="97778">
+<interface name="corenet_sendrecv_wccp_client_packets" lineno="93036">
<summary>
Send and receive wccp_client packets.
</summary>
@@ -68047,7 +68093,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="97794">
+<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="93052">
<summary>
Do not audit attempts to send and receive wccp_client packets.
</summary>
@@ -68058,7 +68104,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wccp_client_packets" lineno="97809">
+<interface name="corenet_relabelto_wccp_client_packets" lineno="93067">
<summary>
Relabel packets to wccp_client the packet type.
</summary>
@@ -68068,7 +68114,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wccp_server_packets" lineno="97829">
+<interface name="corenet_send_wccp_server_packets" lineno="93087">
<summary>
Send wccp_server packets.
</summary>
@@ -68079,7 +68125,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="97848">
+<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="93106">
<summary>
Do not audit attempts to send wccp_server packets.
</summary>
@@ -68090,7 +68136,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wccp_server_packets" lineno="97867">
+<interface name="corenet_receive_wccp_server_packets" lineno="93125">
<summary>
Receive wccp_server packets.
</summary>
@@ -68101,7 +68147,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="97886">
+<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="93144">
<summary>
Do not audit attempts to receive wccp_server packets.
</summary>
@@ -68112,7 +68158,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wccp_server_packets" lineno="97905">
+<interface name="corenet_sendrecv_wccp_server_packets" lineno="93163">
<summary>
Send and receive wccp_server packets.
</summary>
@@ -68123,7 +68169,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="97921">
+<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="93179">
<summary>
Do not audit attempts to send and receive wccp_server packets.
</summary>
@@ -68134,7 +68180,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wccp_server_packets" lineno="97936">
+<interface name="corenet_relabelto_wccp_server_packets" lineno="93194">
<summary>
Relabel packets to wccp_server the packet type.
</summary>
@@ -68144,7 +68190,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_websm_port" lineno="97958">
+<interface name="corenet_tcp_sendrecv_websm_port" lineno="93216">
<summary>
Send and receive TCP traffic on the websm port.
</summary>
@@ -68155,7 +68201,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_websm_port" lineno="97977">
+<interface name="corenet_udp_send_websm_port" lineno="93231">
<summary>
Send UDP traffic on the websm port.
</summary>
@@ -68166,7 +68212,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_websm_port" lineno="97996">
+<interface name="corenet_dontaudit_udp_send_websm_port" lineno="93246">
<summary>
Do not audit attempts to send UDP traffic on the websm port.
</summary>
@@ -68177,7 +68223,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_websm_port" lineno="98015">
+<interface name="corenet_udp_receive_websm_port" lineno="93261">
<summary>
Receive UDP traffic on the websm port.
</summary>
@@ -68188,7 +68234,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="98034">
+<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="93276">
<summary>
Do not audit attempts to receive UDP traffic on the websm port.
</summary>
@@ -68199,7 +68245,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_websm_port" lineno="98053">
+<interface name="corenet_udp_sendrecv_websm_port" lineno="93291">
<summary>
Send and receive UDP traffic on the websm port.
</summary>
@@ -68210,7 +68256,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="98070">
+<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="93307">
<summary>
Do not audit attempts to send and receive
UDP traffic on the websm port.
@@ -68222,7 +68268,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_websm_port" lineno="98086">
+<interface name="corenet_tcp_bind_websm_port" lineno="93322">
<summary>
Bind TCP sockets to the websm port.
</summary>
@@ -68233,7 +68279,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_websm_port" lineno="98106">
+<interface name="corenet_udp_bind_websm_port" lineno="93342">
<summary>
Bind UDP sockets to the websm port.
</summary>
@@ -68244,7 +68290,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_websm_port" lineno="98125">
+<interface name="corenet_tcp_connect_websm_port" lineno="93361">
<summary>
Make a TCP connection to the websm port.
</summary>
@@ -68254,7 +68300,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_websm_client_packets" lineno="98145">
+<interface name="corenet_send_websm_client_packets" lineno="93381">
<summary>
Send websm_client packets.
</summary>
@@ -68265,7 +68311,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_websm_client_packets" lineno="98164">
+<interface name="corenet_dontaudit_send_websm_client_packets" lineno="93400">
<summary>
Do not audit attempts to send websm_client packets.
</summary>
@@ -68276,7 +68322,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_websm_client_packets" lineno="98183">
+<interface name="corenet_receive_websm_client_packets" lineno="93419">
<summary>
Receive websm_client packets.
</summary>
@@ -68287,7 +68333,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="98202">
+<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="93438">
<summary>
Do not audit attempts to receive websm_client packets.
</summary>
@@ -68298,7 +68344,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_websm_client_packets" lineno="98221">
+<interface name="corenet_sendrecv_websm_client_packets" lineno="93457">
<summary>
Send and receive websm_client packets.
</summary>
@@ -68309,7 +68355,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="98237">
+<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="93473">
<summary>
Do not audit attempts to send and receive websm_client packets.
</summary>
@@ -68320,7 +68366,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_websm_client_packets" lineno="98252">
+<interface name="corenet_relabelto_websm_client_packets" lineno="93488">
<summary>
Relabel packets to websm_client the packet type.
</summary>
@@ -68330,7 +68376,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_websm_server_packets" lineno="98272">
+<interface name="corenet_send_websm_server_packets" lineno="93508">
<summary>
Send websm_server packets.
</summary>
@@ -68341,7 +68387,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_websm_server_packets" lineno="98291">
+<interface name="corenet_dontaudit_send_websm_server_packets" lineno="93527">
<summary>
Do not audit attempts to send websm_server packets.
</summary>
@@ -68352,7 +68398,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_websm_server_packets" lineno="98310">
+<interface name="corenet_receive_websm_server_packets" lineno="93546">
<summary>
Receive websm_server packets.
</summary>
@@ -68363,7 +68409,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="98329">
+<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="93565">
<summary>
Do not audit attempts to receive websm_server packets.
</summary>
@@ -68374,7 +68420,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_websm_server_packets" lineno="98348">
+<interface name="corenet_sendrecv_websm_server_packets" lineno="93584">
<summary>
Send and receive websm_server packets.
</summary>
@@ -68385,7 +68431,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="98364">
+<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="93600">
<summary>
Do not audit attempts to send and receive websm_server packets.
</summary>
@@ -68396,7 +68442,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_websm_server_packets" lineno="98379">
+<interface name="corenet_relabelto_websm_server_packets" lineno="93615">
<summary>
Relabel packets to websm_server the packet type.
</summary>
@@ -68406,7 +68452,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_whois_port" lineno="98401">
+<interface name="corenet_tcp_sendrecv_whois_port" lineno="93637">
<summary>
Send and receive TCP traffic on the whois port.
</summary>
@@ -68417,7 +68463,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_whois_port" lineno="98420">
+<interface name="corenet_udp_send_whois_port" lineno="93652">
<summary>
Send UDP traffic on the whois port.
</summary>
@@ -68428,7 +68474,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_whois_port" lineno="98439">
+<interface name="corenet_dontaudit_udp_send_whois_port" lineno="93667">
<summary>
Do not audit attempts to send UDP traffic on the whois port.
</summary>
@@ -68439,7 +68485,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_whois_port" lineno="98458">
+<interface name="corenet_udp_receive_whois_port" lineno="93682">
<summary>
Receive UDP traffic on the whois port.
</summary>
@@ -68450,7 +68496,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="98477">
+<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="93697">
<summary>
Do not audit attempts to receive UDP traffic on the whois port.
</summary>
@@ -68461,7 +68507,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_whois_port" lineno="98496">
+<interface name="corenet_udp_sendrecv_whois_port" lineno="93712">
<summary>
Send and receive UDP traffic on the whois port.
</summary>
@@ -68472,7 +68518,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="98513">
+<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="93728">
<summary>
Do not audit attempts to send and receive
UDP traffic on the whois port.
@@ -68484,7 +68530,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_whois_port" lineno="98529">
+<interface name="corenet_tcp_bind_whois_port" lineno="93743">
<summary>
Bind TCP sockets to the whois port.
</summary>
@@ -68495,7 +68541,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_whois_port" lineno="98549">
+<interface name="corenet_udp_bind_whois_port" lineno="93763">
<summary>
Bind UDP sockets to the whois port.
</summary>
@@ -68506,7 +68552,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_whois_port" lineno="98568">
+<interface name="corenet_tcp_connect_whois_port" lineno="93782">
<summary>
Make a TCP connection to the whois port.
</summary>
@@ -68516,7 +68562,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_whois_client_packets" lineno="98588">
+<interface name="corenet_send_whois_client_packets" lineno="93802">
<summary>
Send whois_client packets.
</summary>
@@ -68527,7 +68573,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_whois_client_packets" lineno="98607">
+<interface name="corenet_dontaudit_send_whois_client_packets" lineno="93821">
<summary>
Do not audit attempts to send whois_client packets.
</summary>
@@ -68538,7 +68584,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_whois_client_packets" lineno="98626">
+<interface name="corenet_receive_whois_client_packets" lineno="93840">
<summary>
Receive whois_client packets.
</summary>
@@ -68549,7 +68595,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="98645">
+<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="93859">
<summary>
Do not audit attempts to receive whois_client packets.
</summary>
@@ -68560,7 +68606,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_whois_client_packets" lineno="98664">
+<interface name="corenet_sendrecv_whois_client_packets" lineno="93878">
<summary>
Send and receive whois_client packets.
</summary>
@@ -68571,7 +68617,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="98680">
+<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="93894">
<summary>
Do not audit attempts to send and receive whois_client packets.
</summary>
@@ -68582,7 +68628,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_whois_client_packets" lineno="98695">
+<interface name="corenet_relabelto_whois_client_packets" lineno="93909">
<summary>
Relabel packets to whois_client the packet type.
</summary>
@@ -68592,7 +68638,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_whois_server_packets" lineno="98715">
+<interface name="corenet_send_whois_server_packets" lineno="93929">
<summary>
Send whois_server packets.
</summary>
@@ -68603,7 +68649,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_whois_server_packets" lineno="98734">
+<interface name="corenet_dontaudit_send_whois_server_packets" lineno="93948">
<summary>
Do not audit attempts to send whois_server packets.
</summary>
@@ -68614,7 +68660,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_whois_server_packets" lineno="98753">
+<interface name="corenet_receive_whois_server_packets" lineno="93967">
<summary>
Receive whois_server packets.
</summary>
@@ -68625,7 +68671,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="98772">
+<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="93986">
<summary>
Do not audit attempts to receive whois_server packets.
</summary>
@@ -68636,7 +68682,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_whois_server_packets" lineno="98791">
+<interface name="corenet_sendrecv_whois_server_packets" lineno="94005">
<summary>
Send and receive whois_server packets.
</summary>
@@ -68647,7 +68693,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="98807">
+<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="94021">
<summary>
Do not audit attempts to send and receive whois_server packets.
</summary>
@@ -68658,7 +68704,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_whois_server_packets" lineno="98822">
+<interface name="corenet_relabelto_whois_server_packets" lineno="94036">
<summary>
Relabel packets to whois_server the packet type.
</summary>
@@ -68668,7 +68714,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="98844">
+<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="94058">
<summary>
Send and receive TCP traffic on the winshadow port.
</summary>
@@ -68679,7 +68725,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_winshadow_port" lineno="98863">
+<interface name="corenet_udp_send_winshadow_port" lineno="94073">
<summary>
Send UDP traffic on the winshadow port.
</summary>
@@ -68690,7 +68736,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="98882">
+<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="94088">
<summary>
Do not audit attempts to send UDP traffic on the winshadow port.
</summary>
@@ -68701,7 +68747,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_winshadow_port" lineno="98901">
+<interface name="corenet_udp_receive_winshadow_port" lineno="94103">
<summary>
Receive UDP traffic on the winshadow port.
</summary>
@@ -68712,7 +68758,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="98920">
+<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="94118">
<summary>
Do not audit attempts to receive UDP traffic on the winshadow port.
</summary>
@@ -68723,7 +68769,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_winshadow_port" lineno="98939">
+<interface name="corenet_udp_sendrecv_winshadow_port" lineno="94133">
<summary>
Send and receive UDP traffic on the winshadow port.
</summary>
@@ -68734,7 +68780,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="98956">
+<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="94149">
<summary>
Do not audit attempts to send and receive
UDP traffic on the winshadow port.
@@ -68746,7 +68792,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_winshadow_port" lineno="98972">
+<interface name="corenet_tcp_bind_winshadow_port" lineno="94164">
<summary>
Bind TCP sockets to the winshadow port.
</summary>
@@ -68757,7 +68803,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_winshadow_port" lineno="98992">
+<interface name="corenet_udp_bind_winshadow_port" lineno="94184">
<summary>
Bind UDP sockets to the winshadow port.
</summary>
@@ -68768,7 +68814,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_winshadow_port" lineno="99011">
+<interface name="corenet_tcp_connect_winshadow_port" lineno="94203">
<summary>
Make a TCP connection to the winshadow port.
</summary>
@@ -68778,7 +68824,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_winshadow_client_packets" lineno="99031">
+<interface name="corenet_send_winshadow_client_packets" lineno="94223">
<summary>
Send winshadow_client packets.
</summary>
@@ -68789,7 +68835,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="99050">
+<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="94242">
<summary>
Do not audit attempts to send winshadow_client packets.
</summary>
@@ -68800,7 +68846,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_winshadow_client_packets" lineno="99069">
+<interface name="corenet_receive_winshadow_client_packets" lineno="94261">
<summary>
Receive winshadow_client packets.
</summary>
@@ -68811,7 +68857,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="99088">
+<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="94280">
<summary>
Do not audit attempts to receive winshadow_client packets.
</summary>
@@ -68822,7 +68868,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_winshadow_client_packets" lineno="99107">
+<interface name="corenet_sendrecv_winshadow_client_packets" lineno="94299">
<summary>
Send and receive winshadow_client packets.
</summary>
@@ -68833,7 +68879,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="99123">
+<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="94315">
<summary>
Do not audit attempts to send and receive winshadow_client packets.
</summary>
@@ -68844,7 +68890,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_winshadow_client_packets" lineno="99138">
+<interface name="corenet_relabelto_winshadow_client_packets" lineno="94330">
<summary>
Relabel packets to winshadow_client the packet type.
</summary>
@@ -68854,7 +68900,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_winshadow_server_packets" lineno="99158">
+<interface name="corenet_send_winshadow_server_packets" lineno="94350">
<summary>
Send winshadow_server packets.
</summary>
@@ -68865,7 +68911,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="99177">
+<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="94369">
<summary>
Do not audit attempts to send winshadow_server packets.
</summary>
@@ -68876,7 +68922,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_winshadow_server_packets" lineno="99196">
+<interface name="corenet_receive_winshadow_server_packets" lineno="94388">
<summary>
Receive winshadow_server packets.
</summary>
@@ -68887,7 +68933,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="99215">
+<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="94407">
<summary>
Do not audit attempts to receive winshadow_server packets.
</summary>
@@ -68898,7 +68944,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_winshadow_server_packets" lineno="99234">
+<interface name="corenet_sendrecv_winshadow_server_packets" lineno="94426">
<summary>
Send and receive winshadow_server packets.
</summary>
@@ -68909,7 +68955,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="99250">
+<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="94442">
<summary>
Do not audit attempts to send and receive winshadow_server packets.
</summary>
@@ -68920,7 +68966,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_winshadow_server_packets" lineno="99265">
+<interface name="corenet_relabelto_winshadow_server_packets" lineno="94457">
<summary>
Relabel packets to winshadow_server the packet type.
</summary>
@@ -68930,7 +68976,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="99287">
+<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="94479">
<summary>
Send and receive TCP traffic on the wsdapi port.
</summary>
@@ -68941,7 +68987,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_wsdapi_port" lineno="99306">
+<interface name="corenet_udp_send_wsdapi_port" lineno="94494">
<summary>
Send UDP traffic on the wsdapi port.
</summary>
@@ -68952,7 +68998,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="99325">
+<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="94509">
<summary>
Do not audit attempts to send UDP traffic on the wsdapi port.
</summary>
@@ -68963,7 +69009,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_wsdapi_port" lineno="99344">
+<interface name="corenet_udp_receive_wsdapi_port" lineno="94524">
<summary>
Receive UDP traffic on the wsdapi port.
</summary>
@@ -68974,7 +69020,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="99363">
+<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="94539">
<summary>
Do not audit attempts to receive UDP traffic on the wsdapi port.
</summary>
@@ -68985,7 +69031,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="99382">
+<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="94554">
<summary>
Send and receive UDP traffic on the wsdapi port.
</summary>
@@ -68996,7 +69042,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="99399">
+<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="94570">
<summary>
Do not audit attempts to send and receive
UDP traffic on the wsdapi port.
@@ -69008,7 +69054,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_wsdapi_port" lineno="99415">
+<interface name="corenet_tcp_bind_wsdapi_port" lineno="94585">
<summary>
Bind TCP sockets to the wsdapi port.
</summary>
@@ -69019,7 +69065,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_wsdapi_port" lineno="99435">
+<interface name="corenet_udp_bind_wsdapi_port" lineno="94605">
<summary>
Bind UDP sockets to the wsdapi port.
</summary>
@@ -69030,7 +69076,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_wsdapi_port" lineno="99454">
+<interface name="corenet_tcp_connect_wsdapi_port" lineno="94624">
<summary>
Make a TCP connection to the wsdapi port.
</summary>
@@ -69040,7 +69086,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wsdapi_client_packets" lineno="99474">
+<interface name="corenet_send_wsdapi_client_packets" lineno="94644">
<summary>
Send wsdapi_client packets.
</summary>
@@ -69051,7 +69097,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="99493">
+<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="94663">
<summary>
Do not audit attempts to send wsdapi_client packets.
</summary>
@@ -69062,7 +69108,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wsdapi_client_packets" lineno="99512">
+<interface name="corenet_receive_wsdapi_client_packets" lineno="94682">
<summary>
Receive wsdapi_client packets.
</summary>
@@ -69073,7 +69119,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="99531">
+<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="94701">
<summary>
Do not audit attempts to receive wsdapi_client packets.
</summary>
@@ -69084,7 +69130,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="99550">
+<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="94720">
<summary>
Send and receive wsdapi_client packets.
</summary>
@@ -69095,7 +69141,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="99566">
+<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="94736">
<summary>
Do not audit attempts to send and receive wsdapi_client packets.
</summary>
@@ -69106,7 +69152,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wsdapi_client_packets" lineno="99581">
+<interface name="corenet_relabelto_wsdapi_client_packets" lineno="94751">
<summary>
Relabel packets to wsdapi_client the packet type.
</summary>
@@ -69116,7 +69162,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wsdapi_server_packets" lineno="99601">
+<interface name="corenet_send_wsdapi_server_packets" lineno="94771">
<summary>
Send wsdapi_server packets.
</summary>
@@ -69127,7 +69173,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="99620">
+<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="94790">
<summary>
Do not audit attempts to send wsdapi_server packets.
</summary>
@@ -69138,7 +69184,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wsdapi_server_packets" lineno="99639">
+<interface name="corenet_receive_wsdapi_server_packets" lineno="94809">
<summary>
Receive wsdapi_server packets.
</summary>
@@ -69149,7 +69195,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="99658">
+<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="94828">
<summary>
Do not audit attempts to receive wsdapi_server packets.
</summary>
@@ -69160,7 +69206,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="99677">
+<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="94847">
<summary>
Send and receive wsdapi_server packets.
</summary>
@@ -69171,7 +69217,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="99693">
+<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="94863">
<summary>
Do not audit attempts to send and receive wsdapi_server packets.
</summary>
@@ -69182,7 +69228,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wsdapi_server_packets" lineno="99708">
+<interface name="corenet_relabelto_wsdapi_server_packets" lineno="94878">
<summary>
Relabel packets to wsdapi_server the packet type.
</summary>
@@ -69192,7 +69238,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="99730">
+<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="94900">
<summary>
Send and receive TCP traffic on the wsicopy port.
</summary>
@@ -69203,7 +69249,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_wsicopy_port" lineno="99749">
+<interface name="corenet_udp_send_wsicopy_port" lineno="94915">
<summary>
Send UDP traffic on the wsicopy port.
</summary>
@@ -69214,7 +69260,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="99768">
+<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="94930">
<summary>
Do not audit attempts to send UDP traffic on the wsicopy port.
</summary>
@@ -69225,7 +69271,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_wsicopy_port" lineno="99787">
+<interface name="corenet_udp_receive_wsicopy_port" lineno="94945">
<summary>
Receive UDP traffic on the wsicopy port.
</summary>
@@ -69236,7 +69282,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="99806">
+<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="94960">
<summary>
Do not audit attempts to receive UDP traffic on the wsicopy port.
</summary>
@@ -69247,7 +69293,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="99825">
+<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="94975">
<summary>
Send and receive UDP traffic on the wsicopy port.
</summary>
@@ -69258,7 +69304,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="99842">
+<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="94991">
<summary>
Do not audit attempts to send and receive
UDP traffic on the wsicopy port.
@@ -69270,7 +69316,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_wsicopy_port" lineno="99858">
+<interface name="corenet_tcp_bind_wsicopy_port" lineno="95006">
<summary>
Bind TCP sockets to the wsicopy port.
</summary>
@@ -69281,7 +69327,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_wsicopy_port" lineno="99878">
+<interface name="corenet_udp_bind_wsicopy_port" lineno="95026">
<summary>
Bind UDP sockets to the wsicopy port.
</summary>
@@ -69292,7 +69338,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_wsicopy_port" lineno="99897">
+<interface name="corenet_tcp_connect_wsicopy_port" lineno="95045">
<summary>
Make a TCP connection to the wsicopy port.
</summary>
@@ -69302,7 +69348,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wsicopy_client_packets" lineno="99917">
+<interface name="corenet_send_wsicopy_client_packets" lineno="95065">
<summary>
Send wsicopy_client packets.
</summary>
@@ -69313,7 +69359,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="99936">
+<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="95084">
<summary>
Do not audit attempts to send wsicopy_client packets.
</summary>
@@ -69324,7 +69370,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wsicopy_client_packets" lineno="99955">
+<interface name="corenet_receive_wsicopy_client_packets" lineno="95103">
<summary>
Receive wsicopy_client packets.
</summary>
@@ -69335,7 +69381,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="99974">
+<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="95122">
<summary>
Do not audit attempts to receive wsicopy_client packets.
</summary>
@@ -69346,7 +69392,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="99993">
+<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="95141">
<summary>
Send and receive wsicopy_client packets.
</summary>
@@ -69357,7 +69403,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="100009">
+<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="95157">
<summary>
Do not audit attempts to send and receive wsicopy_client packets.
</summary>
@@ -69368,7 +69414,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wsicopy_client_packets" lineno="100024">
+<interface name="corenet_relabelto_wsicopy_client_packets" lineno="95172">
<summary>
Relabel packets to wsicopy_client the packet type.
</summary>
@@ -69378,7 +69424,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_wsicopy_server_packets" lineno="100044">
+<interface name="corenet_send_wsicopy_server_packets" lineno="95192">
<summary>
Send wsicopy_server packets.
</summary>
@@ -69389,7 +69435,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="100063">
+<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="95211">
<summary>
Do not audit attempts to send wsicopy_server packets.
</summary>
@@ -69400,7 +69446,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_wsicopy_server_packets" lineno="100082">
+<interface name="corenet_receive_wsicopy_server_packets" lineno="95230">
<summary>
Receive wsicopy_server packets.
</summary>
@@ -69411,7 +69457,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="100101">
+<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="95249">
<summary>
Do not audit attempts to receive wsicopy_server packets.
</summary>
@@ -69422,7 +69468,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="100120">
+<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="95268">
<summary>
Send and receive wsicopy_server packets.
</summary>
@@ -69433,7 +69479,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="100136">
+<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="95284">
<summary>
Do not audit attempts to send and receive wsicopy_server packets.
</summary>
@@ -69444,7 +69490,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_wsicopy_server_packets" lineno="100151">
+<interface name="corenet_relabelto_wsicopy_server_packets" lineno="95299">
<summary>
Relabel packets to wsicopy_server the packet type.
</summary>
@@ -69454,7 +69500,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="100173">
+<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="95321">
<summary>
Send and receive TCP traffic on the xdmcp port.
</summary>
@@ -69465,7 +69511,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_xdmcp_port" lineno="100192">
+<interface name="corenet_udp_send_xdmcp_port" lineno="95336">
<summary>
Send UDP traffic on the xdmcp port.
</summary>
@@ -69476,7 +69522,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="100211">
+<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="95351">
<summary>
Do not audit attempts to send UDP traffic on the xdmcp port.
</summary>
@@ -69487,7 +69533,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_xdmcp_port" lineno="100230">
+<interface name="corenet_udp_receive_xdmcp_port" lineno="95366">
<summary>
Receive UDP traffic on the xdmcp port.
</summary>
@@ -69498,7 +69544,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="100249">
+<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="95381">
<summary>
Do not audit attempts to receive UDP traffic on the xdmcp port.
</summary>
@@ -69509,7 +69555,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="100268">
+<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="95396">
<summary>
Send and receive UDP traffic on the xdmcp port.
</summary>
@@ -69520,7 +69566,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="100285">
+<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="95412">
<summary>
Do not audit attempts to send and receive
UDP traffic on the xdmcp port.
@@ -69532,7 +69578,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_xdmcp_port" lineno="100301">
+<interface name="corenet_tcp_bind_xdmcp_port" lineno="95427">
<summary>
Bind TCP sockets to the xdmcp port.
</summary>
@@ -69543,7 +69589,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_xdmcp_port" lineno="100321">
+<interface name="corenet_udp_bind_xdmcp_port" lineno="95447">
<summary>
Bind UDP sockets to the xdmcp port.
</summary>
@@ -69554,7 +69600,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_xdmcp_port" lineno="100340">
+<interface name="corenet_tcp_connect_xdmcp_port" lineno="95466">
<summary>
Make a TCP connection to the xdmcp port.
</summary>
@@ -69564,7 +69610,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xdmcp_client_packets" lineno="100360">
+<interface name="corenet_send_xdmcp_client_packets" lineno="95486">
<summary>
Send xdmcp_client packets.
</summary>
@@ -69575,7 +69621,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="100379">
+<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="95505">
<summary>
Do not audit attempts to send xdmcp_client packets.
</summary>
@@ -69586,7 +69632,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xdmcp_client_packets" lineno="100398">
+<interface name="corenet_receive_xdmcp_client_packets" lineno="95524">
<summary>
Receive xdmcp_client packets.
</summary>
@@ -69597,7 +69643,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="100417">
+<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="95543">
<summary>
Do not audit attempts to receive xdmcp_client packets.
</summary>
@@ -69608,7 +69654,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="100436">
+<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="95562">
<summary>
Send and receive xdmcp_client packets.
</summary>
@@ -69619,7 +69665,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="100452">
+<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="95578">
<summary>
Do not audit attempts to send and receive xdmcp_client packets.
</summary>
@@ -69630,7 +69676,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xdmcp_client_packets" lineno="100467">
+<interface name="corenet_relabelto_xdmcp_client_packets" lineno="95593">
<summary>
Relabel packets to xdmcp_client the packet type.
</summary>
@@ -69640,7 +69686,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xdmcp_server_packets" lineno="100487">
+<interface name="corenet_send_xdmcp_server_packets" lineno="95613">
<summary>
Send xdmcp_server packets.
</summary>
@@ -69651,7 +69697,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="100506">
+<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="95632">
<summary>
Do not audit attempts to send xdmcp_server packets.
</summary>
@@ -69662,7 +69708,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xdmcp_server_packets" lineno="100525">
+<interface name="corenet_receive_xdmcp_server_packets" lineno="95651">
<summary>
Receive xdmcp_server packets.
</summary>
@@ -69673,7 +69719,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="100544">
+<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="95670">
<summary>
Do not audit attempts to receive xdmcp_server packets.
</summary>
@@ -69684,7 +69730,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="100563">
+<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="95689">
<summary>
Send and receive xdmcp_server packets.
</summary>
@@ -69695,7 +69741,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="100579">
+<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="95705">
<summary>
Do not audit attempts to send and receive xdmcp_server packets.
</summary>
@@ -69706,7 +69752,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xdmcp_server_packets" lineno="100594">
+<interface name="corenet_relabelto_xdmcp_server_packets" lineno="95720">
<summary>
Relabel packets to xdmcp_server the packet type.
</summary>
@@ -69716,7 +69762,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_xen_port" lineno="100616">
+<interface name="corenet_tcp_sendrecv_xen_port" lineno="95742">
<summary>
Send and receive TCP traffic on the xen port.
</summary>
@@ -69727,7 +69773,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_xen_port" lineno="100635">
+<interface name="corenet_udp_send_xen_port" lineno="95757">
<summary>
Send UDP traffic on the xen port.
</summary>
@@ -69738,7 +69784,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_xen_port" lineno="100654">
+<interface name="corenet_dontaudit_udp_send_xen_port" lineno="95772">
<summary>
Do not audit attempts to send UDP traffic on the xen port.
</summary>
@@ -69749,7 +69795,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_xen_port" lineno="100673">
+<interface name="corenet_udp_receive_xen_port" lineno="95787">
<summary>
Receive UDP traffic on the xen port.
</summary>
@@ -69760,7 +69806,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="100692">
+<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="95802">
<summary>
Do not audit attempts to receive UDP traffic on the xen port.
</summary>
@@ -69771,7 +69817,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_xen_port" lineno="100711">
+<interface name="corenet_udp_sendrecv_xen_port" lineno="95817">
<summary>
Send and receive UDP traffic on the xen port.
</summary>
@@ -69782,7 +69828,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="100728">
+<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="95833">
<summary>
Do not audit attempts to send and receive
UDP traffic on the xen port.
@@ -69794,7 +69840,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_xen_port" lineno="100744">
+<interface name="corenet_tcp_bind_xen_port" lineno="95848">
<summary>
Bind TCP sockets to the xen port.
</summary>
@@ -69805,7 +69851,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_xen_port" lineno="100764">
+<interface name="corenet_udp_bind_xen_port" lineno="95868">
<summary>
Bind UDP sockets to the xen port.
</summary>
@@ -69816,7 +69862,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_xen_port" lineno="100783">
+<interface name="corenet_tcp_connect_xen_port" lineno="95887">
<summary>
Make a TCP connection to the xen port.
</summary>
@@ -69826,7 +69872,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xen_client_packets" lineno="100803">
+<interface name="corenet_send_xen_client_packets" lineno="95907">
<summary>
Send xen_client packets.
</summary>
@@ -69837,7 +69883,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xen_client_packets" lineno="100822">
+<interface name="corenet_dontaudit_send_xen_client_packets" lineno="95926">
<summary>
Do not audit attempts to send xen_client packets.
</summary>
@@ -69848,7 +69894,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xen_client_packets" lineno="100841">
+<interface name="corenet_receive_xen_client_packets" lineno="95945">
<summary>
Receive xen_client packets.
</summary>
@@ -69859,7 +69905,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="100860">
+<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="95964">
<summary>
Do not audit attempts to receive xen_client packets.
</summary>
@@ -69870,7 +69916,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xen_client_packets" lineno="100879">
+<interface name="corenet_sendrecv_xen_client_packets" lineno="95983">
<summary>
Send and receive xen_client packets.
</summary>
@@ -69881,7 +69927,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="100895">
+<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="95999">
<summary>
Do not audit attempts to send and receive xen_client packets.
</summary>
@@ -69892,7 +69938,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xen_client_packets" lineno="100910">
+<interface name="corenet_relabelto_xen_client_packets" lineno="96014">
<summary>
Relabel packets to xen_client the packet type.
</summary>
@@ -69902,7 +69948,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xen_server_packets" lineno="100930">
+<interface name="corenet_send_xen_server_packets" lineno="96034">
<summary>
Send xen_server packets.
</summary>
@@ -69913,7 +69959,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xen_server_packets" lineno="100949">
+<interface name="corenet_dontaudit_send_xen_server_packets" lineno="96053">
<summary>
Do not audit attempts to send xen_server packets.
</summary>
@@ -69924,7 +69970,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xen_server_packets" lineno="100968">
+<interface name="corenet_receive_xen_server_packets" lineno="96072">
<summary>
Receive xen_server packets.
</summary>
@@ -69935,7 +69981,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="100987">
+<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="96091">
<summary>
Do not audit attempts to receive xen_server packets.
</summary>
@@ -69946,7 +69992,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xen_server_packets" lineno="101006">
+<interface name="corenet_sendrecv_xen_server_packets" lineno="96110">
<summary>
Send and receive xen_server packets.
</summary>
@@ -69957,7 +70003,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="101022">
+<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="96126">
<summary>
Do not audit attempts to send and receive xen_server packets.
</summary>
@@ -69968,7 +70014,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xen_server_packets" lineno="101037">
+<interface name="corenet_relabelto_xen_server_packets" lineno="96141">
<summary>
Relabel packets to xen_server the packet type.
</summary>
@@ -69978,7 +70024,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_xfs_port" lineno="101059">
+<interface name="corenet_tcp_sendrecv_xfs_port" lineno="96163">
<summary>
Send and receive TCP traffic on the xfs port.
</summary>
@@ -69989,7 +70035,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_xfs_port" lineno="101078">
+<interface name="corenet_udp_send_xfs_port" lineno="96178">
<summary>
Send UDP traffic on the xfs port.
</summary>
@@ -70000,7 +70046,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="101097">
+<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="96193">
<summary>
Do not audit attempts to send UDP traffic on the xfs port.
</summary>
@@ -70011,7 +70057,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_xfs_port" lineno="101116">
+<interface name="corenet_udp_receive_xfs_port" lineno="96208">
<summary>
Receive UDP traffic on the xfs port.
</summary>
@@ -70022,7 +70068,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="101135">
+<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="96223">
<summary>
Do not audit attempts to receive UDP traffic on the xfs port.
</summary>
@@ -70033,7 +70079,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_xfs_port" lineno="101154">
+<interface name="corenet_udp_sendrecv_xfs_port" lineno="96238">
<summary>
Send and receive UDP traffic on the xfs port.
</summary>
@@ -70044,7 +70090,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="101171">
+<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="96254">
<summary>
Do not audit attempts to send and receive
UDP traffic on the xfs port.
@@ -70056,7 +70102,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_xfs_port" lineno="101187">
+<interface name="corenet_tcp_bind_xfs_port" lineno="96269">
<summary>
Bind TCP sockets to the xfs port.
</summary>
@@ -70067,7 +70113,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_xfs_port" lineno="101207">
+<interface name="corenet_udp_bind_xfs_port" lineno="96289">
<summary>
Bind UDP sockets to the xfs port.
</summary>
@@ -70078,7 +70124,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_xfs_port" lineno="101226">
+<interface name="corenet_tcp_connect_xfs_port" lineno="96308">
<summary>
Make a TCP connection to the xfs port.
</summary>
@@ -70088,7 +70134,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xfs_client_packets" lineno="101246">
+<interface name="corenet_send_xfs_client_packets" lineno="96328">
<summary>
Send xfs_client packets.
</summary>
@@ -70099,7 +70145,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="101265">
+<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="96347">
<summary>
Do not audit attempts to send xfs_client packets.
</summary>
@@ -70110,7 +70156,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xfs_client_packets" lineno="101284">
+<interface name="corenet_receive_xfs_client_packets" lineno="96366">
<summary>
Receive xfs_client packets.
</summary>
@@ -70121,7 +70167,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="101303">
+<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="96385">
<summary>
Do not audit attempts to receive xfs_client packets.
</summary>
@@ -70132,7 +70178,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xfs_client_packets" lineno="101322">
+<interface name="corenet_sendrecv_xfs_client_packets" lineno="96404">
<summary>
Send and receive xfs_client packets.
</summary>
@@ -70143,7 +70189,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="101338">
+<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="96420">
<summary>
Do not audit attempts to send and receive xfs_client packets.
</summary>
@@ -70154,7 +70200,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xfs_client_packets" lineno="101353">
+<interface name="corenet_relabelto_xfs_client_packets" lineno="96435">
<summary>
Relabel packets to xfs_client the packet type.
</summary>
@@ -70164,7 +70210,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xfs_server_packets" lineno="101373">
+<interface name="corenet_send_xfs_server_packets" lineno="96455">
<summary>
Send xfs_server packets.
</summary>
@@ -70175,7 +70221,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="101392">
+<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="96474">
<summary>
Do not audit attempts to send xfs_server packets.
</summary>
@@ -70186,7 +70232,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xfs_server_packets" lineno="101411">
+<interface name="corenet_receive_xfs_server_packets" lineno="96493">
<summary>
Receive xfs_server packets.
</summary>
@@ -70197,7 +70243,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="101430">
+<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="96512">
<summary>
Do not audit attempts to receive xfs_server packets.
</summary>
@@ -70208,7 +70254,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xfs_server_packets" lineno="101449">
+<interface name="corenet_sendrecv_xfs_server_packets" lineno="96531">
<summary>
Send and receive xfs_server packets.
</summary>
@@ -70219,7 +70265,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="101465">
+<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="96547">
<summary>
Do not audit attempts to send and receive xfs_server packets.
</summary>
@@ -70230,7 +70276,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xfs_server_packets" lineno="101480">
+<interface name="corenet_relabelto_xfs_server_packets" lineno="96562">
<summary>
Relabel packets to xfs_server the packet type.
</summary>
@@ -70240,7 +70286,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_xserver_port" lineno="101502">
+<interface name="corenet_tcp_sendrecv_xserver_port" lineno="96584">
<summary>
Send and receive TCP traffic on the xserver port.
</summary>
@@ -70251,7 +70297,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_xserver_port" lineno="101521">
+<interface name="corenet_udp_send_xserver_port" lineno="96599">
<summary>
Send UDP traffic on the xserver port.
</summary>
@@ -70262,7 +70308,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="101540">
+<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="96614">
<summary>
Do not audit attempts to send UDP traffic on the xserver port.
</summary>
@@ -70273,7 +70319,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_xserver_port" lineno="101559">
+<interface name="corenet_udp_receive_xserver_port" lineno="96629">
<summary>
Receive UDP traffic on the xserver port.
</summary>
@@ -70284,7 +70330,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="101578">
+<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="96644">
<summary>
Do not audit attempts to receive UDP traffic on the xserver port.
</summary>
@@ -70295,7 +70341,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_xserver_port" lineno="101597">
+<interface name="corenet_udp_sendrecv_xserver_port" lineno="96659">
<summary>
Send and receive UDP traffic on the xserver port.
</summary>
@@ -70306,7 +70352,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="101614">
+<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="96675">
<summary>
Do not audit attempts to send and receive
UDP traffic on the xserver port.
@@ -70318,7 +70364,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_xserver_port" lineno="101630">
+<interface name="corenet_tcp_bind_xserver_port" lineno="96690">
<summary>
Bind TCP sockets to the xserver port.
</summary>
@@ -70329,7 +70375,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_xserver_port" lineno="101650">
+<interface name="corenet_udp_bind_xserver_port" lineno="96710">
<summary>
Bind UDP sockets to the xserver port.
</summary>
@@ -70340,7 +70386,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_xserver_port" lineno="101669">
+<interface name="corenet_tcp_connect_xserver_port" lineno="96729">
<summary>
Make a TCP connection to the xserver port.
</summary>
@@ -70350,7 +70396,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xserver_client_packets" lineno="101689">
+<interface name="corenet_send_xserver_client_packets" lineno="96749">
<summary>
Send xserver_client packets.
</summary>
@@ -70361,7 +70407,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="101708">
+<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="96768">
<summary>
Do not audit attempts to send xserver_client packets.
</summary>
@@ -70372,7 +70418,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xserver_client_packets" lineno="101727">
+<interface name="corenet_receive_xserver_client_packets" lineno="96787">
<summary>
Receive xserver_client packets.
</summary>
@@ -70383,7 +70429,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="101746">
+<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="96806">
<summary>
Do not audit attempts to receive xserver_client packets.
</summary>
@@ -70394,7 +70440,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xserver_client_packets" lineno="101765">
+<interface name="corenet_sendrecv_xserver_client_packets" lineno="96825">
<summary>
Send and receive xserver_client packets.
</summary>
@@ -70405,7 +70451,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="101781">
+<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="96841">
<summary>
Do not audit attempts to send and receive xserver_client packets.
</summary>
@@ -70416,7 +70462,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xserver_client_packets" lineno="101796">
+<interface name="corenet_relabelto_xserver_client_packets" lineno="96856">
<summary>
Relabel packets to xserver_client the packet type.
</summary>
@@ -70426,7 +70472,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_xserver_server_packets" lineno="101816">
+<interface name="corenet_send_xserver_server_packets" lineno="96876">
<summary>
Send xserver_server packets.
</summary>
@@ -70437,7 +70483,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="101835">
+<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="96895">
<summary>
Do not audit attempts to send xserver_server packets.
</summary>
@@ -70448,7 +70494,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_xserver_server_packets" lineno="101854">
+<interface name="corenet_receive_xserver_server_packets" lineno="96914">
<summary>
Receive xserver_server packets.
</summary>
@@ -70459,7 +70505,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="101873">
+<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="96933">
<summary>
Do not audit attempts to receive xserver_server packets.
</summary>
@@ -70470,7 +70516,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_xserver_server_packets" lineno="101892">
+<interface name="corenet_sendrecv_xserver_server_packets" lineno="96952">
<summary>
Send and receive xserver_server packets.
</summary>
@@ -70481,7 +70527,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="101908">
+<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="96968">
<summary>
Do not audit attempts to send and receive xserver_server packets.
</summary>
@@ -70492,7 +70538,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_xserver_server_packets" lineno="101923">
+<interface name="corenet_relabelto_xserver_server_packets" lineno="96983">
<summary>
Relabel packets to xserver_server the packet type.
</summary>
@@ -70502,7 +70548,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="101945">
+<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="97005">
<summary>
Send and receive TCP traffic on the zarafa port.
</summary>
@@ -70513,7 +70559,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zarafa_port" lineno="101964">
+<interface name="corenet_udp_send_zarafa_port" lineno="97020">
<summary>
Send UDP traffic on the zarafa port.
</summary>
@@ -70524,7 +70570,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="101983">
+<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="97035">
<summary>
Do not audit attempts to send UDP traffic on the zarafa port.
</summary>
@@ -70535,7 +70581,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zarafa_port" lineno="102002">
+<interface name="corenet_udp_receive_zarafa_port" lineno="97050">
<summary>
Receive UDP traffic on the zarafa port.
</summary>
@@ -70546,7 +70592,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="102021">
+<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="97065">
<summary>
Do not audit attempts to receive UDP traffic on the zarafa port.
</summary>
@@ -70557,7 +70603,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zarafa_port" lineno="102040">
+<interface name="corenet_udp_sendrecv_zarafa_port" lineno="97080">
<summary>
Send and receive UDP traffic on the zarafa port.
</summary>
@@ -70568,7 +70614,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="102057">
+<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="97096">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zarafa port.
@@ -70580,7 +70626,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zarafa_port" lineno="102073">
+<interface name="corenet_tcp_bind_zarafa_port" lineno="97111">
<summary>
Bind TCP sockets to the zarafa port.
</summary>
@@ -70591,7 +70637,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zarafa_port" lineno="102093">
+<interface name="corenet_udp_bind_zarafa_port" lineno="97131">
<summary>
Bind UDP sockets to the zarafa port.
</summary>
@@ -70602,7 +70648,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zarafa_port" lineno="102112">
+<interface name="corenet_tcp_connect_zarafa_port" lineno="97150">
<summary>
Make a TCP connection to the zarafa port.
</summary>
@@ -70612,7 +70658,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zarafa_client_packets" lineno="102132">
+<interface name="corenet_send_zarafa_client_packets" lineno="97170">
<summary>
Send zarafa_client packets.
</summary>
@@ -70623,7 +70669,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="102151">
+<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="97189">
<summary>
Do not audit attempts to send zarafa_client packets.
</summary>
@@ -70634,7 +70680,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zarafa_client_packets" lineno="102170">
+<interface name="corenet_receive_zarafa_client_packets" lineno="97208">
<summary>
Receive zarafa_client packets.
</summary>
@@ -70645,7 +70691,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="102189">
+<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="97227">
<summary>
Do not audit attempts to receive zarafa_client packets.
</summary>
@@ -70656,7 +70702,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zarafa_client_packets" lineno="102208">
+<interface name="corenet_sendrecv_zarafa_client_packets" lineno="97246">
<summary>
Send and receive zarafa_client packets.
</summary>
@@ -70667,7 +70713,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="102224">
+<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="97262">
<summary>
Do not audit attempts to send and receive zarafa_client packets.
</summary>
@@ -70678,7 +70724,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zarafa_client_packets" lineno="102239">
+<interface name="corenet_relabelto_zarafa_client_packets" lineno="97277">
<summary>
Relabel packets to zarafa_client the packet type.
</summary>
@@ -70688,7 +70734,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zarafa_server_packets" lineno="102259">
+<interface name="corenet_send_zarafa_server_packets" lineno="97297">
<summary>
Send zarafa_server packets.
</summary>
@@ -70699,7 +70745,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="102278">
+<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="97316">
<summary>
Do not audit attempts to send zarafa_server packets.
</summary>
@@ -70710,7 +70756,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zarafa_server_packets" lineno="102297">
+<interface name="corenet_receive_zarafa_server_packets" lineno="97335">
<summary>
Receive zarafa_server packets.
</summary>
@@ -70721,7 +70767,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="102316">
+<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="97354">
<summary>
Do not audit attempts to receive zarafa_server packets.
</summary>
@@ -70732,7 +70778,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zarafa_server_packets" lineno="102335">
+<interface name="corenet_sendrecv_zarafa_server_packets" lineno="97373">
<summary>
Send and receive zarafa_server packets.
</summary>
@@ -70743,7 +70789,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="102351">
+<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="97389">
<summary>
Do not audit attempts to send and receive zarafa_server packets.
</summary>
@@ -70754,7 +70800,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zarafa_server_packets" lineno="102366">
+<interface name="corenet_relabelto_zarafa_server_packets" lineno="97404">
<summary>
Relabel packets to zarafa_server the packet type.
</summary>
@@ -70764,7 +70810,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="102388">
+<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="97426">
<summary>
Send and receive TCP traffic on the zabbix port.
</summary>
@@ -70775,7 +70821,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zabbix_port" lineno="102407">
+<interface name="corenet_udp_send_zabbix_port" lineno="97441">
<summary>
Send UDP traffic on the zabbix port.
</summary>
@@ -70786,7 +70832,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="102426">
+<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="97456">
<summary>
Do not audit attempts to send UDP traffic on the zabbix port.
</summary>
@@ -70797,7 +70843,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zabbix_port" lineno="102445">
+<interface name="corenet_udp_receive_zabbix_port" lineno="97471">
<summary>
Receive UDP traffic on the zabbix port.
</summary>
@@ -70808,7 +70854,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="102464">
+<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="97486">
<summary>
Do not audit attempts to receive UDP traffic on the zabbix port.
</summary>
@@ -70819,7 +70865,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zabbix_port" lineno="102483">
+<interface name="corenet_udp_sendrecv_zabbix_port" lineno="97501">
<summary>
Send and receive UDP traffic on the zabbix port.
</summary>
@@ -70830,7 +70876,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="102500">
+<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="97517">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zabbix port.
@@ -70842,7 +70888,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zabbix_port" lineno="102516">
+<interface name="corenet_tcp_bind_zabbix_port" lineno="97532">
<summary>
Bind TCP sockets to the zabbix port.
</summary>
@@ -70853,7 +70899,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zabbix_port" lineno="102536">
+<interface name="corenet_udp_bind_zabbix_port" lineno="97552">
<summary>
Bind UDP sockets to the zabbix port.
</summary>
@@ -70864,7 +70910,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zabbix_port" lineno="102555">
+<interface name="corenet_tcp_connect_zabbix_port" lineno="97571">
<summary>
Make a TCP connection to the zabbix port.
</summary>
@@ -70874,7 +70920,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zabbix_client_packets" lineno="102575">
+<interface name="corenet_send_zabbix_client_packets" lineno="97591">
<summary>
Send zabbix_client packets.
</summary>
@@ -70885,7 +70931,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="102594">
+<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="97610">
<summary>
Do not audit attempts to send zabbix_client packets.
</summary>
@@ -70896,7 +70942,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zabbix_client_packets" lineno="102613">
+<interface name="corenet_receive_zabbix_client_packets" lineno="97629">
<summary>
Receive zabbix_client packets.
</summary>
@@ -70907,7 +70953,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="102632">
+<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="97648">
<summary>
Do not audit attempts to receive zabbix_client packets.
</summary>
@@ -70918,7 +70964,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zabbix_client_packets" lineno="102651">
+<interface name="corenet_sendrecv_zabbix_client_packets" lineno="97667">
<summary>
Send and receive zabbix_client packets.
</summary>
@@ -70929,7 +70975,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="102667">
+<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="97683">
<summary>
Do not audit attempts to send and receive zabbix_client packets.
</summary>
@@ -70940,7 +70986,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zabbix_client_packets" lineno="102682">
+<interface name="corenet_relabelto_zabbix_client_packets" lineno="97698">
<summary>
Relabel packets to zabbix_client the packet type.
</summary>
@@ -70950,7 +70996,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zabbix_server_packets" lineno="102702">
+<interface name="corenet_send_zabbix_server_packets" lineno="97718">
<summary>
Send zabbix_server packets.
</summary>
@@ -70961,7 +71007,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="102721">
+<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="97737">
<summary>
Do not audit attempts to send zabbix_server packets.
</summary>
@@ -70972,7 +71018,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zabbix_server_packets" lineno="102740">
+<interface name="corenet_receive_zabbix_server_packets" lineno="97756">
<summary>
Receive zabbix_server packets.
</summary>
@@ -70983,7 +71029,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="102759">
+<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="97775">
<summary>
Do not audit attempts to receive zabbix_server packets.
</summary>
@@ -70994,7 +71040,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zabbix_server_packets" lineno="102778">
+<interface name="corenet_sendrecv_zabbix_server_packets" lineno="97794">
<summary>
Send and receive zabbix_server packets.
</summary>
@@ -71005,7 +71051,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="102794">
+<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="97810">
<summary>
Do not audit attempts to send and receive zabbix_server packets.
</summary>
@@ -71016,7 +71062,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zabbix_server_packets" lineno="102809">
+<interface name="corenet_relabelto_zabbix_server_packets" lineno="97825">
<summary>
Relabel packets to zabbix_server the packet type.
</summary>
@@ -71026,7 +71072,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="102831">
+<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="97847">
<summary>
Send and receive TCP traffic on the zabbix_agent port.
</summary>
@@ -71037,7 +71083,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zabbix_agent_port" lineno="102850">
+<interface name="corenet_udp_send_zabbix_agent_port" lineno="97862">
<summary>
Send UDP traffic on the zabbix_agent port.
</summary>
@@ -71048,7 +71094,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="102869">
+<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="97877">
<summary>
Do not audit attempts to send UDP traffic on the zabbix_agent port.
</summary>
@@ -71059,7 +71105,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zabbix_agent_port" lineno="102888">
+<interface name="corenet_udp_receive_zabbix_agent_port" lineno="97892">
<summary>
Receive UDP traffic on the zabbix_agent port.
</summary>
@@ -71070,7 +71116,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="102907">
+<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="97907">
<summary>
Do not audit attempts to receive UDP traffic on the zabbix_agent port.
</summary>
@@ -71081,7 +71127,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="102926">
+<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="97922">
<summary>
Send and receive UDP traffic on the zabbix_agent port.
</summary>
@@ -71092,7 +71138,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="102943">
+<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="97938">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zabbix_agent port.
@@ -71104,7 +71150,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="102959">
+<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="97953">
<summary>
Bind TCP sockets to the zabbix_agent port.
</summary>
@@ -71115,7 +71161,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zabbix_agent_port" lineno="102979">
+<interface name="corenet_udp_bind_zabbix_agent_port" lineno="97973">
<summary>
Bind UDP sockets to the zabbix_agent port.
</summary>
@@ -71126,7 +71172,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="102998">
+<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="97992">
<summary>
Make a TCP connection to the zabbix_agent port.
</summary>
@@ -71136,7 +71182,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zabbix_agent_client_packets" lineno="103018">
+<interface name="corenet_send_zabbix_agent_client_packets" lineno="98012">
<summary>
Send zabbix_agent_client packets.
</summary>
@@ -71147,7 +71193,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="103037">
+<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="98031">
<summary>
Do not audit attempts to send zabbix_agent_client packets.
</summary>
@@ -71158,7 +71204,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zabbix_agent_client_packets" lineno="103056">
+<interface name="corenet_receive_zabbix_agent_client_packets" lineno="98050">
<summary>
Receive zabbix_agent_client packets.
</summary>
@@ -71169,7 +71215,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="103075">
+<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="98069">
<summary>
Do not audit attempts to receive zabbix_agent_client packets.
</summary>
@@ -71180,7 +71226,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="103094">
+<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="98088">
<summary>
Send and receive zabbix_agent_client packets.
</summary>
@@ -71191,7 +71237,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="103110">
+<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="98104">
<summary>
Do not audit attempts to send and receive zabbix_agent_client packets.
</summary>
@@ -71202,7 +71248,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="103125">
+<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="98119">
<summary>
Relabel packets to zabbix_agent_client the packet type.
</summary>
@@ -71212,7 +71258,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zabbix_agent_server_packets" lineno="103145">
+<interface name="corenet_send_zabbix_agent_server_packets" lineno="98139">
<summary>
Send zabbix_agent_server packets.
</summary>
@@ -71223,7 +71269,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="103164">
+<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="98158">
<summary>
Do not audit attempts to send zabbix_agent_server packets.
</summary>
@@ -71234,7 +71280,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zabbix_agent_server_packets" lineno="103183">
+<interface name="corenet_receive_zabbix_agent_server_packets" lineno="98177">
<summary>
Receive zabbix_agent_server packets.
</summary>
@@ -71245,7 +71291,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="103202">
+<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="98196">
<summary>
Do not audit attempts to receive zabbix_agent_server packets.
</summary>
@@ -71256,7 +71302,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="103221">
+<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="98215">
<summary>
Send and receive zabbix_agent_server packets.
</summary>
@@ -71267,7 +71313,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="103237">
+<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="98231">
<summary>
Do not audit attempts to send and receive zabbix_agent_server packets.
</summary>
@@ -71278,7 +71324,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="103252">
+<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="98246">
<summary>
Relabel packets to zabbix_agent_server the packet type.
</summary>
@@ -71288,7 +71334,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="103274">
+<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="98268">
<summary>
Send and receive TCP traffic on the zookeeper_client port.
</summary>
@@ -71299,7 +71345,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zookeeper_client_port" lineno="103293">
+<interface name="corenet_udp_send_zookeeper_client_port" lineno="98283">
<summary>
Send UDP traffic on the zookeeper_client port.
</summary>
@@ -71310,7 +71356,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="103312">
+<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="98298">
<summary>
Do not audit attempts to send UDP traffic on the zookeeper_client port.
</summary>
@@ -71321,7 +71367,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zookeeper_client_port" lineno="103331">
+<interface name="corenet_udp_receive_zookeeper_client_port" lineno="98313">
<summary>
Receive UDP traffic on the zookeeper_client port.
</summary>
@@ -71332,7 +71378,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="103350">
+<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="98328">
<summary>
Do not audit attempts to receive UDP traffic on the zookeeper_client port.
</summary>
@@ -71343,7 +71389,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="103369">
+<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="98343">
<summary>
Send and receive UDP traffic on the zookeeper_client port.
</summary>
@@ -71354,7 +71400,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="103386">
+<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="98359">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zookeeper_client port.
@@ -71366,7 +71412,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="103402">
+<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="98374">
<summary>
Bind TCP sockets to the zookeeper_client port.
</summary>
@@ -71377,7 +71423,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zookeeper_client_port" lineno="103422">
+<interface name="corenet_udp_bind_zookeeper_client_port" lineno="98394">
<summary>
Bind UDP sockets to the zookeeper_client port.
</summary>
@@ -71388,7 +71434,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="103441">
+<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="98413">
<summary>
Make a TCP connection to the zookeeper_client port.
</summary>
@@ -71398,7 +71444,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_client_client_packets" lineno="103461">
+<interface name="corenet_send_zookeeper_client_client_packets" lineno="98433">
<summary>
Send zookeeper_client_client packets.
</summary>
@@ -71409,7 +71455,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="103480">
+<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="98452">
<summary>
Do not audit attempts to send zookeeper_client_client packets.
</summary>
@@ -71420,7 +71466,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_client_client_packets" lineno="103499">
+<interface name="corenet_receive_zookeeper_client_client_packets" lineno="98471">
<summary>
Receive zookeeper_client_client packets.
</summary>
@@ -71431,7 +71477,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="103518">
+<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="98490">
<summary>
Do not audit attempts to receive zookeeper_client_client packets.
</summary>
@@ -71442,7 +71488,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="103537">
+<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="98509">
<summary>
Send and receive zookeeper_client_client packets.
</summary>
@@ -71453,7 +71499,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="103553">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="98525">
<summary>
Do not audit attempts to send and receive zookeeper_client_client packets.
</summary>
@@ -71464,7 +71510,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="103568">
+<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="98540">
<summary>
Relabel packets to zookeeper_client_client the packet type.
</summary>
@@ -71474,7 +71520,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_client_server_packets" lineno="103588">
+<interface name="corenet_send_zookeeper_client_server_packets" lineno="98560">
<summary>
Send zookeeper_client_server packets.
</summary>
@@ -71485,7 +71531,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="103607">
+<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="98579">
<summary>
Do not audit attempts to send zookeeper_client_server packets.
</summary>
@@ -71496,7 +71542,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_client_server_packets" lineno="103626">
+<interface name="corenet_receive_zookeeper_client_server_packets" lineno="98598">
<summary>
Receive zookeeper_client_server packets.
</summary>
@@ -71507,7 +71553,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="103645">
+<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="98617">
<summary>
Do not audit attempts to receive zookeeper_client_server packets.
</summary>
@@ -71518,7 +71564,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="103664">
+<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="98636">
<summary>
Send and receive zookeeper_client_server packets.
</summary>
@@ -71529,7 +71575,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="103680">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="98652">
<summary>
Do not audit attempts to send and receive zookeeper_client_server packets.
</summary>
@@ -71540,7 +71586,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="103695">
+<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="98667">
<summary>
Relabel packets to zookeeper_client_server the packet type.
</summary>
@@ -71550,7 +71596,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="103717">
+<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="98689">
<summary>
Send and receive TCP traffic on the zookeeper_election port.
</summary>
@@ -71561,7 +71607,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zookeeper_election_port" lineno="103736">
+<interface name="corenet_udp_send_zookeeper_election_port" lineno="98704">
<summary>
Send UDP traffic on the zookeeper_election port.
</summary>
@@ -71572,7 +71618,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="103755">
+<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="98719">
<summary>
Do not audit attempts to send UDP traffic on the zookeeper_election port.
</summary>
@@ -71583,7 +71629,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zookeeper_election_port" lineno="103774">
+<interface name="corenet_udp_receive_zookeeper_election_port" lineno="98734">
<summary>
Receive UDP traffic on the zookeeper_election port.
</summary>
@@ -71594,7 +71640,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="103793">
+<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="98749">
<summary>
Do not audit attempts to receive UDP traffic on the zookeeper_election port.
</summary>
@@ -71605,7 +71651,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="103812">
+<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="98764">
<summary>
Send and receive UDP traffic on the zookeeper_election port.
</summary>
@@ -71616,7 +71662,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="103829">
+<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="98780">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zookeeper_election port.
@@ -71628,7 +71674,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="103845">
+<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="98795">
<summary>
Bind TCP sockets to the zookeeper_election port.
</summary>
@@ -71639,7 +71685,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zookeeper_election_port" lineno="103865">
+<interface name="corenet_udp_bind_zookeeper_election_port" lineno="98815">
<summary>
Bind UDP sockets to the zookeeper_election port.
</summary>
@@ -71650,7 +71696,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="103884">
+<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="98834">
<summary>
Make a TCP connection to the zookeeper_election port.
</summary>
@@ -71660,7 +71706,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_election_client_packets" lineno="103904">
+<interface name="corenet_send_zookeeper_election_client_packets" lineno="98854">
<summary>
Send zookeeper_election_client packets.
</summary>
@@ -71671,7 +71717,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="103923">
+<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="98873">
<summary>
Do not audit attempts to send zookeeper_election_client packets.
</summary>
@@ -71682,7 +71728,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_election_client_packets" lineno="103942">
+<interface name="corenet_receive_zookeeper_election_client_packets" lineno="98892">
<summary>
Receive zookeeper_election_client packets.
</summary>
@@ -71693,7 +71739,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="103961">
+<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="98911">
<summary>
Do not audit attempts to receive zookeeper_election_client packets.
</summary>
@@ -71704,7 +71750,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="103980">
+<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="98930">
<summary>
Send and receive zookeeper_election_client packets.
</summary>
@@ -71715,7 +71761,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="103996">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="98946">
<summary>
Do not audit attempts to send and receive zookeeper_election_client packets.
</summary>
@@ -71726,7 +71772,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="104011">
+<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="98961">
<summary>
Relabel packets to zookeeper_election_client the packet type.
</summary>
@@ -71736,7 +71782,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_election_server_packets" lineno="104031">
+<interface name="corenet_send_zookeeper_election_server_packets" lineno="98981">
<summary>
Send zookeeper_election_server packets.
</summary>
@@ -71747,7 +71793,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="104050">
+<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="99000">
<summary>
Do not audit attempts to send zookeeper_election_server packets.
</summary>
@@ -71758,7 +71804,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_election_server_packets" lineno="104069">
+<interface name="corenet_receive_zookeeper_election_server_packets" lineno="99019">
<summary>
Receive zookeeper_election_server packets.
</summary>
@@ -71769,7 +71815,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="104088">
+<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="99038">
<summary>
Do not audit attempts to receive zookeeper_election_server packets.
</summary>
@@ -71780,7 +71826,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="104107">
+<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="99057">
<summary>
Send and receive zookeeper_election_server packets.
</summary>
@@ -71791,7 +71837,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="104123">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="99073">
<summary>
Do not audit attempts to send and receive zookeeper_election_server packets.
</summary>
@@ -71802,7 +71848,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="104138">
+<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="99088">
<summary>
Relabel packets to zookeeper_election_server the packet type.
</summary>
@@ -71812,7 +71858,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="104160">
+<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="99110">
<summary>
Send and receive TCP traffic on the zookeeper_leader port.
</summary>
@@ -71823,7 +71869,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zookeeper_leader_port" lineno="104179">
+<interface name="corenet_udp_send_zookeeper_leader_port" lineno="99125">
<summary>
Send UDP traffic on the zookeeper_leader port.
</summary>
@@ -71834,7 +71880,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="104198">
+<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="99140">
<summary>
Do not audit attempts to send UDP traffic on the zookeeper_leader port.
</summary>
@@ -71845,7 +71891,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="104217">
+<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="99155">
<summary>
Receive UDP traffic on the zookeeper_leader port.
</summary>
@@ -71856,7 +71902,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="104236">
+<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="99170">
<summary>
Do not audit attempts to receive UDP traffic on the zookeeper_leader port.
</summary>
@@ -71867,7 +71913,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="104255">
+<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="99185">
<summary>
Send and receive UDP traffic on the zookeeper_leader port.
</summary>
@@ -71878,7 +71924,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="104272">
+<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="99201">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zookeeper_leader port.
@@ -71890,7 +71936,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="104288">
+<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="99216">
<summary>
Bind TCP sockets to the zookeeper_leader port.
</summary>
@@ -71901,7 +71947,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="104308">
+<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="99236">
<summary>
Bind UDP sockets to the zookeeper_leader port.
</summary>
@@ -71912,7 +71958,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="104327">
+<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="99255">
<summary>
Make a TCP connection to the zookeeper_leader port.
</summary>
@@ -71922,7 +71968,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_leader_client_packets" lineno="104347">
+<interface name="corenet_send_zookeeper_leader_client_packets" lineno="99275">
<summary>
Send zookeeper_leader_client packets.
</summary>
@@ -71933,7 +71979,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="104366">
+<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="99294">
<summary>
Do not audit attempts to send zookeeper_leader_client packets.
</summary>
@@ -71944,7 +71990,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="104385">
+<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="99313">
<summary>
Receive zookeeper_leader_client packets.
</summary>
@@ -71955,7 +72001,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="104404">
+<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="99332">
<summary>
Do not audit attempts to receive zookeeper_leader_client packets.
</summary>
@@ -71966,7 +72012,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="104423">
+<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="99351">
<summary>
Send and receive zookeeper_leader_client packets.
</summary>
@@ -71977,7 +72023,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="104439">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="99367">
<summary>
Do not audit attempts to send and receive zookeeper_leader_client packets.
</summary>
@@ -71988,7 +72034,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="104454">
+<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="99382">
<summary>
Relabel packets to zookeeper_leader_client the packet type.
</summary>
@@ -71998,7 +72044,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zookeeper_leader_server_packets" lineno="104474">
+<interface name="corenet_send_zookeeper_leader_server_packets" lineno="99402">
<summary>
Send zookeeper_leader_server packets.
</summary>
@@ -72009,7 +72055,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="104493">
+<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="99421">
<summary>
Do not audit attempts to send zookeeper_leader_server packets.
</summary>
@@ -72020,7 +72066,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="104512">
+<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="99440">
<summary>
Receive zookeeper_leader_server packets.
</summary>
@@ -72031,7 +72077,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="104531">
+<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="99459">
<summary>
Do not audit attempts to receive zookeeper_leader_server packets.
</summary>
@@ -72042,7 +72088,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="104550">
+<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="99478">
<summary>
Send and receive zookeeper_leader_server packets.
</summary>
@@ -72053,7 +72099,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="104566">
+<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="99494">
<summary>
Do not audit attempts to send and receive zookeeper_leader_server packets.
</summary>
@@ -72064,7 +72110,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="104581">
+<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="99509">
<summary>
Relabel packets to zookeeper_leader_server the packet type.
</summary>
@@ -72074,7 +72120,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zebra_port" lineno="104603">
+<interface name="corenet_tcp_sendrecv_zebra_port" lineno="99531">
<summary>
Send and receive TCP traffic on the zebra port.
</summary>
@@ -72085,7 +72131,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zebra_port" lineno="104622">
+<interface name="corenet_udp_send_zebra_port" lineno="99546">
<summary>
Send UDP traffic on the zebra port.
</summary>
@@ -72096,7 +72142,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="104641">
+<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="99561">
<summary>
Do not audit attempts to send UDP traffic on the zebra port.
</summary>
@@ -72107,7 +72153,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zebra_port" lineno="104660">
+<interface name="corenet_udp_receive_zebra_port" lineno="99576">
<summary>
Receive UDP traffic on the zebra port.
</summary>
@@ -72118,7 +72164,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="104679">
+<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="99591">
<summary>
Do not audit attempts to receive UDP traffic on the zebra port.
</summary>
@@ -72129,7 +72175,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zebra_port" lineno="104698">
+<interface name="corenet_udp_sendrecv_zebra_port" lineno="99606">
<summary>
Send and receive UDP traffic on the zebra port.
</summary>
@@ -72140,7 +72186,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="104715">
+<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="99622">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zebra port.
@@ -72152,7 +72198,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zebra_port" lineno="104731">
+<interface name="corenet_tcp_bind_zebra_port" lineno="99637">
<summary>
Bind TCP sockets to the zebra port.
</summary>
@@ -72163,7 +72209,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zebra_port" lineno="104751">
+<interface name="corenet_udp_bind_zebra_port" lineno="99657">
<summary>
Bind UDP sockets to the zebra port.
</summary>
@@ -72174,7 +72220,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zebra_port" lineno="104770">
+<interface name="corenet_tcp_connect_zebra_port" lineno="99676">
<summary>
Make a TCP connection to the zebra port.
</summary>
@@ -72184,7 +72230,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zebra_client_packets" lineno="104790">
+<interface name="corenet_send_zebra_client_packets" lineno="99696">
<summary>
Send zebra_client packets.
</summary>
@@ -72195,7 +72241,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="104809">
+<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="99715">
<summary>
Do not audit attempts to send zebra_client packets.
</summary>
@@ -72206,7 +72252,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zebra_client_packets" lineno="104828">
+<interface name="corenet_receive_zebra_client_packets" lineno="99734">
<summary>
Receive zebra_client packets.
</summary>
@@ -72217,7 +72263,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="104847">
+<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="99753">
<summary>
Do not audit attempts to receive zebra_client packets.
</summary>
@@ -72228,7 +72274,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zebra_client_packets" lineno="104866">
+<interface name="corenet_sendrecv_zebra_client_packets" lineno="99772">
<summary>
Send and receive zebra_client packets.
</summary>
@@ -72239,7 +72285,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="104882">
+<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="99788">
<summary>
Do not audit attempts to send and receive zebra_client packets.
</summary>
@@ -72250,7 +72296,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zebra_client_packets" lineno="104897">
+<interface name="corenet_relabelto_zebra_client_packets" lineno="99803">
<summary>
Relabel packets to zebra_client the packet type.
</summary>
@@ -72260,7 +72306,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zebra_server_packets" lineno="104917">
+<interface name="corenet_send_zebra_server_packets" lineno="99823">
<summary>
Send zebra_server packets.
</summary>
@@ -72271,7 +72317,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="104936">
+<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="99842">
<summary>
Do not audit attempts to send zebra_server packets.
</summary>
@@ -72282,7 +72328,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zebra_server_packets" lineno="104955">
+<interface name="corenet_receive_zebra_server_packets" lineno="99861">
<summary>
Receive zebra_server packets.
</summary>
@@ -72293,7 +72339,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="104974">
+<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="99880">
<summary>
Do not audit attempts to receive zebra_server packets.
</summary>
@@ -72304,7 +72350,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zebra_server_packets" lineno="104993">
+<interface name="corenet_sendrecv_zebra_server_packets" lineno="99899">
<summary>
Send and receive zebra_server packets.
</summary>
@@ -72315,7 +72361,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="105009">
+<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="99915">
<summary>
Do not audit attempts to send and receive zebra_server packets.
</summary>
@@ -72326,7 +72372,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zebra_server_packets" lineno="105024">
+<interface name="corenet_relabelto_zebra_server_packets" lineno="99930">
<summary>
Relabel packets to zebra_server the packet type.
</summary>
@@ -72336,7 +72382,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zented_port" lineno="105046">
+<interface name="corenet_tcp_sendrecv_zented_port" lineno="99952">
<summary>
Send and receive TCP traffic on the zented port.
</summary>
@@ -72347,7 +72393,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zented_port" lineno="105065">
+<interface name="corenet_udp_send_zented_port" lineno="99967">
<summary>
Send UDP traffic on the zented port.
</summary>
@@ -72358,7 +72404,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zented_port" lineno="105084">
+<interface name="corenet_dontaudit_udp_send_zented_port" lineno="99982">
<summary>
Do not audit attempts to send UDP traffic on the zented port.
</summary>
@@ -72369,7 +72415,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zented_port" lineno="105103">
+<interface name="corenet_udp_receive_zented_port" lineno="99997">
<summary>
Receive UDP traffic on the zented port.
</summary>
@@ -72380,7 +72426,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="105122">
+<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="100012">
<summary>
Do not audit attempts to receive UDP traffic on the zented port.
</summary>
@@ -72391,7 +72437,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zented_port" lineno="105141">
+<interface name="corenet_udp_sendrecv_zented_port" lineno="100027">
<summary>
Send and receive UDP traffic on the zented port.
</summary>
@@ -72402,7 +72448,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="105158">
+<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="100043">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zented port.
@@ -72414,7 +72460,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zented_port" lineno="105174">
+<interface name="corenet_tcp_bind_zented_port" lineno="100058">
<summary>
Bind TCP sockets to the zented port.
</summary>
@@ -72425,7 +72471,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zented_port" lineno="105194">
+<interface name="corenet_udp_bind_zented_port" lineno="100078">
<summary>
Bind UDP sockets to the zented port.
</summary>
@@ -72436,7 +72482,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zented_port" lineno="105213">
+<interface name="corenet_tcp_connect_zented_port" lineno="100097">
<summary>
Make a TCP connection to the zented port.
</summary>
@@ -72446,7 +72492,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zented_client_packets" lineno="105233">
+<interface name="corenet_send_zented_client_packets" lineno="100117">
<summary>
Send zented_client packets.
</summary>
@@ -72457,7 +72503,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zented_client_packets" lineno="105252">
+<interface name="corenet_dontaudit_send_zented_client_packets" lineno="100136">
<summary>
Do not audit attempts to send zented_client packets.
</summary>
@@ -72468,7 +72514,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zented_client_packets" lineno="105271">
+<interface name="corenet_receive_zented_client_packets" lineno="100155">
<summary>
Receive zented_client packets.
</summary>
@@ -72479,7 +72525,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="105290">
+<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="100174">
<summary>
Do not audit attempts to receive zented_client packets.
</summary>
@@ -72490,7 +72536,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zented_client_packets" lineno="105309">
+<interface name="corenet_sendrecv_zented_client_packets" lineno="100193">
<summary>
Send and receive zented_client packets.
</summary>
@@ -72501,7 +72547,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="105325">
+<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="100209">
<summary>
Do not audit attempts to send and receive zented_client packets.
</summary>
@@ -72512,7 +72558,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zented_client_packets" lineno="105340">
+<interface name="corenet_relabelto_zented_client_packets" lineno="100224">
<summary>
Relabel packets to zented_client the packet type.
</summary>
@@ -72522,7 +72568,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zented_server_packets" lineno="105360">
+<interface name="corenet_send_zented_server_packets" lineno="100244">
<summary>
Send zented_server packets.
</summary>
@@ -72533,7 +72579,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zented_server_packets" lineno="105379">
+<interface name="corenet_dontaudit_send_zented_server_packets" lineno="100263">
<summary>
Do not audit attempts to send zented_server packets.
</summary>
@@ -72544,7 +72590,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zented_server_packets" lineno="105398">
+<interface name="corenet_receive_zented_server_packets" lineno="100282">
<summary>
Receive zented_server packets.
</summary>
@@ -72555,7 +72601,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="105417">
+<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="100301">
<summary>
Do not audit attempts to receive zented_server packets.
</summary>
@@ -72566,7 +72612,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zented_server_packets" lineno="105436">
+<interface name="corenet_sendrecv_zented_server_packets" lineno="100320">
<summary>
Send and receive zented_server packets.
</summary>
@@ -72577,7 +72623,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="105452">
+<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="100336">
<summary>
Do not audit attempts to send and receive zented_server packets.
</summary>
@@ -72588,7 +72634,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zented_server_packets" lineno="105467">
+<interface name="corenet_relabelto_zented_server_packets" lineno="100351">
<summary>
Relabel packets to zented_server the packet type.
</summary>
@@ -72598,7 +72644,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_zope_port" lineno="105489">
+<interface name="corenet_tcp_sendrecv_zope_port" lineno="100373">
<summary>
Send and receive TCP traffic on the zope port.
</summary>
@@ -72609,7 +72655,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_zope_port" lineno="105508">
+<interface name="corenet_udp_send_zope_port" lineno="100388">
<summary>
Send UDP traffic on the zope port.
</summary>
@@ -72620,7 +72666,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_send_zope_port" lineno="105527">
+<interface name="corenet_dontaudit_udp_send_zope_port" lineno="100403">
<summary>
Do not audit attempts to send UDP traffic on the zope port.
</summary>
@@ -72631,7 +72677,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_receive_zope_port" lineno="105546">
+<interface name="corenet_udp_receive_zope_port" lineno="100418">
<summary>
Receive UDP traffic on the zope port.
</summary>
@@ -72642,7 +72688,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="105565">
+<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="100433">
<summary>
Do not audit attempts to receive UDP traffic on the zope port.
</summary>
@@ -72653,7 +72699,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_sendrecv_zope_port" lineno="105584">
+<interface name="corenet_udp_sendrecv_zope_port" lineno="100448">
<summary>
Send and receive UDP traffic on the zope port.
</summary>
@@ -72664,7 +72710,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="105601">
+<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="100464">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zope port.
@@ -72676,7 +72722,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_bind_zope_port" lineno="105617">
+<interface name="corenet_tcp_bind_zope_port" lineno="100479">
<summary>
Bind TCP sockets to the zope port.
</summary>
@@ -72687,7 +72733,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_udp_bind_zope_port" lineno="105637">
+<interface name="corenet_udp_bind_zope_port" lineno="100499">
<summary>
Bind UDP sockets to the zope port.
</summary>
@@ -72698,7 +72744,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_tcp_connect_zope_port" lineno="105656">
+<interface name="corenet_tcp_connect_zope_port" lineno="100518">
<summary>
Make a TCP connection to the zope port.
</summary>
@@ -72708,7 +72754,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zope_client_packets" lineno="105676">
+<interface name="corenet_send_zope_client_packets" lineno="100538">
<summary>
Send zope_client packets.
</summary>
@@ -72719,7 +72765,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zope_client_packets" lineno="105695">
+<interface name="corenet_dontaudit_send_zope_client_packets" lineno="100557">
<summary>
Do not audit attempts to send zope_client packets.
</summary>
@@ -72730,7 +72776,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zope_client_packets" lineno="105714">
+<interface name="corenet_receive_zope_client_packets" lineno="100576">
<summary>
Receive zope_client packets.
</summary>
@@ -72741,7 +72787,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="105733">
+<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="100595">
<summary>
Do not audit attempts to receive zope_client packets.
</summary>
@@ -72752,7 +72798,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zope_client_packets" lineno="105752">
+<interface name="corenet_sendrecv_zope_client_packets" lineno="100614">
<summary>
Send and receive zope_client packets.
</summary>
@@ -72763,7 +72809,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="105768">
+<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="100630">
<summary>
Do not audit attempts to send and receive zope_client packets.
</summary>
@@ -72774,7 +72820,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zope_client_packets" lineno="105783">
+<interface name="corenet_relabelto_zope_client_packets" lineno="100645">
<summary>
Relabel packets to zope_client the packet type.
</summary>
@@ -72784,7 +72830,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_send_zope_server_packets" lineno="105803">
+<interface name="corenet_send_zope_server_packets" lineno="100665">
<summary>
Send zope_server packets.
</summary>
@@ -72795,7 +72841,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_send_zope_server_packets" lineno="105822">
+<interface name="corenet_dontaudit_send_zope_server_packets" lineno="100684">
<summary>
Do not audit attempts to send zope_server packets.
</summary>
@@ -72806,7 +72852,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_receive_zope_server_packets" lineno="105841">
+<interface name="corenet_receive_zope_server_packets" lineno="100703">
<summary>
Receive zope_server packets.
</summary>
@@ -72817,7 +72863,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="105860">
+<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="100722">
<summary>
Do not audit attempts to receive zope_server packets.
</summary>
@@ -72828,7 +72874,7 @@ Domain allowed access.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_sendrecv_zope_server_packets" lineno="105879">
+<interface name="corenet_sendrecv_zope_server_packets" lineno="100741">
<summary>
Send and receive zope_server packets.
</summary>
@@ -72839,7 +72885,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="105895">
+<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="100757">
<summary>
Do not audit attempts to send and receive zope_server packets.
</summary>
@@ -72850,7 +72896,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="corenet_relabelto_zope_server_packets" lineno="105910">
+<interface name="corenet_relabelto_zope_server_packets" lineno="100772">
<summary>
Relabel packets to zope_server the packet type.
</summary>
@@ -72860,7 +72906,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="corenet_tcp_sendrecv_lo_if" lineno="105933">
+<interface name="corenet_tcp_sendrecv_lo_if" lineno="100795">
<summary>
Send and receive TCP network traffic on the lo interface.
</summary>
@@ -72871,7 +72917,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_udp_send_lo_if" lineno="105952">
+<interface name="corenet_udp_send_lo_if" lineno="100814">
<summary>
Send UDP network traffic on the lo interface.
</summary>
@@ -72882,7 +72928,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_udp_receive_lo_if" lineno="105971">
+<interface name="corenet_udp_receive_lo_if" lineno="100833">
<summary>
Receive UDP network traffic on the lo interface.
</summary>
@@ -72893,7 +72939,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_udp_sendrecv_lo_if" lineno="105990">
+<interface name="corenet_udp_sendrecv_lo_if" lineno="100852">
<summary>
Send and receive UDP network traffic on the lo interface.
</summary>
@@ -72904,7 +72950,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="corenet_raw_send_lo_if" lineno="106006">
+<interface name="corenet_raw_send_lo_if" lineno="100868">
<summary>
Send raw IP packets on the lo interface.
</summary>
@@ -72915,7 +72961,7 @@ Domain allowed access.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="corenet_raw_receive_lo_if" lineno="106025">
+<interface name="corenet_raw_receive_lo_if" lineno="100887">
<summary>
Receive raw IP packets on the lo interface.
</summary>
@@ -72926,7 +72972,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="corenet_raw_sendrecv_lo_if" lineno="106044">
+<interface name="corenet_raw_sendrecv_lo_if" lineno="100906">
<summary>
Send and receive raw IP packets on the lo interface.
</summary>
@@ -73023,7 +73069,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_mounton" lineno="121">
+<interface name="dev_watch_dev_dirs" lineno="121">
+<summary>
+Watch the directories in /dev.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_mounton" lineno="139">
<summary>
Mount a filesystem on /dev
</summary>
@@ -73033,7 +73089,7 @@ Domain allow access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_all_dev_nodes" lineno="140">
+<interface name="dev_relabel_all_dev_nodes" lineno="158">
<summary>
Allow full relabeling (to and from) of all device nodes.
</summary>
@@ -73044,7 +73100,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="dev_relabel_all_dev_files" lineno="166">
+<interface name="dev_relabel_all_dev_files" lineno="184">
<summary>
Allow full relabeling (to and from) of all device files.
</summary>
@@ -73055,7 +73111,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="dev_list_all_dev_nodes" lineno="184">
+<interface name="dev_list_all_dev_nodes" lineno="202">
<summary>
List all of the device nodes in a device directory.
</summary>
@@ -73065,7 +73121,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_generic_dirs" lineno="203">
+<interface name="dev_setattr_generic_dirs" lineno="221">
<summary>
Set the attributes of /dev directories.
</summary>
@@ -73075,7 +73131,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_list_all_dev_nodes" lineno="221">
+<interface name="dev_dontaudit_list_all_dev_nodes" lineno="239">
<summary>
Dontaudit attempts to list all device nodes.
</summary>
@@ -73085,7 +73141,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_add_entry_generic_dirs" lineno="239">
+<interface name="dev_add_entry_generic_dirs" lineno="257">
<summary>
Add entries to directories in /dev.
</summary>
@@ -73095,7 +73151,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_remove_entry_generic_dirs" lineno="257">
+<interface name="dev_remove_entry_generic_dirs" lineno="275">
<summary>
Remove entries from directories in /dev.
</summary>
@@ -73105,7 +73161,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_generic_dirs" lineno="275">
+<interface name="dev_create_generic_dirs" lineno="293">
<summary>
Create a directory in the device directory.
</summary>
@@ -73115,7 +73171,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_delete_generic_dirs" lineno="294">
+<interface name="dev_delete_generic_dirs" lineno="312">
<summary>
Delete a directory in the device directory.
</summary>
@@ -73125,7 +73181,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_generic_dirs" lineno="312">
+<interface name="dev_manage_generic_dirs" lineno="330">
<summary>
Manage of directories in /dev.
</summary>
@@ -73135,7 +73191,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_generic_dev_dirs" lineno="330">
+<interface name="dev_relabel_generic_dev_dirs" lineno="348">
<summary>
Allow full relabeling (to and from) of directories in /dev.
</summary>
@@ -73145,7 +73201,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_generic_files" lineno="348">
+<interface name="dev_dontaudit_getattr_generic_files" lineno="366">
<summary>
dontaudit getattr generic files in /dev.
</summary>
@@ -73155,7 +73211,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_read_generic_files" lineno="366">
+<interface name="dev_read_generic_files" lineno="384">
<summary>
Read generic files in /dev.
</summary>
@@ -73165,7 +73221,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_generic_files" lineno="384">
+<interface name="dev_rw_generic_files" lineno="402">
<summary>
Read and write generic files in /dev.
</summary>
@@ -73175,7 +73231,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_delete_generic_files" lineno="402">
+<interface name="dev_delete_generic_files" lineno="420">
<summary>
Delete generic files in /dev.
</summary>
@@ -73185,7 +73241,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_generic_files" lineno="420">
+<interface name="dev_manage_generic_files" lineno="438">
<summary>
Create a file in the device directory.
</summary>
@@ -73195,7 +73251,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_generic_pipes" lineno="438">
+<interface name="dev_dontaudit_getattr_generic_pipes" lineno="456">
<summary>
Dontaudit getattr on generic pipes.
</summary>
@@ -73205,7 +73261,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_generic_sockets" lineno="456">
+<interface name="dev_write_generic_sockets" lineno="474">
<summary>
Write generic socket files in /dev.
</summary>
@@ -73215,7 +73271,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_getattr_generic_blk_files" lineno="474">
+<interface name="dev_getattr_generic_blk_files" lineno="492">
<summary>
Allow getattr on generic block devices.
</summary>
@@ -73225,7 +73281,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_generic_blk_files" lineno="492">
+<interface name="dev_dontaudit_getattr_generic_blk_files" lineno="510">
<summary>
Dontaudit getattr on generic block devices.
</summary>
@@ -73235,7 +73291,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_setattr_generic_blk_files" lineno="511">
+<interface name="dev_setattr_generic_blk_files" lineno="529">
<summary>
Set the attributes on generic
block devices.
@@ -73246,7 +73302,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_generic_blk_files" lineno="529">
+<interface name="dev_dontaudit_setattr_generic_blk_files" lineno="547">
<summary>
Dontaudit setattr on generic block devices.
</summary>
@@ -73256,7 +73312,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_create_generic_blk_files" lineno="547">
+<interface name="dev_create_generic_blk_files" lineno="565">
<summary>
Create generic block device files.
</summary>
@@ -73266,7 +73322,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_delete_generic_blk_files" lineno="565">
+<interface name="dev_delete_generic_blk_files" lineno="583">
<summary>
Delete generic block device files.
</summary>
@@ -73276,7 +73332,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_generic_chr_files" lineno="583">
+<interface name="dev_getattr_generic_chr_files" lineno="601">
<summary>
Allow getattr for generic character device files.
</summary>
@@ -73286,7 +73342,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_generic_chr_files" lineno="601">
+<interface name="dev_dontaudit_getattr_generic_chr_files" lineno="619">
<summary>
Dontaudit getattr for generic character device files.
</summary>
@@ -73296,7 +73352,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_setattr_generic_chr_files" lineno="620">
+<interface name="dev_setattr_generic_chr_files" lineno="638">
<summary>
Set the attributes for generic
character device files.
@@ -73307,7 +73363,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_generic_chr_files" lineno="638">
+<interface name="dev_dontaudit_setattr_generic_chr_files" lineno="656">
<summary>
Dontaudit setattr for generic character device files.
</summary>
@@ -73317,7 +73373,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_read_generic_chr_files" lineno="656">
+<interface name="dev_read_generic_chr_files" lineno="674">
<summary>
Read generic character device files.
</summary>
@@ -73327,7 +73383,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_generic_chr_files" lineno="674">
+<interface name="dev_rw_generic_chr_files" lineno="692">
<summary>
Read and write generic character device files.
</summary>
@@ -73337,7 +73393,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_generic_blk_files" lineno="692">
+<interface name="dev_rw_generic_blk_files" lineno="710">
<summary>
Read and write generic block device files.
</summary>
@@ -73347,7 +73403,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_rw_generic_chr_files" lineno="710">
+<interface name="dev_dontaudit_rw_generic_chr_files" lineno="728">
<summary>
Dontaudit attempts to read/write generic character device files.
</summary>
@@ -73357,7 +73413,7 @@ Domain to dontaudit access.
</summary>
</param>
</interface>
-<interface name="dev_create_generic_chr_files" lineno="728">
+<interface name="dev_create_generic_chr_files" lineno="746">
<summary>
Create generic character device files.
</summary>
@@ -73367,7 +73423,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_delete_generic_chr_files" lineno="746">
+<interface name="dev_delete_generic_chr_files" lineno="764">
<summary>
Delete generic character device files.
</summary>
@@ -73377,7 +73433,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabelfrom_generic_chr_files" lineno="764">
+<interface name="dev_relabelfrom_generic_chr_files" lineno="782">
<summary>
Relabel from generic character device files.
</summary>
@@ -73387,7 +73443,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_generic_symlinks" lineno="783">
+<interface name="dev_dontaudit_setattr_generic_symlinks" lineno="801">
<summary>
Do not audit attempts to set the attributes
of symbolic links in device directories (/dev).
@@ -73398,7 +73454,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_read_generic_symlinks" lineno="801">
+<interface name="dev_read_generic_symlinks" lineno="819">
<summary>
Read symbolic links in device directories.
</summary>
@@ -73408,7 +73464,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_generic_symlinks" lineno="819">
+<interface name="dev_create_generic_symlinks" lineno="837">
<summary>
Create symbolic links in device directories.
</summary>
@@ -73418,7 +73474,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_delete_generic_symlinks" lineno="837">
+<interface name="dev_delete_generic_symlinks" lineno="855">
<summary>
Delete symbolic links in device directories.
</summary>
@@ -73428,7 +73484,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_generic_symlinks" lineno="855">
+<interface name="dev_manage_generic_symlinks" lineno="873">
<summary>
Create, delete, read, and write symbolic links in device directories.
</summary>
@@ -73438,7 +73494,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_generic_symlinks" lineno="873">
+<interface name="dev_relabel_generic_symlinks" lineno="891">
<summary>
Relabel symbolic links in device directories.
</summary>
@@ -73448,7 +73504,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_generic_sock_files" lineno="891">
+<interface name="dev_write_generic_sock_files" lineno="909">
<summary>
Write generic sock files in /dev.
</summary>
@@ -73458,7 +73514,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_all_dev_nodes" lineno="909">
+<interface name="dev_manage_all_dev_nodes" lineno="927">
<summary>
Create, delete, read, and write device nodes in device directories.
</summary>
@@ -73468,7 +73524,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_rw_generic_dev_nodes" lineno="945">
+<interface name="dev_dontaudit_rw_generic_dev_nodes" lineno="968">
<summary>
Dontaudit getattr for generic device files.
</summary>
@@ -73478,7 +73534,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_manage_generic_blk_files" lineno="963">
+<interface name="dev_manage_generic_blk_files" lineno="986">
<summary>
Create, delete, read, and write block device files.
</summary>
@@ -73488,7 +73544,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_generic_chr_files" lineno="981">
+<interface name="dev_manage_generic_chr_files" lineno="1004">
<summary>
Create, delete, read, and write character device files.
</summary>
@@ -73498,7 +73554,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_filetrans" lineno="1016">
+<interface name="dev_filetrans" lineno="1039">
<summary>
Create, read, and write device nodes. The node
will be transitioned to the type provided.
@@ -73525,7 +73581,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="dev_tmpfs_filetrans_dev" lineno="1051">
+<interface name="dev_tmpfs_filetrans_dev" lineno="1074">
<summary>
Create, read, and write device nodes. The node
will be transitioned to the type provided. This is
@@ -73549,7 +73605,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="dev_getattr_all_blk_files" lineno="1070">
+<interface name="dev_getattr_all_blk_files" lineno="1093">
<summary>
Getattr on all block file device nodes.
</summary>
@@ -73560,7 +73616,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="dev_dontaudit_getattr_all_blk_files" lineno="1089">
+<interface name="dev_dontaudit_getattr_all_blk_files" lineno="1112">
<summary>
Dontaudit getattr on all block file device nodes.
</summary>
@@ -73570,7 +73626,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_getattr_all_chr_files" lineno="1109">
+<interface name="dev_getattr_all_chr_files" lineno="1132">
<summary>
Getattr on all character file device nodes.
</summary>
@@ -73581,7 +73637,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="dev_dontaudit_getattr_all_chr_files" lineno="1127">
+<interface name="dev_dontaudit_getattr_all_chr_files" lineno="1151">
<summary>
Dontaudit getattr on all character file device nodes.
</summary>
@@ -73591,7 +73647,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_setattr_all_blk_files" lineno="1147">
+<interface name="dev_setattr_all_blk_files" lineno="1171">
<summary>
Setattr on all block file device nodes.
</summary>
@@ -73602,7 +73658,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="dev_setattr_all_chr_files" lineno="1166">
+<interface name="dev_setattr_all_chr_files" lineno="1191">
<summary>
Setattr on all character file device nodes.
</summary>
@@ -73613,7 +73669,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="dev_dontaudit_read_all_blk_files" lineno="1184">
+<interface name="dev_dontaudit_read_all_blk_files" lineno="1210">
<summary>
Dontaudit read on all block file device nodes.
</summary>
@@ -73623,7 +73679,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_write_all_blk_files" lineno="1202">
+<interface name="dev_dontaudit_write_all_blk_files" lineno="1228">
<summary>
Dontaudit write on all block file device nodes.
</summary>
@@ -73633,7 +73689,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_all_chr_files" lineno="1220">
+<interface name="dev_dontaudit_read_all_chr_files" lineno="1246">
<summary>
Dontaudit read on all character file device nodes.
</summary>
@@ -73643,7 +73699,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_write_all_chr_files" lineno="1238">
+<interface name="dev_dontaudit_write_all_chr_files" lineno="1264">
<summary>
Dontaudit write on all character file device nodes.
</summary>
@@ -73653,7 +73709,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_create_all_blk_files" lineno="1256">
+<interface name="dev_create_all_blk_files" lineno="1282">
<summary>
Create all block device files.
</summary>
@@ -73663,7 +73719,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_all_chr_files" lineno="1274">
+<interface name="dev_create_all_chr_files" lineno="1301">
<summary>
Create all character device files.
</summary>
@@ -73673,7 +73729,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_delete_all_blk_files" lineno="1292">
+<interface name="dev_delete_all_blk_files" lineno="1320">
<summary>
Delete all block device files.
</summary>
@@ -73683,7 +73739,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_delete_all_chr_files" lineno="1310">
+<interface name="dev_delete_all_chr_files" lineno="1339">
<summary>
Delete all character device files.
</summary>
@@ -73693,7 +73749,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rename_all_blk_files" lineno="1328">
+<interface name="dev_rename_all_blk_files" lineno="1358">
<summary>
Rename all block device files.
</summary>
@@ -73703,7 +73759,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rename_all_chr_files" lineno="1346">
+<interface name="dev_rename_all_chr_files" lineno="1377">
<summary>
Rename all character device files.
</summary>
@@ -73713,7 +73769,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_all_blk_files" lineno="1364">
+<interface name="dev_manage_all_blk_files" lineno="1396">
<summary>
Read, write, create, and delete all block device files.
</summary>
@@ -73723,7 +73779,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_all_chr_files" lineno="1388">
+<interface name="dev_manage_all_chr_files" lineno="1421">
<summary>
Read, write, create, and delete all character device files.
</summary>
@@ -73733,7 +73789,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_acpi_bios_dev" lineno="1408">
+<interface name="dev_getattr_acpi_bios_dev" lineno="1442">
<summary>
Get the attributes of the apm bios device node.
</summary>
@@ -73743,7 +73799,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_acpi_bios_dev" lineno="1427">
+<interface name="dev_dontaudit_getattr_acpi_bios_dev" lineno="1461">
<summary>
Do not audit attempts to get the attributes of
the apm bios device node.
@@ -73754,7 +73810,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_setattr_acpi_bios_dev" lineno="1445">
+<interface name="dev_setattr_acpi_bios_dev" lineno="1479">
<summary>
Set the attributes of the apm bios device node.
</summary>
@@ -73764,7 +73820,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_acpi_bios_dev" lineno="1464">
+<interface name="dev_dontaudit_setattr_acpi_bios_dev" lineno="1498">
<summary>
Do not audit attempts to set the attributes of
the apm bios device node.
@@ -73775,7 +73831,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_acpi_bios" lineno="1482">
+<interface name="dev_rw_acpi_bios" lineno="1516">
<summary>
Read and write the apm bios.
</summary>
@@ -73785,7 +73841,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_agp_dev" lineno="1500">
+<interface name="dev_getattr_agp_dev" lineno="1534">
<summary>
Getattr the agp devices.
</summary>
@@ -73795,7 +73851,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_agp" lineno="1518">
+<interface name="dev_rw_agp" lineno="1552">
<summary>
Read and write the agp devices.
</summary>
@@ -73805,7 +73861,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_autofs_dev" lineno="1537">
+<interface name="dev_getattr_autofs_dev" lineno="1571">
<summary>
Get the attributes of the autofs device node.
</summary>
@@ -73815,7 +73871,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_autofs_dev" lineno="1556">
+<interface name="dev_dontaudit_getattr_autofs_dev" lineno="1590">
<summary>
Do not audit attempts to get the attributes of
the autofs device node.
@@ -73826,7 +73882,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_setattr_autofs_dev" lineno="1574">
+<interface name="dev_setattr_autofs_dev" lineno="1608">
<summary>
Set the attributes of the autofs device node.
</summary>
@@ -73836,7 +73892,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_autofs_dev" lineno="1593">
+<interface name="dev_dontaudit_setattr_autofs_dev" lineno="1627">
<summary>
Do not audit attempts to set the attributes of
the autofs device node.
@@ -73847,7 +73903,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_autofs" lineno="1611">
+<interface name="dev_rw_autofs" lineno="1645">
<summary>
Read and write the autofs device.
</summary>
@@ -73857,7 +73913,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_autofs_dev" lineno="1629">
+<interface name="dev_relabel_autofs_dev" lineno="1663">
<summary>
Relabel the autofs device node.
</summary>
@@ -73867,7 +73923,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_cachefiles" lineno="1648">
+<interface name="dev_rw_cachefiles" lineno="1682">
<summary>
Read and write cachefiles character
device nodes.
@@ -73878,7 +73934,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_cardmgr" lineno="1666">
+<interface name="dev_rw_cardmgr" lineno="1700">
<summary>
Read and write the PCMCIA card manager device.
</summary>
@@ -73888,7 +73944,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_rw_cardmgr" lineno="1685">
+<interface name="dev_dontaudit_rw_cardmgr" lineno="1719">
<summary>
Do not audit attempts to read and
write the PCMCIA card manager device.
@@ -73899,7 +73955,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_create_cardmgr_dev" lineno="1705">
+<interface name="dev_create_cardmgr_dev" lineno="1739">
<summary>
Create, read, write, and delete
the PCMCIA card manager device
@@ -73911,7 +73967,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_cardmgr_dev" lineno="1725">
+<interface name="dev_manage_cardmgr_dev" lineno="1759">
<summary>
Create, read, write, and delete
the PCMCIA card manager device.
@@ -73922,7 +73978,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_filetrans_cardmgr" lineno="1751">
+<interface name="dev_filetrans_cardmgr" lineno="1785">
<summary>
Automatic type transition to the type
for PCMCIA card manager device nodes when
@@ -73939,7 +73995,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="dev_getattr_cpu_dev" lineno="1770">
+<interface name="dev_getattr_cpu_dev" lineno="1804">
<summary>
Get the attributes of the CPU
microcode and id interfaces.
@@ -73950,7 +74006,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_cpu_dev" lineno="1789">
+<interface name="dev_setattr_cpu_dev" lineno="1823">
<summary>
Set the attributes of the CPU
microcode and id interfaces.
@@ -73961,7 +74017,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_cpuid" lineno="1807">
+<interface name="dev_read_cpuid" lineno="1841">
<summary>
Read the CPU identity.
</summary>
@@ -73971,7 +74027,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_cpu_microcode" lineno="1826">
+<interface name="dev_rw_cpu_microcode" lineno="1860">
<summary>
Read and write the the CPU microcode device. This
is required to load CPU microcode.
@@ -73982,7 +74038,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_crash" lineno="1844">
+<interface name="dev_read_crash" lineno="1878">
<summary>
Read the kernel crash device
</summary>
@@ -73992,7 +74048,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_crypto" lineno="1862">
+<interface name="dev_rw_crypto" lineno="1896">
<summary>
Read and write the the hardware SSL accelerator.
</summary>
@@ -74002,7 +74058,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_dlm_control" lineno="1880">
+<interface name="dev_setattr_dlm_control" lineno="1914">
<summary>
Set the attributes of the dlm control devices.
</summary>
@@ -74012,7 +74068,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_dlm_control" lineno="1898">
+<interface name="dev_rw_dlm_control" lineno="1932">
<summary>
Read and write the the dlm control device
</summary>
@@ -74022,7 +74078,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_dri_dev" lineno="1916">
+<interface name="dev_getattr_dri_dev" lineno="1950">
<summary>
getattr the dri devices.
</summary>
@@ -74032,7 +74088,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_dri_dev" lineno="1934">
+<interface name="dev_setattr_dri_dev" lineno="1968">
<summary>
Setattr the dri devices.
</summary>
@@ -74042,7 +74098,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_dri" lineno="1952">
+<interface name="dev_ioctl_dri_dev" lineno="1986">
+<summary>
+IOCTL the dri devices.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_rw_dri" lineno="2004">
<summary>
Read and write the dri devices.
</summary>
@@ -74052,7 +74118,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_rw_dri" lineno="1971">
+<interface name="dev_dontaudit_rw_dri" lineno="2023">
<summary>
Dontaudit read and write on the dri devices.
</summary>
@@ -74062,7 +74128,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_manage_dri_dev" lineno="1989">
+<interface name="dev_manage_dri_dev" lineno="2041">
<summary>
Create, read, write, and delete the dri devices.
</summary>
@@ -74072,7 +74138,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_filetrans_dri" lineno="2014">
+<interface name="dev_filetrans_dri" lineno="2066">
<summary>
Automatic type transition to the type
for DRI device nodes when created in /dev.
@@ -74088,7 +74154,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="dev_filetrans_input_dev" lineno="2038">
+<interface name="dev_filetrans_input_dev" lineno="2090">
<summary>
Automatic type transition to the type
for event device nodes when created in /dev.
@@ -74104,7 +74170,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="dev_getattr_input_dev" lineno="2056">
+<interface name="dev_getattr_input_dev" lineno="2108">
<summary>
Get the attributes of the event devices.
</summary>
@@ -74114,7 +74180,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_input_dev" lineno="2075">
+<interface name="dev_setattr_input_dev" lineno="2127">
<summary>
Set the attributes of the event devices.
</summary>
@@ -74124,7 +74190,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_input" lineno="2094">
+<interface name="dev_read_input" lineno="2146">
<summary>
Read input event devices (/dev/input).
</summary>
@@ -74134,7 +74200,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_input_dev" lineno="2112">
+<interface name="dev_rw_input_dev" lineno="2164">
<summary>
Read and write input event devices (/dev/input).
</summary>
@@ -74144,7 +74210,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_input_dev" lineno="2130">
+<interface name="dev_manage_input_dev" lineno="2182">
<summary>
Create, read, write, and delete input event devices (/dev/input).
</summary>
@@ -74154,7 +74220,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_framebuffer_dev" lineno="2148">
+<interface name="dev_getattr_framebuffer_dev" lineno="2200">
<summary>
Get the attributes of the framebuffer device node.
</summary>
@@ -74164,7 +74230,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_framebuffer_dev" lineno="2166">
+<interface name="dev_setattr_framebuffer_dev" lineno="2218">
<summary>
Set the attributes of the framebuffer device node.
</summary>
@@ -74174,7 +74240,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_framebuffer_dev" lineno="2185">
+<interface name="dev_dontaudit_setattr_framebuffer_dev" lineno="2237">
<summary>
Dot not audit attempts to set the attributes
of the framebuffer device node.
@@ -74185,7 +74251,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_read_framebuffer" lineno="2203">
+<interface name="dev_read_framebuffer" lineno="2255">
<summary>
Read the framebuffer.
</summary>
@@ -74195,7 +74261,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_framebuffer" lineno="2221">
+<interface name="dev_dontaudit_read_framebuffer" lineno="2273">
<summary>
Do not audit attempts to read the framebuffer.
</summary>
@@ -74205,7 +74271,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_framebuffer" lineno="2239">
+<interface name="dev_write_framebuffer" lineno="2291">
<summary>
Write the framebuffer.
</summary>
@@ -74215,7 +74281,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_framebuffer" lineno="2257">
+<interface name="dev_rw_framebuffer" lineno="2309">
<summary>
Read and write the framebuffer.
</summary>
@@ -74225,7 +74291,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_kmsg" lineno="2275">
+<interface name="dev_read_kmsg" lineno="2327">
<summary>
Read the kernel messages
</summary>
@@ -74235,7 +74301,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_kmsg" lineno="2293">
+<interface name="dev_dontaudit_read_kmsg" lineno="2345">
<summary>
Do not audit attempts to read the kernel messages
</summary>
@@ -74245,7 +74311,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_kmsg" lineno="2311">
+<interface name="dev_write_kmsg" lineno="2363">
<summary>
Write to the kernel messages device
</summary>
@@ -74255,7 +74321,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_kmsg" lineno="2329">
+<interface name="dev_rw_kmsg" lineno="2381">
<summary>
Read and write to the kernel messages device
</summary>
@@ -74265,7 +74331,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_ksm_dev" lineno="2347">
+<interface name="dev_mounton_kmsg" lineno="2399">
+<summary>
+Mount on the kernel messages device
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_getattr_ksm_dev" lineno="2417">
<summary>
Get the attributes of the ksm devices.
</summary>
@@ -74275,7 +74351,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_ksm_dev" lineno="2365">
+<interface name="dev_setattr_ksm_dev" lineno="2435">
<summary>
Set the attributes of the ksm devices.
</summary>
@@ -74285,7 +74361,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_ksm" lineno="2383">
+<interface name="dev_read_ksm" lineno="2453">
<summary>
Read the ksm devices.
</summary>
@@ -74295,7 +74371,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_ksm" lineno="2401">
+<interface name="dev_rw_ksm" lineno="2471">
<summary>
Read and write to ksm devices.
</summary>
@@ -74305,7 +74381,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_kvm_dev" lineno="2419">
+<interface name="dev_getattr_kvm_dev" lineno="2489">
<summary>
Get the attributes of the kvm devices.
</summary>
@@ -74315,7 +74391,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_kvm_dev" lineno="2437">
+<interface name="dev_setattr_kvm_dev" lineno="2507">
<summary>
Set the attributes of the kvm devices.
</summary>
@@ -74325,7 +74401,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_kvm" lineno="2455">
+<interface name="dev_read_kvm" lineno="2525">
<summary>
Read the kvm devices.
</summary>
@@ -74335,7 +74411,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_kvm" lineno="2473">
+<interface name="dev_rw_kvm" lineno="2543">
<summary>
Read and write to kvm devices.
</summary>
@@ -74345,7 +74421,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_lirc" lineno="2491">
+<interface name="dev_read_lirc" lineno="2561">
<summary>
Read the lirc device.
</summary>
@@ -74355,7 +74431,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_lirc" lineno="2509">
+<interface name="dev_rw_lirc" lineno="2579">
<summary>
Read and write the lirc device.
</summary>
@@ -74365,7 +74441,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_filetrans_lirc" lineno="2533">
+<interface name="dev_filetrans_lirc" lineno="2603">
<summary>
Automatic type transition to the type
for lirc device nodes when created in /dev.
@@ -74381,7 +74457,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="dev_rw_loop_control" lineno="2551">
+<interface name="dev_rw_loop_control" lineno="2621">
<summary>
Read and write the loop-control device.
</summary>
@@ -74391,7 +74467,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_lvm_control" lineno="2569">
+<interface name="dev_getattr_lvm_control" lineno="2639">
<summary>
Get the attributes of the lvm comtrol device.
</summary>
@@ -74401,7 +74477,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_lvm_control" lineno="2587">
+<interface name="dev_read_lvm_control" lineno="2657">
<summary>
Read the lvm comtrol device.
</summary>
@@ -74411,7 +74487,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_lvm_control" lineno="2605">
+<interface name="dev_rw_lvm_control" lineno="2675">
<summary>
Read and write the lvm control device.
</summary>
@@ -74421,7 +74497,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_rw_lvm_control" lineno="2623">
+<interface name="dev_dontaudit_rw_lvm_control" lineno="2693">
<summary>
Do not audit attempts to read and write lvm control device.
</summary>
@@ -74431,7 +74507,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_delete_lvm_control_dev" lineno="2641">
+<interface name="dev_delete_lvm_control_dev" lineno="2711">
<summary>
Delete the lvm control device.
</summary>
@@ -74441,7 +74517,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_memory_dev" lineno="2659">
+<interface name="dev_dontaudit_getattr_memory_dev" lineno="2729">
<summary>
dontaudit getattr raw memory devices (e.g. /dev/mem).
</summary>
@@ -74451,7 +74527,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_read_raw_memory" lineno="2677">
+<interface name="dev_read_raw_memory" lineno="2747">
<summary>
Read raw memory devices (e.g. /dev/mem).
</summary>
@@ -74461,7 +74537,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_raw_memory" lineno="2700">
+<interface name="dev_dontaudit_read_raw_memory" lineno="2770">
<summary>
Do not audit attempts to read raw memory devices
(e.g. /dev/mem).
@@ -74472,7 +74548,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_raw_memory" lineno="2718">
+<interface name="dev_write_raw_memory" lineno="2788">
<summary>
Write raw memory devices (e.g. /dev/mem).
</summary>
@@ -74482,7 +74558,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rx_raw_memory" lineno="2740">
+<interface name="dev_rx_raw_memory" lineno="2810">
<summary>
Read and execute raw memory devices (e.g. /dev/mem).
</summary>
@@ -74492,7 +74568,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_wx_raw_memory" lineno="2759">
+<interface name="dev_wx_raw_memory" lineno="2829">
<summary>
Write and execute raw memory devices (e.g. /dev/mem).
</summary>
@@ -74502,7 +74578,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_misc_dev" lineno="2778">
+<interface name="dev_getattr_misc_dev" lineno="2848">
<summary>
Get the attributes of miscellaneous devices.
</summary>
@@ -74512,7 +74588,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_misc_dev" lineno="2797">
+<interface name="dev_dontaudit_getattr_misc_dev" lineno="2867">
<summary>
Do not audit attempts to get the attributes
of miscellaneous devices.
@@ -74523,7 +74599,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_setattr_misc_dev" lineno="2815">
+<interface name="dev_setattr_misc_dev" lineno="2885">
<summary>
Set the attributes of miscellaneous devices.
</summary>
@@ -74533,7 +74609,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_misc_dev" lineno="2834">
+<interface name="dev_dontaudit_setattr_misc_dev" lineno="2904">
<summary>
Do not audit attempts to set the attributes
of miscellaneous devices.
@@ -74544,7 +74620,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_read_misc" lineno="2852">
+<interface name="dev_read_misc" lineno="2922">
<summary>
Read miscellaneous devices.
</summary>
@@ -74554,7 +74630,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_misc" lineno="2870">
+<interface name="dev_write_misc" lineno="2940">
<summary>
Write miscellaneous devices.
</summary>
@@ -74564,7 +74640,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_rw_misc" lineno="2888">
+<interface name="dev_dontaudit_rw_misc" lineno="2958">
<summary>
Do not audit attempts to read and write miscellaneous devices.
</summary>
@@ -74574,7 +74650,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_modem_dev" lineno="2906">
+<interface name="dev_getattr_modem_dev" lineno="2976">
<summary>
Get the attributes of the modem devices.
</summary>
@@ -74584,7 +74660,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_modem_dev" lineno="2924">
+<interface name="dev_setattr_modem_dev" lineno="2994">
<summary>
Set the attributes of the modem devices.
</summary>
@@ -74594,7 +74670,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_modem" lineno="2942">
+<interface name="dev_read_modem" lineno="3012">
<summary>
Read the modem devices.
</summary>
@@ -74604,7 +74680,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_modem" lineno="2960">
+<interface name="dev_rw_modem" lineno="3030">
<summary>
Read and write to modem devices.
</summary>
@@ -74614,7 +74690,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_mouse_dev" lineno="2978">
+<interface name="dev_getattr_mouse_dev" lineno="3048">
<summary>
Get the attributes of the mouse devices.
</summary>
@@ -74624,7 +74700,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_mouse_dev" lineno="2996">
+<interface name="dev_setattr_mouse_dev" lineno="3066">
<summary>
Set the attributes of the mouse devices.
</summary>
@@ -74634,7 +74710,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_mouse" lineno="3014">
+<interface name="dev_read_mouse" lineno="3084">
<summary>
Read the mouse devices.
</summary>
@@ -74644,7 +74720,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_mouse" lineno="3032">
+<interface name="dev_rw_mouse" lineno="3102">
<summary>
Read and write to mouse devices.
</summary>
@@ -74654,7 +74730,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_mtrr_dev" lineno="3051">
+<interface name="dev_getattr_mtrr_dev" lineno="3121">
<summary>
Get the attributes of the memory type range
registers (MTRR) device.
@@ -74665,7 +74741,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_write_mtrr" lineno="3071">
+<interface name="dev_dontaudit_write_mtrr" lineno="3141">
<summary>
Do not audit attempts to write the memory type
range registers (MTRR).
@@ -74676,7 +74752,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_mtrr" lineno="3090">
+<interface name="dev_rw_mtrr" lineno="3160">
<summary>
Read and write the memory type range registers (MTRR).
</summary>
@@ -74686,9 +74762,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_netcontrol_dev" lineno="3109">
+<interface name="dev_getattr_netcontrol_dev" lineno="3179">
<summary>
-Get the attributes of the network control device
+Get the attributes of the network control device (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -74696,9 +74772,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_netcontrol" lineno="3127">
+<interface name="dev_read_netcontrol" lineno="3194">
<summary>
-Read the network control identity.
+Read the network control identity. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -74706,9 +74782,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_netcontrol" lineno="3145">
+<interface name="dev_rw_netcontrol" lineno="3209">
<summary>
-Read and write the the network control device.
+Read and write the the network control device. (Deprecated)
</summary>
<param name="domain">
<summary>
@@ -74716,7 +74792,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_null_dev" lineno="3163">
+<interface name="dev_getattr_null_dev" lineno="3224">
<summary>
Get the attributes of the null device nodes.
</summary>
@@ -74726,7 +74802,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_null_dev" lineno="3181">
+<interface name="dev_setattr_null_dev" lineno="3242">
<summary>
Set the attributes of the null device nodes.
</summary>
@@ -74736,7 +74812,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_delete_null" lineno="3199">
+<interface name="dev_delete_null" lineno="3260">
<summary>
Delete the null device (/dev/null).
</summary>
@@ -74746,7 +74822,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_null" lineno="3217">
+<interface name="dev_rw_null" lineno="3278">
<summary>
Read and write to the null device (/dev/null).
</summary>
@@ -74756,7 +74832,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_null_dev" lineno="3235">
+<interface name="dev_create_null_dev" lineno="3296">
<summary>
Create the null device (/dev/null).
</summary>
@@ -74766,7 +74842,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_null_service" lineno="3254">
+<interface name="dev_manage_null_service" lineno="3315">
<summary>
Manage services with script type null_device_t for when
/lib/systemd/system/something.service is a link to /dev/null
@@ -74777,7 +74853,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3274">
+<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3335">
<summary>
Do not audit attempts to get the attributes
of the BIOS non-volatile RAM device.
@@ -74788,7 +74864,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_nvram" lineno="3292">
+<interface name="dev_rw_nvram" lineno="3353">
<summary>
Read and write BIOS non-volatile RAM.
</summary>
@@ -74798,7 +74874,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_printer_dev" lineno="3310">
+<interface name="dev_getattr_printer_dev" lineno="3371">
<summary>
Get the attributes of the printer device nodes.
</summary>
@@ -74808,7 +74884,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_printer_dev" lineno="3328">
+<interface name="dev_setattr_printer_dev" lineno="3389">
<summary>
Set the attributes of the printer device nodes.
</summary>
@@ -74818,7 +74894,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_append_printer" lineno="3347">
+<interface name="dev_append_printer" lineno="3408">
<summary>
Append the printer device.
</summary>
@@ -74828,7 +74904,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_printer" lineno="3365">
+<interface name="dev_rw_printer" lineno="3426">
<summary>
Read and write the printer device.
</summary>
@@ -74838,7 +74914,37 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_printk" lineno="3383">
+<interface name="dev_getattr_pmqos_dev" lineno="3444">
+<summary>
+Get the attributes of PM QoS devices
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_read_pmqos" lineno="3462">
+<summary>
+Read the PM QoS devices.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_rw_pmqos" lineno="3480">
+<summary>
+Read and write the the PM QoS devices.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_read_printk" lineno="3498">
<summary>
Read printk devices (e.g., /dev/kmsg /dev/mcelog)
</summary>
@@ -74848,7 +74954,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_qemu_dev" lineno="3398">
+<interface name="dev_getattr_qemu_dev" lineno="3513">
<summary>
Get the attributes of the QEMU
microcode and id interfaces.
@@ -74859,7 +74965,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_qemu_dev" lineno="3417">
+<interface name="dev_setattr_qemu_dev" lineno="3532">
<summary>
Set the attributes of the QEMU
microcode and id interfaces.
@@ -74870,7 +74976,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_qemu" lineno="3435">
+<interface name="dev_read_qemu" lineno="3550">
<summary>
Read the QEMU device
</summary>
@@ -74880,7 +74986,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_qemu" lineno="3453">
+<interface name="dev_rw_qemu" lineno="3568">
<summary>
Read and write the the QEMU device.
</summary>
@@ -74890,7 +74996,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_rand" lineno="3487">
+<interface name="dev_read_rand" lineno="3602">
<summary>
Read from random number generator
devices (e.g., /dev/random).
@@ -74916,7 +75022,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="dev_dontaudit_read_rand" lineno="3506">
+<interface name="dev_dontaudit_read_rand" lineno="3621">
<summary>
Do not audit attempts to read from random
number generator devices (e.g., /dev/random)
@@ -74927,7 +75033,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_append_rand" lineno="3525">
+<interface name="dev_dontaudit_append_rand" lineno="3640">
<summary>
Do not audit attempts to append to random
number generator devices (e.g., /dev/random)
@@ -74938,7 +75044,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_rand" lineno="3545">
+<interface name="dev_write_rand" lineno="3660">
<summary>
Write to the random device (e.g., /dev/random). This adds
entropy used to generate the random data read from the
@@ -74950,7 +75056,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_realtime_clock" lineno="3563">
+<interface name="dev_read_realtime_clock" lineno="3678">
<summary>
Read the realtime clock (/dev/rtc).
</summary>
@@ -74960,7 +75066,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_realtime_clock" lineno="3581">
+<interface name="dev_write_realtime_clock" lineno="3696">
<summary>
Set the realtime clock (/dev/rtc).
</summary>
@@ -74970,7 +75076,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_realtime_clock" lineno="3601">
+<interface name="dev_rw_realtime_clock" lineno="3716">
<summary>
Read and set the realtime clock (/dev/rtc).
</summary>
@@ -74980,7 +75086,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_scanner_dev" lineno="3616">
+<interface name="dev_getattr_scanner_dev" lineno="3731">
<summary>
Get the attributes of the scanner device.
</summary>
@@ -74990,7 +75096,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3635">
+<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3750">
<summary>
Do not audit attempts to get the attributes of
the scanner device.
@@ -75001,7 +75107,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_setattr_scanner_dev" lineno="3653">
+<interface name="dev_setattr_scanner_dev" lineno="3768">
<summary>
Set the attributes of the scanner device.
</summary>
@@ -75011,7 +75117,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3672">
+<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3787">
<summary>
Do not audit attempts to set the attributes of
the scanner device.
@@ -75022,7 +75128,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_scanner" lineno="3690">
+<interface name="dev_rw_scanner" lineno="3805">
<summary>
Read and write the scanner device.
</summary>
@@ -75032,7 +75138,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_sound_dev" lineno="3708">
+<interface name="dev_getattr_sound_dev" lineno="3823">
<summary>
Get the attributes of the sound devices.
</summary>
@@ -75042,7 +75148,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_sound_dev" lineno="3726">
+<interface name="dev_setattr_sound_dev" lineno="3841">
<summary>
Set the attributes of the sound devices.
</summary>
@@ -75052,7 +75158,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_sound" lineno="3744">
+<interface name="dev_read_sound" lineno="3859">
<summary>
Read the sound devices.
</summary>
@@ -75062,7 +75168,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_sound" lineno="3763">
+<interface name="dev_write_sound" lineno="3878">
<summary>
Write the sound devices.
</summary>
@@ -75072,7 +75178,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_sound_mixer" lineno="3782">
+<interface name="dev_read_sound_mixer" lineno="3897">
<summary>
Read the sound mixer devices.
</summary>
@@ -75082,7 +75188,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_sound_mixer" lineno="3801">
+<interface name="dev_write_sound_mixer" lineno="3916">
<summary>
Write the sound mixer devices.
</summary>
@@ -75092,7 +75198,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_power_mgmt_dev" lineno="3820">
+<interface name="dev_getattr_power_mgmt_dev" lineno="3935">
<summary>
Get the attributes of the the power management device.
</summary>
@@ -75102,7 +75208,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_power_mgmt_dev" lineno="3838">
+<interface name="dev_setattr_power_mgmt_dev" lineno="3953">
<summary>
Set the attributes of the the power management device.
</summary>
@@ -75112,7 +75218,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_power_management" lineno="3856">
+<interface name="dev_rw_power_management" lineno="3971">
<summary>
Read and write the the power management device.
</summary>
@@ -75122,7 +75228,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_smartcard_dev" lineno="3874">
+<interface name="dev_getattr_smartcard_dev" lineno="3989">
<summary>
Getattr on smartcard devices
</summary>
@@ -75132,7 +75238,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="3893">
+<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4008">
<summary>
dontaudit getattr on smartcard devices
</summary>
@@ -75142,7 +75248,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_rw_smartcard" lineno="3912">
+<interface name="dev_rw_smartcard" lineno="4027">
<summary>
Read and write smartcard devices.
</summary>
@@ -75152,7 +75258,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_smartcard" lineno="3930">
+<interface name="dev_manage_smartcard" lineno="4045">
<summary>
Create, read, write, and delete smartcard devices.
</summary>
@@ -75162,7 +75268,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_mounton_sysfs" lineno="3948">
+<interface name="dev_mounton_sysfs" lineno="4063">
<summary>
Mount a filesystem on sysfs.
</summary>
@@ -75172,7 +75278,7 @@ Domain allow access.
</summary>
</param>
</interface>
-<interface name="dev_associate_sysfs" lineno="3966">
+<interface name="dev_associate_sysfs" lineno="4081">
<summary>
Associate a file to a sysfs filesystem.
</summary>
@@ -75182,7 +75288,7 @@ The type of the file to be associated to sysfs.
</summary>
</param>
</interface>
-<interface name="dev_getattr_sysfs_dirs" lineno="3984">
+<interface name="dev_getattr_sysfs_dirs" lineno="4099">
<summary>
Get the attributes of sysfs directories.
</summary>
@@ -75192,7 +75298,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_sysfs" lineno="4002">
+<interface name="dev_getattr_sysfs" lineno="4117">
<summary>
Get the attributes of sysfs filesystem
</summary>
@@ -75202,7 +75308,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_mount_sysfs" lineno="4020">
+<interface name="dev_mount_sysfs" lineno="4135">
<summary>
mount a sysfs filesystem
</summary>
@@ -75212,7 +75318,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_sysfs" lineno="4038">
+<interface name="dev_dontaudit_getattr_sysfs" lineno="4153">
<summary>
Do not audit getting the attributes of sysfs filesystem
</summary>
@@ -75222,7 +75328,7 @@ Domain to dontaudit access from
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_sysfs" lineno="4056">
+<interface name="dev_dontaudit_read_sysfs" lineno="4171">
<summary>
Dont audit attempts to read hardware state information
</summary>
@@ -75232,7 +75338,7 @@ Domain for which the attempts do not need to be audited
</summary>
</param>
</interface>
-<interface name="dev_mounton_sysfs_dirs" lineno="4076">
+<interface name="dev_mounton_sysfs_dirs" lineno="4191">
<summary>
mounton sysfs directories.
</summary>
@@ -75242,7 +75348,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_search_sysfs" lineno="4094">
+<interface name="dev_search_sysfs" lineno="4209">
<summary>
Search the sysfs directories.
</summary>
@@ -75252,7 +75358,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_search_sysfs" lineno="4112">
+<interface name="dev_dontaudit_search_sysfs" lineno="4227">
<summary>
Do not audit attempts to search sysfs.
</summary>
@@ -75262,7 +75368,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_list_sysfs" lineno="4130">
+<interface name="dev_list_sysfs" lineno="4245">
<summary>
List the contents of the sysfs directories.
</summary>
@@ -75272,7 +75378,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_sysfs_dirs" lineno="4149">
+<interface name="dev_write_sysfs_dirs" lineno="4264">
<summary>
Write in a sysfs directories.
</summary>
@@ -75282,7 +75388,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4167">
+<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4282">
<summary>
Do not audit attempts to write in a sysfs directory.
</summary>
@@ -75292,7 +75398,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_manage_sysfs_dirs" lineno="4186">
+<interface name="dev_manage_sysfs_dirs" lineno="4301">
<summary>
Create, read, write, and delete sysfs
directories.
@@ -75303,7 +75409,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_sysfs" lineno="4213">
+<interface name="dev_read_sysfs" lineno="4328">
<summary>
Read hardware state information.
</summary>
@@ -75322,7 +75428,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="dev_rw_sysfs" lineno="4234">
+<interface name="dev_rw_sysfs" lineno="4349">
<summary>
Allow caller to modify hardware state information.
</summary>
@@ -75332,7 +75438,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_sysfs_files" lineno="4255">
+<interface name="dev_create_sysfs_files" lineno="4370">
<summary>
Add a sysfs file
</summary>
@@ -75342,7 +75448,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_sysfs_dirs" lineno="4273">
+<interface name="dev_relabel_sysfs_dirs" lineno="4388">
<summary>
Relabel hardware state directories.
</summary>
@@ -75352,7 +75458,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_all_sysfs" lineno="4291">
+<interface name="dev_relabel_all_sysfs" lineno="4406">
<summary>
Relabel from/to all sysfs types.
</summary>
@@ -75362,7 +75468,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_tpm" lineno="4311">
+<interface name="dev_setattr_all_sysfs" lineno="4426">
+<summary>
+Set the attributes of sysfs files, directories and symlinks.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dev_rw_tpm" lineno="4446">
<summary>
Read and write the TPM device.
</summary>
@@ -75372,7 +75488,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_urand" lineno="4352">
+<interface name="dev_read_urand" lineno="4487">
<summary>
Read from pseudo random number generator devices (e.g., /dev/urandom).
</summary>
@@ -75405,7 +75521,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="dev_dontaudit_read_urand" lineno="4371">
+<interface name="dev_dontaudit_read_urand" lineno="4506">
<summary>
Do not audit attempts to read from pseudo
random devices (e.g., /dev/urandom)
@@ -75416,7 +75532,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_write_urand" lineno="4390">
+<interface name="dev_write_urand" lineno="4525">
<summary>
Write to the pseudo random device (e.g., /dev/urandom). This
sets the random number generator seed.
@@ -75427,7 +75543,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_generic_usb_dev" lineno="4408">
+<interface name="dev_getattr_generic_usb_dev" lineno="4543">
<summary>
Getattr generic the USB devices.
</summary>
@@ -75437,7 +75553,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_generic_usb_dev" lineno="4426">
+<interface name="dev_setattr_generic_usb_dev" lineno="4561">
<summary>
Setattr generic the USB devices.
</summary>
@@ -75447,7 +75563,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_generic_usb_dev" lineno="4444">
+<interface name="dev_read_generic_usb_dev" lineno="4579">
<summary>
Read generic the USB devices.
</summary>
@@ -75457,7 +75573,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_generic_usb_dev" lineno="4462">
+<interface name="dev_rw_generic_usb_dev" lineno="4597">
<summary>
Read and write generic the USB devices.
</summary>
@@ -75467,7 +75583,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_generic_usb_dev" lineno="4480">
+<interface name="dev_relabel_generic_usb_dev" lineno="4615">
<summary>
Relabel generic the USB devices.
</summary>
@@ -75477,7 +75593,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_usbmon_dev" lineno="4498">
+<interface name="dev_read_usbmon_dev" lineno="4633">
<summary>
Read USB monitor devices.
</summary>
@@ -75487,7 +75603,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_usbmon_dev" lineno="4516">
+<interface name="dev_write_usbmon_dev" lineno="4651">
<summary>
Write USB monitor devices.
</summary>
@@ -75497,7 +75613,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_mount_usbfs" lineno="4534">
+<interface name="dev_mount_usbfs" lineno="4669">
<summary>
Mount a usbfs filesystem.
</summary>
@@ -75507,7 +75623,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_associate_usbfs" lineno="4552">
+<interface name="dev_associate_usbfs" lineno="4687">
<summary>
Associate a file to a usbfs filesystem.
</summary>
@@ -75517,7 +75633,7 @@ The type of the file to be associated to usbfs.
</summary>
</param>
</interface>
-<interface name="dev_getattr_usbfs_dirs" lineno="4570">
+<interface name="dev_getattr_usbfs_dirs" lineno="4705">
<summary>
Get the attributes of a directory in the usb filesystem.
</summary>
@@ -75527,7 +75643,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="4589">
+<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="4724">
<summary>
Do not audit attempts to get the attributes
of a directory in the usb filesystem.
@@ -75538,7 +75654,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_search_usbfs" lineno="4607">
+<interface name="dev_search_usbfs" lineno="4742">
<summary>
Search the directory containing USB hardware information.
</summary>
@@ -75548,7 +75664,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_list_usbfs" lineno="4625">
+<interface name="dev_list_usbfs" lineno="4760">
<summary>
Allow caller to get a list of usb hardware.
</summary>
@@ -75558,7 +75674,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_usbfs_files" lineno="4646">
+<interface name="dev_setattr_usbfs_files" lineno="4781">
<summary>
Set the attributes of usbfs filesystem.
</summary>
@@ -75568,7 +75684,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_usbfs" lineno="4666">
+<interface name="dev_read_usbfs" lineno="4801">
<summary>
Read USB hardware information using
the usbfs filesystem interface.
@@ -75579,7 +75695,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_usbfs" lineno="4686">
+<interface name="dev_rw_usbfs" lineno="4821">
<summary>
Allow caller to modify usb hardware configuration files.
</summary>
@@ -75589,7 +75705,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_getattr_video_dev" lineno="4706">
+<interface name="dev_getattr_video_dev" lineno="4841">
<summary>
Get the attributes of video4linux devices.
</summary>
@@ -75599,7 +75715,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_userio_dev" lineno="4724">
+<interface name="dev_rw_userio_dev" lineno="4859">
<summary>
Read and write userio device.
</summary>
@@ -75609,7 +75725,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_getattr_video_dev" lineno="4743">
+<interface name="dev_dontaudit_getattr_video_dev" lineno="4878">
<summary>
Do not audit attempts to get the attributes
of video4linux device nodes.
@@ -75620,7 +75736,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_setattr_video_dev" lineno="4761">
+<interface name="dev_setattr_video_dev" lineno="4896">
<summary>
Set the attributes of video4linux device nodes.
</summary>
@@ -75630,7 +75746,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_setattr_video_dev" lineno="4780">
+<interface name="dev_dontaudit_setattr_video_dev" lineno="4915">
<summary>
Do not audit attempts to set the attributes
of video4linux device nodes.
@@ -75641,7 +75757,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dev_read_video_dev" lineno="4798">
+<interface name="dev_read_video_dev" lineno="4933">
<summary>
Read the video4linux devices.
</summary>
@@ -75651,7 +75767,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_video_dev" lineno="4816">
+<interface name="dev_write_video_dev" lineno="4951">
<summary>
Write the video4linux devices.
</summary>
@@ -75661,7 +75777,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_vfio_dev" lineno="4834">
+<interface name="dev_rw_vfio_dev" lineno="4969">
<summary>
Read and write vfio devices.
</summary>
@@ -75671,7 +75787,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabelfrom_vfio_dev" lineno="4852">
+<interface name="dev_relabelfrom_vfio_dev" lineno="4987">
<summary>
Relabel vfio devices.
</summary>
@@ -75681,7 +75797,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_vhost" lineno="4870">
+<interface name="dev_rw_vhost" lineno="5005">
<summary>
Allow read/write the vhost devices
</summary>
@@ -75691,7 +75807,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_vmware" lineno="4888">
+<interface name="dev_rw_vmware" lineno="5023">
<summary>
Read and write VMWare devices.
</summary>
@@ -75701,7 +75817,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rwx_vmware" lineno="4906">
+<interface name="dev_rwx_vmware" lineno="5041">
<summary>
Read, write, and mmap VMWare devices.
</summary>
@@ -75711,7 +75827,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_watchdog" lineno="4925">
+<interface name="dev_read_watchdog" lineno="5060">
<summary>
Read from watchdog devices.
</summary>
@@ -75721,7 +75837,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_write_watchdog" lineno="4943">
+<interface name="dev_write_watchdog" lineno="5078">
<summary>
Write to watchdog devices.
</summary>
@@ -75731,7 +75847,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_wireless" lineno="4961">
+<interface name="dev_rw_wireless" lineno="5096">
<summary>
Read and write the the wireless device.
</summary>
@@ -75741,7 +75857,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_wireless" lineno="4979">
+<interface name="dev_manage_wireless" lineno="5114">
<summary>
manage the wireless device.
</summary>
@@ -75751,7 +75867,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_xen" lineno="4997">
+<interface name="dev_rw_xen" lineno="5132">
<summary>
Read and write Xen devices.
</summary>
@@ -75761,7 +75877,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_manage_xen" lineno="5016">
+<interface name="dev_manage_xen" lineno="5151">
<summary>
Create, read, write, and delete Xen devices.
</summary>
@@ -75771,7 +75887,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_filetrans_xen" lineno="5040">
+<interface name="dev_filetrans_xen" lineno="5175">
<summary>
Automatic type transition to the type
for xen device nodes when created in /dev.
@@ -75787,7 +75903,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="dev_getattr_xserver_misc_dev" lineno="5058">
+<interface name="dev_getattr_xserver_misc_dev" lineno="5193">
<summary>
Get the attributes of X server miscellaneous devices.
</summary>
@@ -75797,7 +75913,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_setattr_xserver_misc_dev" lineno="5076">
+<interface name="dev_setattr_xserver_misc_dev" lineno="5211">
<summary>
Set the attributes of X server miscellaneous devices.
</summary>
@@ -75807,7 +75923,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_xserver_misc" lineno="5094">
+<interface name="dev_rw_xserver_misc" lineno="5229">
<summary>
Read and write X server miscellaneous devices.
</summary>
@@ -75817,7 +75933,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_map_xserver_misc" lineno="5112">
+<interface name="dev_map_xserver_misc" lineno="5247">
<summary>
Map X server miscellaneous devices.
</summary>
@@ -75827,7 +75943,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rw_zero" lineno="5130">
+<interface name="dev_rw_zero" lineno="5265">
<summary>
Read and write to the zero device (/dev/zero).
</summary>
@@ -75837,7 +75953,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_rwx_zero" lineno="5148">
+<interface name="dev_rwx_zero" lineno="5283">
<summary>
Read, write, and execute the zero device (/dev/zero).
</summary>
@@ -75847,7 +75963,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_execmod_zero" lineno="5167">
+<interface name="dev_execmod_zero" lineno="5302">
<summary>
Execmod the zero device (/dev/zero).
</summary>
@@ -75857,7 +75973,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_create_zero_dev" lineno="5186">
+<interface name="dev_create_zero_dev" lineno="5321">
<summary>
Create the zero device (/dev/zero).
</summary>
@@ -75867,7 +75983,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_read_cpu_online" lineno="5209">
+<interface name="dev_read_cpu_online" lineno="5344">
<summary>
Read cpu online hardware state information
</summary>
@@ -75882,7 +75998,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_unconfined" lineno="5229">
+<interface name="dev_unconfined" lineno="5364">
<summary>
Unconfined access to devices.
</summary>
@@ -75892,7 +76008,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_relabel_cpu_online" lineno="5249">
+<interface name="dev_relabel_cpu_online" lineno="5384">
<summary>
Relabel cpu online hardware state information.
</summary>
@@ -75902,7 +76018,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dev_dontaudit_read_usbmon_dev" lineno="5268">
+<interface name="dev_dontaudit_read_usbmon_dev" lineno="5403">
<summary>
Dont audit attempts to read usbmon devices
</summary>
@@ -76976,7 +77092,7 @@ Type to be used for mount points.
</summary>
</param>
</interface>
-<interface name="files_security_mountpoint" lineno="179">
+<interface name="files_security_mountpoint" lineno="183">
<summary>
Make the specified type usable for
security file filesystem mount points.
@@ -76987,7 +77103,7 @@ Type to be used for mount points.
</summary>
</param>
</interface>
-<interface name="files_pid_file" lineno="227">
+<interface name="files_pid_file" lineno="231">
<summary>
Make the specified type usable for
runtime process ID files.
@@ -77026,7 +77142,7 @@ Type to be used for PID files.
</param>
<infoflow type="none"/>
</interface>
-<interface name="files_config_file" lineno="267">
+<interface name="files_config_file" lineno="271">
<summary>
Make the specified type a
configuration file.
@@ -77057,7 +77173,7 @@ Type to be used as a configuration file.
</param>
<infoflow type="none"/>
</interface>
-<interface name="files_poly" lineno="287">
+<interface name="files_poly" lineno="291">
<summary>
Make the specified type a
polyinstantiated directory.
@@ -77069,7 +77185,7 @@ polyinstantiated directory.
</summary>
</param>
</interface>
-<interface name="files_poly_parent" lineno="308">
+<interface name="files_poly_parent" lineno="312">
<summary>
Make the specified type a parent
of a polyinstantiated directory.
@@ -77081,7 +77197,7 @@ parent directory.
</summary>
</param>
</interface>
-<interface name="files_poly_member" lineno="329">
+<interface name="files_poly_member" lineno="333">
<summary>
Make the specified type a
polyinstantiation member directory.
@@ -77093,7 +77209,7 @@ member directory.
</summary>
</param>
</interface>
-<interface name="files_poly_member_tmp" lineno="356">
+<interface name="files_poly_member_tmp" lineno="360">
<summary>
Make the domain use the specified
type of polyinstantiated directory.
@@ -77111,7 +77227,7 @@ member directory.
</summary>
</param>
</interface>
-<interface name="files_tmp_file" lineno="403">
+<interface name="files_tmp_file" lineno="407">
<summary>
Make the specified type a file
used for temporary files.
@@ -77150,7 +77266,7 @@ temporary file.
</param>
<infoflow type="none"/>
</interface>
-<interface name="files_tmpfs_file" lineno="425">
+<interface name="files_tmpfs_file" lineno="428">
<summary>
Transform the type into a file, for use on a
virtual memory filesystem (tmpfs).
@@ -77161,7 +77277,7 @@ The type to be transformed.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_dirs" lineno="444">
+<interface name="files_getattr_all_dirs" lineno="447">
<summary>
Get the attributes of all directories.
</summary>
@@ -77171,7 +77287,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_dirs" lineno="463">
+<interface name="files_dontaudit_getattr_all_dirs" lineno="466">
<summary>
Do not audit attempts to get the attributes
of all directories.
@@ -77182,7 +77298,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_non_security" lineno="481">
+<interface name="files_list_non_security" lineno="484">
<summary>
List all non-security directories.
</summary>
@@ -77192,7 +77308,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_non_security" lineno="500">
+<interface name="files_dontaudit_list_non_security" lineno="503">
<summary>
Do not audit attempts to list all
non-security directories.
@@ -77203,7 +77319,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_mounton_non_security" lineno="519">
+<interface name="files_mounton_non_security" lineno="522">
<summary>
Mount a filesystem on all non-security
directories and files.
@@ -77214,7 +77330,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_write_non_security_dirs" lineno="538">
+<interface name="files_write_non_security_dirs" lineno="541">
<summary>
Allow attempts to modify any directory
</summary>
@@ -77224,7 +77340,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_non_security_dirs" lineno="556">
+<interface name="files_manage_non_security_dirs" lineno="559">
<summary>
Allow attempts to manage non-security directories
</summary>
@@ -77234,7 +77350,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_non_security_dirs" lineno="574">
+<interface name="files_relabel_non_security_dirs" lineno="577">
<summary>
Relabel from/to non-security directories.
</summary>
@@ -77244,7 +77360,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_files" lineno="592">
+<interface name="files_getattr_all_files" lineno="595">
<summary>
Get the attributes of all files.
</summary>
@@ -77254,7 +77370,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_files" lineno="612">
+<interface name="files_dontaudit_getattr_all_files" lineno="615">
<summary>
Do not audit attempts to get the attributes
of all files.
@@ -77265,7 +77381,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_files" lineno="631">
+<interface name="files_dontaudit_getattr_non_security_files" lineno="634">
<summary>
Do not audit attempts to get the attributes
of non security files.
@@ -77276,7 +77392,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_non_security_files" lineno="650">
+<interface name="files_manage_non_security_files" lineno="653">
<summary>
Create, read, write, and delete all non-security files.
</summary>
@@ -77287,7 +77403,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabel_non_security_files" lineno="669">
+<interface name="files_relabel_non_security_files" lineno="672">
<summary>
Relabel from/to all non-security files.
</summary>
@@ -77298,7 +77414,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_all_files" lineno="687">
+<interface name="files_read_all_files" lineno="690">
<summary>
Read all files.
</summary>
@@ -77308,7 +77424,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_execmod_all_files" lineno="718">
+<interface name="files_execmod_all_files" lineno="721">
<summary>
Allow shared library text relocations in all files.
</summary>
@@ -77326,7 +77442,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_non_security_files" lineno="737">
+<interface name="files_read_non_security_files" lineno="740">
<summary>
Read all non-security files.
</summary>
@@ -77337,7 +77453,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_all_dirs_except" lineno="763">
+<interface name="files_read_all_dirs_except" lineno="766">
<summary>
Read all directories on the filesystem, except
the listed exceptions.
@@ -77354,7 +77470,7 @@ must be negated by the caller.
</summary>
</param>
</interface>
-<interface name="files_read_all_files_except" lineno="788">
+<interface name="files_read_all_files_except" lineno="791">
<summary>
Read all files on the filesystem, except
the listed exceptions.
@@ -77371,7 +77487,7 @@ must be negated by the caller.
</summary>
</param>
</interface>
-<interface name="files_read_all_symlinks_except" lineno="813">
+<interface name="files_read_all_symlinks_except" lineno="816">
<summary>
Read all symbolic links on the filesystem, except
the listed exceptions.
@@ -77388,7 +77504,7 @@ must be negated by the caller.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_symlinks" lineno="831">
+<interface name="files_getattr_all_symlinks" lineno="834">
<summary>
Get the attributes of all symbolic links.
</summary>
@@ -77398,7 +77514,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_symlinks" lineno="850">
+<interface name="files_dontaudit_getattr_all_symlinks" lineno="853">
<summary>
Do not audit attempts to get the attributes
of all symbolic links.
@@ -77409,7 +77525,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_read_all_symlinks" lineno="868">
+<interface name="files_dontaudit_read_all_symlinks" lineno="871">
<summary>
Do not audit attempts to read all symbolic links.
</summary>
@@ -77419,7 +77535,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_symlinks" lineno="887">
+<interface name="files_dontaudit_getattr_non_security_symlinks" lineno="890">
<summary>
Do not audit attempts to get the attributes
of non security symbolic links.
@@ -77430,7 +77546,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_blk_files" lineno="906">
+<interface name="files_dontaudit_getattr_non_security_blk_files" lineno="909">
<summary>
Do not audit attempts to get the attributes
of non security block devices.
@@ -77441,7 +77557,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_chr_files" lineno="925">
+<interface name="files_dontaudit_getattr_non_security_chr_files" lineno="928">
<summary>
Do not audit attempts to get the attributes
of non security character devices.
@@ -77452,7 +77568,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_read_all_symlinks" lineno="944">
+<interface name="files_read_all_symlinks" lineno="947">
<summary>
Read all symbolic links.
</summary>
@@ -77463,7 +77579,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_getattr_all_pipes" lineno="963">
+<interface name="files_getattr_all_pipes" lineno="966">
<summary>
Get the attributes of all named pipes.
</summary>
@@ -77473,7 +77589,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_pipes" lineno="983">
+<interface name="files_dontaudit_getattr_all_pipes" lineno="986">
<summary>
Do not audit attempts to get the attributes
of all named pipes.
@@ -77484,7 +77600,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_pipes" lineno="1002">
+<interface name="files_dontaudit_getattr_non_security_pipes" lineno="1005">
<summary>
Do not audit attempts to get the attributes
of non security named pipes.
@@ -77495,7 +77611,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_sockets" lineno="1020">
+<interface name="files_getattr_all_sockets" lineno="1023">
<summary>
Get the attributes of all named sockets.
</summary>
@@ -77505,7 +77621,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_sockets" lineno="1040">
+<interface name="files_dontaudit_getattr_all_sockets" lineno="1043">
<summary>
Do not audit attempts to get the attributes
of all named sockets.
@@ -77516,7 +77632,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_non_security_sockets" lineno="1059">
+<interface name="files_dontaudit_getattr_non_security_sockets" lineno="1062">
<summary>
Do not audit attempts to get the attributes
of non security named sockets.
@@ -77527,7 +77643,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_read_all_blk_files" lineno="1077">
+<interface name="files_read_all_blk_files" lineno="1080">
<summary>
Read all block nodes with file types.
</summary>
@@ -77537,7 +77653,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_all_chr_files" lineno="1095">
+<interface name="files_read_all_chr_files" lineno="1098">
<summary>
Read all character nodes with file types.
</summary>
@@ -77547,7 +77663,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_files" lineno="1121">
+<interface name="files_relabel_all_files" lineno="1124">
<summary>
Relabel all files on the filesystem, except
the listed exceptions.
@@ -77565,7 +77681,7 @@ must be negated by the caller.
</param>
<rolecap/>
</interface>
-<interface name="files_rw_all_files" lineno="1159">
+<interface name="files_rw_all_files" lineno="1162">
<summary>
rw all files on the filesystem, except
the listed exceptions.
@@ -77583,7 +77699,7 @@ must be negated by the caller.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_all_files" lineno="1185">
+<interface name="files_manage_all_files" lineno="1188">
<summary>
Manage all files on the filesystem, except
the listed exceptions.
@@ -77601,7 +77717,7 @@ must be negated by the caller.
</param>
<rolecap/>
</interface>
-<interface name="files_search_all" lineno="1212">
+<interface name="files_search_all" lineno="1215">
<summary>
Search the contents of all directories on
extended attribute filesystems.
@@ -77612,7 +77728,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_all" lineno="1231">
+<interface name="files_list_all" lineno="1234">
<summary>
List the contents of all directories on
extended attribute filesystems.
@@ -77623,7 +77739,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_all_files_as" lineno="1249">
+<interface name="files_create_all_files_as" lineno="1252">
<summary>
Create all files as is.
</summary>
@@ -77633,7 +77749,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_all_dirs" lineno="1269">
+<interface name="files_dontaudit_search_all_dirs" lineno="1272">
<summary>
Do not audit attempts to search the
contents of any directories on extended
@@ -77645,7 +77761,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_file_type_fs" lineno="1292">
+<interface name="files_getattr_all_file_type_fs" lineno="1295">
<summary>
Get the attributes of all filesystems
with the type of a file.
@@ -77656,7 +77772,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelto_all_file_type_fs" lineno="1310">
+<interface name="files_relabelto_all_file_type_fs" lineno="1313">
<summary>
Relabel a filesystem to the type of a file.
</summary>
@@ -77666,7 +77782,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_file_type_fs" lineno="1328">
+<interface name="files_relabel_all_file_type_fs" lineno="1331">
<summary>
Relabel a filesystem to and from the type of a file.
</summary>
@@ -77676,7 +77792,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mount_all_file_type_fs" lineno="1346">
+<interface name="files_mount_all_file_type_fs" lineno="1349">
<summary>
Mount all filesystems with the type of a file.
</summary>
@@ -77686,7 +77802,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_unmount_all_file_type_fs" lineno="1364">
+<interface name="files_unmount_all_file_type_fs" lineno="1367">
<summary>
Unmount all filesystems with the type of a file.
</summary>
@@ -77696,7 +77812,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_non_auth_dirs" lineno="1383">
+<interface name="files_list_non_auth_dirs" lineno="1386">
<summary>
Read all non-authentication related
directories.
@@ -77707,7 +77823,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_non_auth_files" lineno="1402">
+<interface name="files_read_non_auth_files" lineno="1405">
<summary>
Read all non-authentication related
files.
@@ -77718,7 +77834,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_non_auth_symlinks" lineno="1421">
+<interface name="files_read_non_auth_symlinks" lineno="1424">
<summary>
Read all non-authentication related
symbolic links.
@@ -77729,7 +77845,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_non_auth_files" lineno="1439">
+<interface name="files_rw_non_auth_files" lineno="1442">
<summary>
rw non-authentication related files.
</summary>
@@ -77739,7 +77855,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_non_auth_files" lineno="1459">
+<interface name="files_manage_non_auth_files" lineno="1462">
<summary>
Manage non-authentication related
files.
@@ -77751,7 +77867,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_map_non_auth_files" lineno="1487">
+<interface name="files_map_non_auth_files" lineno="1490">
<summary>
Mmap non-authentication related
files.
@@ -77763,7 +77879,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabel_non_auth_files" lineno="1507">
+<interface name="files_relabel_non_auth_files" lineno="1510">
<summary>
Relabel all non-authentication related
files.
@@ -77775,7 +77891,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_config_dirs" lineno="1540">
+<interface name="files_manage_config_dirs" lineno="1543">
<summary>
Manage all configuration directories on filesystem
</summary>
@@ -77786,7 +77902,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="files_relabel_config_dirs" lineno="1559">
+<interface name="files_relabel_config_dirs" lineno="1562">
<summary>
Relabel configuration directories
</summary>
@@ -77797,7 +77913,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="files_read_config_files" lineno="1577">
+<interface name="files_read_config_files" lineno="1580">
<summary>
Read config files in /etc.
</summary>
@@ -77807,7 +77923,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_config_files" lineno="1598">
+<interface name="files_manage_config_files" lineno="1601">
<summary>
Manage all configuration files on filesystem
</summary>
@@ -77818,7 +77934,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="files_relabel_config_files" lineno="1617">
+<interface name="files_relabel_config_files" lineno="1620">
<summary>
Relabel configuration files
</summary>
@@ -77829,7 +77945,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="files_mounton_all_mountpoints" lineno="1635">
+<interface name="files_mounton_all_mountpoints" lineno="1638">
<summary>
Mount a filesystem on all mount points.
</summary>
@@ -77839,7 +77955,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_mountpoints" lineno="1654">
+<interface name="files_getattr_all_mountpoints" lineno="1657">
<summary>
Get the attributes of all mount points.
</summary>
@@ -77849,7 +77965,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_all_mountpoints" lineno="1672">
+<interface name="files_setattr_all_mountpoints" lineno="1675">
<summary>
Set the attributes of all mount points.
</summary>
@@ -77859,7 +77975,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1690">
+<interface name="files_dontaudit_setattr_all_mountpoints" lineno="1693">
<summary>
Do not audit attempts to set the attributes on all mount points.
</summary>
@@ -77869,7 +77985,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_search_all_mountpoints" lineno="1708">
+<interface name="files_search_all_mountpoints" lineno="1711">
<summary>
Search all mount points.
</summary>
@@ -77879,7 +77995,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_all_mountpoints" lineno="1726">
+<interface name="files_dontaudit_search_all_mountpoints" lineno="1729">
<summary>
Do not audit searching of all mount points.
</summary>
@@ -77889,7 +78005,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_all_mountpoints" lineno="1744">
+<interface name="files_list_all_mountpoints" lineno="1747">
<summary>
List all mount points.
</summary>
@@ -77899,7 +78015,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_all_mountpoints" lineno="1762">
+<interface name="files_dontaudit_list_all_mountpoints" lineno="1765">
<summary>
Do not audit listing of all mount points.
</summary>
@@ -77909,7 +78025,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_all_mountpoints" lineno="1780">
+<interface name="files_dontaudit_write_all_mountpoints" lineno="1783">
<summary>
Do not audit attempts to write to mount points.
</summary>
@@ -77919,7 +78035,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_root" lineno="1798">
+<interface name="files_list_root" lineno="1801">
<summary>
List the contents of the root directory.
</summary>
@@ -77929,7 +78045,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_root_symlinks" lineno="1818">
+<interface name="files_delete_root_symlinks" lineno="1821">
<summary>
Delete symbolic links in the
root directory.
@@ -77940,7 +78056,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_root_dirs" lineno="1836">
+<interface name="files_dontaudit_write_root_dirs" lineno="1839">
<summary>
Do not audit attempts to write to / dirs.
</summary>
@@ -77950,7 +78066,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_root_dir" lineno="1855">
+<interface name="files_dontaudit_rw_root_dir" lineno="1858">
<summary>
Do not audit attempts to write
files in the root directory.
@@ -77961,7 +78077,17 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_root_filetrans" lineno="1889">
+<interface name="files_watch_root_dirs" lineno="1876">
+<summary>
+Watch the root directory.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_root_filetrans" lineno="1910">
<summary>
Create an object in the root directory, with a private
type using a type transition.
@@ -77987,7 +78113,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_read_root_files" lineno="1908">
+<interface name="files_dontaudit_read_root_files" lineno="1929">
<summary>
Do not audit attempts to read files in
the root directory.
@@ -77998,7 +78124,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_root_files" lineno="1927">
+<interface name="files_dontaudit_rw_root_files" lineno="1948">
<summary>
Do not audit attempts to read or write
files in the root directory.
@@ -78009,7 +78135,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_root_chr_files" lineno="1946">
+<interface name="files_dontaudit_rw_root_chr_files" lineno="1967">
<summary>
Do not audit attempts to read or write
character device nodes in the root directory.
@@ -78020,7 +78146,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_delete_root_chr_files" lineno="1965">
+<interface name="files_delete_root_chr_files" lineno="1986">
<summary>
Delete character device nodes in
the root directory.
@@ -78031,7 +78157,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_root_files" lineno="1983">
+<interface name="files_delete_root_files" lineno="2004">
<summary>
Delete files in the root directory.
</summary>
@@ -78041,7 +78167,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_exec_root_files" lineno="2001">
+<interface name="files_exec_root_files" lineno="2022">
<summary>
Execute files in the root directory.
</summary>
@@ -78051,7 +78177,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_root_dir_entry" lineno="2019">
+<interface name="files_delete_root_dir_entry" lineno="2040">
<summary>
Remove entries from the root directory.
</summary>
@@ -78061,7 +78187,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_root_dir" lineno="2037">
+<interface name="files_manage_root_dir" lineno="2058">
<summary>
Manage the root directory.
</summary>
@@ -78071,7 +78197,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_rootfs" lineno="2056">
+<interface name="files_getattr_rootfs" lineno="2077">
<summary>
Get the attributes of a rootfs
file system.
@@ -78082,7 +78208,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_associate_rootfs" lineno="2074">
+<interface name="files_associate_rootfs" lineno="2095">
<summary>
Associate to root file system.
</summary>
@@ -78092,7 +78218,7 @@ Type of the file to associate.
</summary>
</param>
</interface>
-<interface name="files_relabel_rootfs" lineno="2092">
+<interface name="files_relabel_rootfs" lineno="2113">
<summary>
Relabel to and from rootfs file system.
</summary>
@@ -78102,7 +78228,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_unmount_rootfs" lineno="2110">
+<interface name="files_unmount_rootfs" lineno="2131">
<summary>
Unmount a rootfs filesystem.
</summary>
@@ -78112,7 +78238,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_root" lineno="2128">
+<interface name="files_mounton_root" lineno="2149">
<summary>
Mount on the root directory (/)
</summary>
@@ -78122,7 +78248,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_boot_dirs" lineno="2146">
+<interface name="files_getattr_boot_dirs" lineno="2167">
<summary>
Get attributes of the /boot directory.
</summary>
@@ -78132,7 +78258,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_boot_dirs" lineno="2165">
+<interface name="files_dontaudit_getattr_boot_dirs" lineno="2186">
<summary>
Do not audit attempts to get attributes
of the /boot directory.
@@ -78143,7 +78269,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_search_boot" lineno="2183">
+<interface name="files_search_boot" lineno="2204">
<summary>
Search the /boot directory.
</summary>
@@ -78153,7 +78279,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_boot" lineno="2201">
+<interface name="files_dontaudit_search_boot" lineno="2222">
<summary>
Do not audit attempts to search the /boot directory.
</summary>
@@ -78163,7 +78289,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_boot" lineno="2219">
+<interface name="files_list_boot" lineno="2240">
<summary>
List the /boot directory.
</summary>
@@ -78173,7 +78299,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_boot" lineno="2237">
+<interface name="files_dontaudit_list_boot" lineno="2258">
<summary>
Do not audit attempts to list the /boot directory.
</summary>
@@ -78183,7 +78309,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_boot_dirs" lineno="2255">
+<interface name="files_create_boot_dirs" lineno="2276">
<summary>
Create directories in /boot
</summary>
@@ -78193,7 +78319,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_boot_dirs" lineno="2274">
+<interface name="files_manage_boot_dirs" lineno="2295">
<summary>
Create, read, write, and delete
directories in /boot.
@@ -78204,7 +78330,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_boot_filetrans" lineno="2308">
+<interface name="files_boot_filetrans" lineno="2329">
<summary>
Create a private type object in boot
with an automatic type transition
@@ -78230,7 +78356,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_read_boot_files" lineno="2327">
+<interface name="files_read_boot_files" lineno="2348">
<summary>
read files in the /boot directory.
</summary>
@@ -78241,7 +78367,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_boot_files" lineno="2347">
+<interface name="files_manage_boot_files" lineno="2368">
<summary>
Create, read, write, and delete files
in the /boot directory.
@@ -78253,7 +78379,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabelfrom_boot_files" lineno="2365">
+<interface name="files_relabelfrom_boot_files" lineno="2386">
<summary>
Relabel from files in the /boot directory.
</summary>
@@ -78263,7 +78389,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_boot_symlinks" lineno="2383">
+<interface name="files_read_boot_symlinks" lineno="2404">
<summary>
Read symbolic links in the /boot directory.
</summary>
@@ -78273,7 +78399,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_boot_symlinks" lineno="2402">
+<interface name="files_rw_boot_symlinks" lineno="2423">
<summary>
Read and write symbolic links
in the /boot directory.
@@ -78284,7 +78410,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_boot_symlinks" lineno="2422">
+<interface name="files_manage_boot_symlinks" lineno="2443">
<summary>
Create, read, write, and delete symbolic links
in the /boot directory.
@@ -78295,7 +78421,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_kernel_img" lineno="2440">
+<interface name="files_read_kernel_img" lineno="2461">
<summary>
Read kernel files in the /boot directory.
</summary>
@@ -78305,7 +78431,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_kernel_img" lineno="2461">
+<interface name="files_create_kernel_img" lineno="2482">
<summary>
Install a kernel into the /boot directory.
</summary>
@@ -78316,7 +78442,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_delete_kernel" lineno="2481">
+<interface name="files_delete_kernel" lineno="2502">
<summary>
Delete a kernel from /boot.
</summary>
@@ -78327,7 +78453,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_getattr_default_dirs" lineno="2499">
+<interface name="files_getattr_default_dirs" lineno="2520">
<summary>
Getattr of directories with the default file type.
</summary>
@@ -78337,7 +78463,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_default_dirs" lineno="2518">
+<interface name="files_dontaudit_getattr_default_dirs" lineno="2539">
<summary>
Do not audit attempts to get the attributes of
directories with the default file type.
@@ -78348,7 +78474,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_search_default" lineno="2536">
+<interface name="files_search_default" lineno="2557">
<summary>
Search the contents of directories with the default file type.
</summary>
@@ -78358,7 +78484,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_default" lineno="2554">
+<interface name="files_list_default" lineno="2575">
<summary>
List contents of directories with the default file type.
</summary>
@@ -78368,7 +78494,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_default" lineno="2573">
+<interface name="files_dontaudit_list_default" lineno="2594">
<summary>
Do not audit attempts to list contents of
directories with the default file type.
@@ -78379,7 +78505,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_default_dirs" lineno="2592">
+<interface name="files_manage_default_dirs" lineno="2613">
<summary>
Create, read, write, and delete directories with
the default file type.
@@ -78390,7 +78516,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_default" lineno="2610">
+<interface name="files_mounton_default" lineno="2631">
<summary>
Mount a filesystem on a directory with the default file type.
</summary>
@@ -78400,7 +78526,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_default_files" lineno="2629">
+<interface name="files_dontaudit_getattr_default_files" lineno="2650">
<summary>
Do not audit attempts to get the attributes of
files with the default file type.
@@ -78411,7 +78537,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_read_default_files" lineno="2647">
+<interface name="files_read_default_files" lineno="2668">
<summary>
Read files with the default file type.
</summary>
@@ -78421,7 +78547,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_read_default_files" lineno="2666">
+<interface name="files_dontaudit_read_default_files" lineno="2687">
<summary>
Do not audit attempts to read files
with the default file type.
@@ -78432,7 +78558,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_default_files" lineno="2685">
+<interface name="files_manage_default_files" lineno="2706">
<summary>
Create, read, write, and delete files with
the default file type.
@@ -78443,7 +78569,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_default_symlinks" lineno="2703">
+<interface name="files_read_default_symlinks" lineno="2724">
<summary>
Read symbolic links with the default file type.
</summary>
@@ -78453,7 +78579,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_default_sockets" lineno="2721">
+<interface name="files_read_default_sockets" lineno="2742">
<summary>
Read sockets with the default file type.
</summary>
@@ -78463,7 +78589,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_default_pipes" lineno="2739">
+<interface name="files_read_default_pipes" lineno="2760">
<summary>
Read named pipes with the default file type.
</summary>
@@ -78473,7 +78599,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_etc" lineno="2757">
+<interface name="files_search_etc" lineno="2778">
<summary>
Search the contents of /etc directories.
</summary>
@@ -78483,7 +78609,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_etc_dirs" lineno="2775">
+<interface name="files_setattr_etc_dirs" lineno="2796">
<summary>
Set the attributes of the /etc directories.
</summary>
@@ -78493,7 +78619,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_etc" lineno="2793">
+<interface name="files_list_etc" lineno="2814">
<summary>
List the contents of /etc directories.
</summary>
@@ -78503,7 +78629,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_etc_dirs" lineno="2811">
+<interface name="files_dontaudit_write_etc_dirs" lineno="2832">
<summary>
Do not audit attempts to write to /etc dirs.
</summary>
@@ -78513,7 +78639,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_rw_etc_dirs" lineno="2829">
+<interface name="files_rw_etc_dirs" lineno="2850">
<summary>
Add and remove entries from /etc directories.
</summary>
@@ -78523,7 +78649,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_etc_dirs" lineno="2848">
+<interface name="files_manage_etc_dirs" lineno="2869">
<summary>
Manage generic directories in /etc
</summary>
@@ -78534,7 +78660,7 @@ Domain allowed access
</param>
</interface>
-<interface name="files_relabelto_etc_dirs" lineno="2866">
+<interface name="files_relabelto_etc_dirs" lineno="2887">
<summary>
Relabel directories to etc_t.
</summary>
@@ -78544,7 +78670,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_etc_dirs" lineno="2885">
+<interface name="files_mounton_etc_dirs" lineno="2906">
<summary>
Mount a filesystem on the
etc directories.
@@ -78555,7 +78681,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_etc_files" lineno="2937">
+<interface name="files_watch_etc_dirs" lineno="2924">
+<summary>
+Watch /etc directories
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_read_etc_files" lineno="2976">
<summary>
Read generic files in /etc.
</summary>
@@ -78599,7 +78735,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="files_map_etc_files" lineno="2969">
+<interface name="files_map_etc_files" lineno="3008">
<summary>
Map generic files in /etc.
</summary>
@@ -78621,7 +78757,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="files_dontaudit_write_etc_files" lineno="2987">
+<interface name="files_dontaudit_write_etc_files" lineno="3026">
<summary>
Do not audit attempts to write generic files in /etc.
</summary>
@@ -78631,7 +78767,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_etc_files" lineno="3006">
+<interface name="files_rw_etc_files" lineno="3045">
<summary>
Read and write generic files in /etc.
</summary>
@@ -78642,7 +78778,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_etc_files" lineno="3028">
+<interface name="files_manage_etc_files" lineno="3067">
<summary>
Create, read, write, and delete generic
files in /etc.
@@ -78654,7 +78790,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_delete_etc_files" lineno="3047">
+<interface name="files_delete_etc_files" lineno="3086">
<summary>
Delete system configuration files in /etc.
</summary>
@@ -78664,7 +78800,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_exec_etc_files" lineno="3065">
+<interface name="files_exec_etc_files" lineno="3104">
<summary>
Execute generic files in /etc.
</summary>
@@ -78674,7 +78810,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_get_etc_unit_status" lineno="3085">
+<interface name="files_get_etc_unit_status" lineno="3124">
<summary>
Get etc_t service status.
</summary>
@@ -78684,7 +78820,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_start_etc_service" lineno="3103">
+<interface name="files_start_etc_service" lineno="3142">
<summary>
start etc_t service
</summary>
@@ -78694,7 +78830,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_stop_etc_service" lineno="3121">
+<interface name="files_stop_etc_service" lineno="3160">
<summary>
stop etc_t service
</summary>
@@ -78704,7 +78840,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_etc_files" lineno="3139">
+<interface name="files_relabel_etc_files" lineno="3178">
<summary>
Relabel from and to generic files in /etc.
</summary>
@@ -78714,7 +78850,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_etc_symlinks" lineno="3158">
+<interface name="files_read_etc_symlinks" lineno="3197">
<summary>
Read symbolic links in /etc.
</summary>
@@ -78724,7 +78860,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_etc_symlinks" lineno="3176">
+<interface name="files_manage_etc_symlinks" lineno="3215">
<summary>
Create, read, write, and delete symbolic links in /etc.
</summary>
@@ -78734,7 +78870,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_etc_filetrans" lineno="3210">
+<interface name="files_etc_filetrans" lineno="3249">
<summary>
Create objects in /etc with a private
type using a type_transition.
@@ -78760,7 +78896,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_create_boot_flag" lineno="3240">
+<interface name="files_create_boot_flag" lineno="3279">
<summary>
Create a boot flag.
</summary>
@@ -78782,7 +78918,7 @@ The name of the object being created.
</param>
<rolecap/>
</interface>
-<interface name="files_delete_boot_flag" lineno="3266">
+<interface name="files_delete_boot_flag" lineno="3305">
<summary>
Delete a boot flag.
</summary>
@@ -78799,7 +78935,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_getattr_etc_runtime_dirs" lineno="3285">
+<interface name="files_getattr_etc_runtime_dirs" lineno="3324">
<summary>
Get the attributes of the
etc_runtime directories.
@@ -78810,7 +78946,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_etc_runtime_dirs" lineno="3304">
+<interface name="files_mounton_etc_runtime_dirs" lineno="3343">
<summary>
Mount a filesystem on the
etc_runtime directories.
@@ -78821,7 +78957,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelto_etc_runtime_dirs" lineno="3322">
+<interface name="files_relabelto_etc_runtime_dirs" lineno="3361">
<summary>
Relabel to etc_runtime_t dirs.
</summary>
@@ -78831,7 +78967,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3340">
+<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3379">
<summary>
Do not audit attempts to set the attributes of the etc_runtime files
</summary>
@@ -78841,7 +78977,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_read_etc_runtime_files" lineno="3378">
+<interface name="files_read_etc_runtime_files" lineno="3417">
<summary>
Read files in /etc that are dynamically
created on boot, such as mtab.
@@ -78871,7 +79007,7 @@ Domain allowed access.
<infoflow type="read" weight="10" />
<rolecap/>
</interface>
-<interface name="files_dontaudit_read_etc_runtime_files" lineno="3400">
+<interface name="files_dontaudit_read_etc_runtime_files" lineno="3439">
<summary>
Do not audit attempts to read files
in /etc that are dynamically
@@ -78883,7 +79019,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_read_etc_files" lineno="3419">
+<interface name="files_dontaudit_read_etc_files" lineno="3458">
<summary>
Do not audit attempts to read files
in /etc
@@ -78894,7 +79030,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_etc_runtime_files" lineno="3438">
+<interface name="files_dontaudit_write_etc_runtime_files" lineno="3477">
<summary>
Do not audit attempts to write
etc runtime files.
@@ -78905,7 +79041,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_rw_etc_runtime_files" lineno="3458">
+<interface name="files_rw_etc_runtime_files" lineno="3497">
<summary>
Read and write files in /etc that are dynamically
created on boot, such as mtab.
@@ -78917,7 +79053,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_etc_runtime_files" lineno="3480">
+<interface name="files_manage_etc_runtime_files" lineno="3519">
<summary>
Create, read, write, and delete files in
/etc that are dynamically created on boot,
@@ -78930,7 +79066,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabelto_etc_runtime_files" lineno="3498">
+<interface name="files_relabelto_etc_runtime_files" lineno="3537">
<summary>
Relabel to etc_runtime_t files.
</summary>
@@ -78940,7 +79076,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_etc_filetrans_etc_runtime" lineno="3527">
+<interface name="files_etc_filetrans_etc_runtime" lineno="3566">
<summary>
Create, etc runtime objects with an automatic
type transition.
@@ -78961,7 +79097,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_getattr_home_dir" lineno="3546">
+<interface name="files_getattr_home_dir" lineno="3585">
<summary>
Get the attributes of the home directories root
(/home).
@@ -78972,7 +79108,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_home_dir" lineno="3567">
+<interface name="files_dontaudit_getattr_home_dir" lineno="3606">
<summary>
Do not audit attempts to get the
attributes of the home directories root
@@ -78984,7 +79120,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_search_home" lineno="3586">
+<interface name="files_search_home" lineno="3625">
<summary>
Search home directories root (/home).
</summary>
@@ -78994,7 +79130,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_home" lineno="3606">
+<interface name="files_dontaudit_search_home" lineno="3645">
<summary>
Do not audit attempts to search
home directories root (/home).
@@ -79005,7 +79141,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_home" lineno="3626">
+<interface name="files_dontaudit_list_home" lineno="3665">
<summary>
Do not audit attempts to list
home directories root (/home).
@@ -79016,7 +79152,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_home" lineno="3645">
+<interface name="files_list_home" lineno="3684">
<summary>
Get listing of home directories.
</summary>
@@ -79026,7 +79162,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelto_home" lineno="3664">
+<interface name="files_relabelto_home" lineno="3703">
<summary>
Relabel to user home root (/home).
</summary>
@@ -79036,7 +79172,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelfrom_home" lineno="3682">
+<interface name="files_relabelfrom_home" lineno="3721">
<summary>
Relabel from user home root (/home).
</summary>
@@ -79046,7 +79182,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_home_filetrans" lineno="3715">
+<interface name="files_home_filetrans" lineno="3754">
<summary>
Create objects in /home.
</summary>
@@ -79071,7 +79207,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_getattr_lost_found_dirs" lineno="3733">
+<interface name="files_getattr_lost_found_dirs" lineno="3772">
<summary>
Get the attributes of lost+found directories.
</summary>
@@ -79081,7 +79217,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3752">
+<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3791">
<summary>
Do not audit attempts to get the attributes of
lost+found directories.
@@ -79092,7 +79228,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_lost_found" lineno="3770">
+<interface name="files_list_lost_found" lineno="3809">
<summary>
List the contents of lost+found directories.
</summary>
@@ -79102,7 +79238,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_lost_found" lineno="3790">
+<interface name="files_manage_lost_found" lineno="3829">
<summary>
Create, read, write, and delete objects in
lost+found directories.
@@ -79114,7 +79250,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_search_mnt" lineno="3812">
+<interface name="files_search_mnt" lineno="3851">
<summary>
Search the contents of /mnt.
</summary>
@@ -79124,7 +79260,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_mnt" lineno="3830">
+<interface name="files_dontaudit_search_mnt" lineno="3869">
<summary>
Do not audit attempts to search /mnt.
</summary>
@@ -79134,7 +79270,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_mnt" lineno="3848">
+<interface name="files_list_mnt" lineno="3887">
<summary>
List the contents of /mnt.
</summary>
@@ -79144,7 +79280,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_mnt" lineno="3866">
+<interface name="files_dontaudit_list_mnt" lineno="3905">
<summary>
Do not audit attempts to list the contents of /mnt.
</summary>
@@ -79154,7 +79290,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_mnt" lineno="3884">
+<interface name="files_mounton_mnt" lineno="3923">
<summary>
Mount a filesystem on /mnt.
</summary>
@@ -79164,7 +79300,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_mnt_dirs" lineno="3903">
+<interface name="files_manage_mnt_dirs" lineno="3942">
<summary>
Create, read, write, and delete directories in /mnt.
</summary>
@@ -79175,7 +79311,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_mnt_files" lineno="3921">
+<interface name="files_manage_mnt_files" lineno="3960">
<summary>
Create, read, write, and delete files in /mnt.
</summary>
@@ -79185,7 +79321,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_mnt_files" lineno="3939">
+<interface name="files_read_mnt_files" lineno="3978">
<summary>
read files in /mnt.
</summary>
@@ -79195,7 +79331,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_mnt_symlinks" lineno="3957">
+<interface name="files_read_mnt_symlinks" lineno="3996">
<summary>
Read symbolic links in /mnt.
</summary>
@@ -79205,7 +79341,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_mnt_symlinks" lineno="3975">
+<interface name="files_manage_mnt_symlinks" lineno="4014">
<summary>
Create, read, write, and delete symbolic links in /mnt.
</summary>
@@ -79215,7 +79351,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_kernel_modules" lineno="3993">
+<interface name="files_search_kernel_modules" lineno="4032">
<summary>
Search the contents of the kernel module directories.
</summary>
@@ -79225,7 +79361,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_kernel_modules" lineno="4012">
+<interface name="files_list_kernel_modules" lineno="4051">
<summary>
List the contents of the kernel module directories.
</summary>
@@ -79235,7 +79371,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_kernel_modules" lineno="4031">
+<interface name="files_getattr_kernel_modules" lineno="4070">
<summary>
Get the attributes of kernel module files.
</summary>
@@ -79245,7 +79381,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_kernel_modules" lineno="4049">
+<interface name="files_read_kernel_modules" lineno="4088">
<summary>
Read kernel module files.
</summary>
@@ -79255,7 +79391,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_write_kernel_modules" lineno="4069">
+<interface name="files_write_kernel_modules" lineno="4108">
<summary>
Write kernel module files.
</summary>
@@ -79265,7 +79401,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_kernel_modules" lineno="4088">
+<interface name="files_delete_kernel_modules" lineno="4127">
<summary>
Delete kernel module files.
</summary>
@@ -79275,7 +79411,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_kernel_modules" lineno="4108">
+<interface name="files_manage_kernel_modules" lineno="4147">
<summary>
Create, read, write, and delete
kernel module files.
@@ -79287,7 +79423,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabel_kernel_modules" lineno="4127">
+<interface name="files_relabel_kernel_modules" lineno="4166">
<summary>
Relabel from and to kernel module files.
</summary>
@@ -79297,7 +79433,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_kernel_modules_filetrans" lineno="4162">
+<interface name="files_kernel_modules_filetrans" lineno="4201">
<summary>
Create objects in the kernel module directories
with a private type via an automatic type transition.
@@ -79323,7 +79459,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_load_kernel_modules" lineno="4180">
+<interface name="files_load_kernel_modules" lineno="4219">
<summary>
Load kernel module files.
</summary>
@@ -79333,7 +79469,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_world_readable" lineno="4200">
+<interface name="files_list_world_readable" lineno="4239">
<summary>
List world-readable directories.
</summary>
@@ -79344,7 +79480,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_world_readable_files" lineno="4219">
+<interface name="files_read_world_readable_files" lineno="4258">
<summary>
Read world-readable files.
</summary>
@@ -79355,7 +79491,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_world_readable_symlinks" lineno="4238">
+<interface name="files_read_world_readable_symlinks" lineno="4277">
<summary>
Read world-readable symbolic links.
</summary>
@@ -79366,7 +79502,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_world_readable_pipes" lineno="4256">
+<interface name="files_read_world_readable_pipes" lineno="4295">
<summary>
Read world-readable named pipes.
</summary>
@@ -79376,7 +79512,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_world_readable_sockets" lineno="4274">
+<interface name="files_read_world_readable_sockets" lineno="4313">
<summary>
Read world-readable sockets.
</summary>
@@ -79386,7 +79522,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_associate_tmp" lineno="4294">
+<interface name="files_associate_tmp" lineno="4333">
<summary>
Allow the specified type to associate
to a filesystem with the type of the
@@ -79398,7 +79534,7 @@ Type of the file to associate.
</summary>
</param>
</interface>
-<interface name="files_getattr_tmp_dirs" lineno="4312">
+<interface name="files_getattr_tmp_dirs" lineno="4351">
<summary>
Get the attributes of the tmp directory (/tmp).
</summary>
@@ -79408,7 +79544,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4331">
+<interface name="files_dontaudit_getattr_tmp_dirs" lineno="4370">
<summary>
Do not audit attempts to get the
attributes of the tmp directory (/tmp).
@@ -79419,7 +79555,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_tmp" lineno="4349">
+<interface name="files_search_tmp" lineno="4388">
<summary>
Search the tmp directory (/tmp).
</summary>
@@ -79429,7 +79565,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_tmp" lineno="4367">
+<interface name="files_dontaudit_search_tmp" lineno="4406">
<summary>
Do not audit attempts to search the tmp directory (/tmp).
</summary>
@@ -79439,7 +79575,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_tmp" lineno="4385">
+<interface name="files_list_tmp" lineno="4424">
<summary>
Read the tmp directory (/tmp).
</summary>
@@ -79449,7 +79585,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_tmp" lineno="4403">
+<interface name="files_dontaudit_list_tmp" lineno="4442">
<summary>
Do not audit listing of the tmp directory (/tmp).
</summary>
@@ -79459,7 +79595,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="files_delete_tmp_dir_entry" lineno="4421">
+<interface name="files_delete_tmp_dir_entry" lineno="4460">
<summary>
Remove entries from the tmp directory.
</summary>
@@ -79469,7 +79605,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_generic_tmp_files" lineno="4439">
+<interface name="files_read_generic_tmp_files" lineno="4478">
<summary>
Read files in the tmp directory (/tmp).
</summary>
@@ -79479,7 +79615,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_tmp_dirs" lineno="4457">
+<interface name="files_manage_generic_tmp_dirs" lineno="4496">
<summary>
Manage temporary directories in /tmp.
</summary>
@@ -79489,7 +79625,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_tmp_files" lineno="4475">
+<interface name="files_manage_generic_tmp_files" lineno="4514">
<summary>
Manage temporary files and directories in /tmp.
</summary>
@@ -79499,7 +79635,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_generic_tmp_symlinks" lineno="4493">
+<interface name="files_read_generic_tmp_symlinks" lineno="4532">
<summary>
Read symbolic links in the tmp directory (/tmp).
</summary>
@@ -79509,7 +79645,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_generic_tmp_sockets" lineno="4511">
+<interface name="files_rw_generic_tmp_sockets" lineno="4550">
<summary>
Read and write generic named sockets in the tmp directory (/tmp).
</summary>
@@ -79519,7 +79655,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_tmp" lineno="4529">
+<interface name="files_mounton_tmp" lineno="4568">
<summary>
Mount filesystems in the tmp directory (/tmp)
</summary>
@@ -79529,7 +79665,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_all_tmp_dirs" lineno="4547">
+<interface name="files_setattr_all_tmp_dirs" lineno="4586">
<summary>
Set the attributes of all tmp directories.
</summary>
@@ -79539,7 +79675,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_all_tmp" lineno="4565">
+<interface name="files_list_all_tmp" lineno="4604">
<summary>
List all tmp directories.
</summary>
@@ -79549,7 +79685,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_tmp_dirs" lineno="4585">
+<interface name="files_relabel_all_tmp_dirs" lineno="4624">
<summary>
Relabel to and from all temporary
directory types.
@@ -79561,7 +79697,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4606">
+<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4645">
<summary>
Do not audit attempts to get the attributes
of all tmp files.
@@ -79572,7 +79708,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="files_getattr_all_tmp_files" lineno="4625">
+<interface name="files_getattr_all_tmp_files" lineno="4664">
<summary>
Allow attempts to get the attributes
of all tmp files.
@@ -79583,7 +79719,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_tmp_files" lineno="4645">
+<interface name="files_relabel_all_tmp_files" lineno="4684">
<summary>
Relabel to and from all temporary
file types.
@@ -79595,7 +79731,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4666">
+<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4705">
<summary>
Do not audit attempts to get the attributes
of all tmp sock_file.
@@ -79606,7 +79742,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="files_read_all_tmp_files" lineno="4684">
+<interface name="files_read_all_tmp_files" lineno="4723">
<summary>
Read all tmp files.
</summary>
@@ -79616,7 +79752,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_tmp_filetrans" lineno="4718">
+<interface name="files_tmp_filetrans" lineno="4757">
<summary>
Create an object in the tmp directories, with a private
type using a type transition.
@@ -79642,7 +79778,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_purge_tmp" lineno="4736">
+<interface name="files_purge_tmp" lineno="4775">
<summary>
Delete the contents of /tmp.
</summary>
@@ -79652,7 +79788,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_usr_dirs" lineno="4759">
+<interface name="files_setattr_usr_dirs" lineno="4798">
<summary>
Set the attributes of the /usr directory.
</summary>
@@ -79662,7 +79798,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_usr" lineno="4777">
+<interface name="files_search_usr" lineno="4816">
<summary>
Search the content of /usr.
</summary>
@@ -79672,7 +79808,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_usr" lineno="4796">
+<interface name="files_list_usr" lineno="4835">
<summary>
List the contents of generic
directories in /usr.
@@ -79683,7 +79819,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_usr_dirs" lineno="4814">
+<interface name="files_dontaudit_write_usr_dirs" lineno="4853">
<summary>
Do not audit write of /usr dirs
</summary>
@@ -79693,7 +79829,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_rw_usr_dirs" lineno="4832">
+<interface name="files_rw_usr_dirs" lineno="4871">
<summary>
Add and remove entries from /usr directories.
</summary>
@@ -79703,7 +79839,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_usr_dirs" lineno="4851">
+<interface name="files_dontaudit_rw_usr_dirs" lineno="4890">
<summary>
Do not audit attempts to add and remove
entries from /usr directories.
@@ -79714,7 +79850,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_delete_usr_dirs" lineno="4869">
+<interface name="files_delete_usr_dirs" lineno="4908">
<summary>
Delete generic directories in /usr in the caller domain.
</summary>
@@ -79724,7 +79860,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_usr_files" lineno="4887">
+<interface name="files_watch_usr_dirs" lineno="4926">
+<summary>
+Watch generic directories in /usr.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_delete_usr_files" lineno="4944">
<summary>
Delete generic files in /usr in the caller domain.
</summary>
@@ -79734,7 +79880,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_getattr_usr_files" lineno="4905">
+<interface name="files_getattr_usr_files" lineno="4962">
<summary>
Get the attributes of files in /usr.
</summary>
@@ -79744,7 +79890,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_map_usr_files" lineno="4924">
+<interface name="files_map_usr_files" lineno="4981">
<summary>
Map generic files in /usr.
</summary>
@@ -79755,7 +79901,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="files_read_usr_files" lineno="4960">
+<interface name="files_read_usr_files" lineno="5017">
<summary>
Read generic files in /usr.
</summary>
@@ -79783,7 +79929,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="files_exec_usr_files" lineno="4980">
+<interface name="files_exec_usr_files" lineno="5037">
<summary>
Execute generic programs in /usr in the caller domain.
</summary>
@@ -79793,7 +79939,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_usr_files" lineno="5000">
+<interface name="files_dontaudit_write_usr_files" lineno="5057">
<summary>
dontaudit write of /usr files
</summary>
@@ -79803,7 +79949,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_usr_files" lineno="5018">
+<interface name="files_manage_usr_files" lineno="5075">
<summary>
Create, read, write, and delete files in the /usr directory.
</summary>
@@ -79813,7 +79959,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelto_usr_files" lineno="5036">
+<interface name="files_relabelto_usr_files" lineno="5093">
<summary>
Relabel a file to the type used in /usr.
</summary>
@@ -79823,7 +79969,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabelfrom_usr_files" lineno="5054">
+<interface name="files_relabelfrom_usr_files" lineno="5111">
<summary>
Relabel a file from the type used in /usr.
</summary>
@@ -79833,7 +79979,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_usr_symlinks" lineno="5072">
+<interface name="files_read_usr_symlinks" lineno="5129">
<summary>
Read symbolic links in /usr.
</summary>
@@ -79843,7 +79989,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_usr_filetrans" lineno="5105">
+<interface name="files_usr_filetrans" lineno="5162">
<summary>
Create objects in the /usr directory
</summary>
@@ -79868,7 +80014,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_search_src" lineno="5123">
+<interface name="files_search_src" lineno="5180">
<summary>
Search directories in /usr/src.
</summary>
@@ -79878,7 +80024,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_src" lineno="5141">
+<interface name="files_dontaudit_search_src" lineno="5198">
<summary>
Do not audit attempts to search /usr/src.
</summary>
@@ -79888,7 +80034,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_getattr_usr_src_files" lineno="5159">
+<interface name="files_getattr_usr_src_files" lineno="5216">
<summary>
Get the attributes of files in /usr/src.
</summary>
@@ -79898,7 +80044,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_usr_src_files" lineno="5180">
+<interface name="files_read_usr_src_files" lineno="5237">
<summary>
Read files in /usr/src.
</summary>
@@ -79908,7 +80054,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_exec_usr_src_files" lineno="5201">
+<interface name="files_exec_usr_src_files" lineno="5258">
<summary>
Execute programs in /usr/src in the caller domain.
</summary>
@@ -79918,7 +80064,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_kernel_symbol_table" lineno="5221">
+<interface name="files_create_kernel_symbol_table" lineno="5278">
<summary>
Install a system.map into the /boot directory.
</summary>
@@ -79928,7 +80074,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_kernel_symbol_table" lineno="5240">
+<interface name="files_read_kernel_symbol_table" lineno="5297">
<summary>
Read system.map in the /boot directory.
</summary>
@@ -79938,7 +80084,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_kernel_symbol_table" lineno="5259">
+<interface name="files_delete_kernel_symbol_table" lineno="5316">
<summary>
Delete a system.map in the /boot directory.
</summary>
@@ -79948,7 +80094,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_var" lineno="5278">
+<interface name="files_search_var" lineno="5335">
<summary>
Search the contents of /var.
</summary>
@@ -79958,7 +80104,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_var_dirs" lineno="5296">
+<interface name="files_dontaudit_write_var_dirs" lineno="5353">
<summary>
Do not audit attempts to write to /var.
</summary>
@@ -79968,7 +80114,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_write_var_dirs" lineno="5314">
+<interface name="files_write_var_dirs" lineno="5371">
<summary>
Allow attempts to write to /var.dirs
</summary>
@@ -79978,7 +80124,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_var" lineno="5333">
+<interface name="files_dontaudit_search_var" lineno="5390">
<summary>
Do not audit attempts to search
the contents of /var.
@@ -79989,7 +80135,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_var" lineno="5351">
+<interface name="files_list_var" lineno="5408">
<summary>
List the contents of /var.
</summary>
@@ -79999,7 +80145,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_list_var" lineno="5370">
+<interface name="files_dontaudit_list_var" lineno="5427">
<summary>
Do not audit attempts to list
the contents of /var.
@@ -80010,7 +80156,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_var_dirs" lineno="5389">
+<interface name="files_manage_var_dirs" lineno="5446">
<summary>
Create, read, write, and delete directories
in the /var directory.
@@ -80021,7 +80167,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_var_dirs" lineno="5407">
+<interface name="files_relabel_var_dirs" lineno="5464">
<summary>
relabelto/from var directories
</summary>
@@ -80031,7 +80177,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_var_files" lineno="5425">
+<interface name="files_read_var_files" lineno="5482">
<summary>
Read files in the /var directory.
</summary>
@@ -80041,7 +80187,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_append_var_files" lineno="5443">
+<interface name="files_append_var_files" lineno="5500">
<summary>
Append files in the /var directory.
</summary>
@@ -80051,7 +80197,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_var_files" lineno="5461">
+<interface name="files_rw_var_files" lineno="5518">
<summary>
Read and write files in the /var directory.
</summary>
@@ -80061,7 +80207,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_rw_var_files" lineno="5480">
+<interface name="files_dontaudit_rw_var_files" lineno="5537">
<summary>
Do not audit attempts to read and write
files in the /var directory.
@@ -80072,7 +80218,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_var_files" lineno="5498">
+<interface name="files_manage_var_files" lineno="5555">
<summary>
Create, read, write, and delete files in the /var directory.
</summary>
@@ -80082,7 +80228,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_var_symlinks" lineno="5516">
+<interface name="files_read_var_symlinks" lineno="5573">
<summary>
Read symbolic links in the /var directory.
</summary>
@@ -80092,7 +80238,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_var_symlinks" lineno="5535">
+<interface name="files_manage_var_symlinks" lineno="5592">
<summary>
Create, read, write, and delete symbolic
links in the /var directory.
@@ -80103,7 +80249,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_var_filetrans" lineno="5568">
+<interface name="files_var_filetrans" lineno="5625">
<summary>
Create objects in the /var directory
</summary>
@@ -80128,7 +80274,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_getattr_var_lib_dirs" lineno="5586">
+<interface name="files_getattr_var_lib_dirs" lineno="5643">
<summary>
Get the attributes of the /var/lib directory.
</summary>
@@ -80138,7 +80284,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_var_lib" lineno="5618">
+<interface name="files_search_var_lib" lineno="5675">
<summary>
Search the /var/lib directory.
</summary>
@@ -80162,7 +80308,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="5"/>
</interface>
-<interface name="files_dontaudit_search_var_lib" lineno="5638">
+<interface name="files_dontaudit_search_var_lib" lineno="5695">
<summary>
Do not audit attempts to search the
contents of /var/lib.
@@ -80174,7 +80320,7 @@ Domain to not audit.
</param>
<infoflow type="read" weight="5"/>
</interface>
-<interface name="files_list_var_lib" lineno="5656">
+<interface name="files_list_var_lib" lineno="5713">
<summary>
List the contents of the /var/lib directory.
</summary>
@@ -80184,7 +80330,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_var_lib_dirs" lineno="5674">
+<interface name="files_rw_var_lib_dirs" lineno="5731">
<summary>
Read-write /var/lib directories
</summary>
@@ -80194,7 +80340,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_var_lib_dirs" lineno="5692">
+<interface name="files_manage_var_lib_dirs" lineno="5749">
<summary>
manage var_lib_t dirs
</summary>
@@ -80204,7 +80350,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_var_lib_dirs" lineno="5711">
+<interface name="files_relabel_var_lib_dirs" lineno="5768">
<summary>
relabel var_lib_t dirs
</summary>
@@ -80214,7 +80360,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_var_lib_filetrans" lineno="5745">
+<interface name="files_var_lib_filetrans" lineno="5802">
<summary>
Create objects in the /var/lib directory
</summary>
@@ -80239,7 +80385,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_read_var_lib_files" lineno="5764">
+<interface name="files_read_var_lib_files" lineno="5821">
<summary>
Read generic files in /var/lib.
</summary>
@@ -80249,7 +80395,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_var_lib_symlinks" lineno="5783">
+<interface name="files_read_var_lib_symlinks" lineno="5840">
<summary>
Read generic symbolic links in /var/lib
</summary>
@@ -80259,7 +80405,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_urandom_seed" lineno="5805">
+<interface name="files_manage_urandom_seed" lineno="5862">
<summary>
Create, read, write, and delete the
pseudorandom number generator seed.
@@ -80270,7 +80416,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_mounttab" lineno="5825">
+<interface name="files_manage_mounttab" lineno="5882">
<summary>
Allow domain to manage mount tables
necessary for rpcd, nfsd, etc.
@@ -80281,7 +80427,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_lock_dirs" lineno="5844">
+<interface name="files_setattr_lock_dirs" lineno="5901">
<summary>
Set the attributes of the generic lock directories.
</summary>
@@ -80291,7 +80437,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_locks" lineno="5862">
+<interface name="files_search_locks" lineno="5919">
<summary>
Search the locks directory (/var/lock).
</summary>
@@ -80301,7 +80447,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_locks" lineno="5882">
+<interface name="files_dontaudit_search_locks" lineno="5939">
<summary>
Do not audit attempts to search the
locks directory (/var/lock).
@@ -80312,7 +80458,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_locks" lineno="5901">
+<interface name="files_list_locks" lineno="5958">
<summary>
List generic lock directories.
</summary>
@@ -80322,7 +80468,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_check_write_lock_dirs" lineno="5920">
+<interface name="files_check_write_lock_dirs" lineno="5977">
<summary>
Test write access on lock directories.
</summary>
@@ -80332,7 +80478,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_add_entry_lock_dirs" lineno="5939">
+<interface name="files_add_entry_lock_dirs" lineno="5996">
<summary>
Add entries in the /var/lock directories.
</summary>
@@ -80342,7 +80488,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_rw_lock_dirs" lineno="5959">
+<interface name="files_rw_lock_dirs" lineno="6016">
<summary>
Add and remove entries in the /var/lock
directories.
@@ -80353,7 +80499,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_lock_dirs" lineno="5978">
+<interface name="files_create_lock_dirs" lineno="6035">
<summary>
Create lock directories
</summary>
@@ -80363,7 +80509,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_relabel_all_lock_dirs" lineno="5999">
+<interface name="files_relabel_all_lock_dirs" lineno="6056">
<summary>
Relabel to and from all lock directory types.
</summary>
@@ -80374,7 +80520,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_getattr_generic_locks" lineno="6020">
+<interface name="files_getattr_generic_locks" lineno="6077">
<summary>
Get the attributes of generic lock files.
</summary>
@@ -80384,7 +80530,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_generic_locks" lineno="6041">
+<interface name="files_delete_generic_locks" lineno="6098">
<summary>
Delete generic lock files.
</summary>
@@ -80394,7 +80540,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_locks" lineno="6062">
+<interface name="files_manage_generic_locks" lineno="6119">
<summary>
Create, read, write, and delete generic
lock files.
@@ -80405,7 +80551,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_locks" lineno="6084">
+<interface name="files_delete_all_locks" lineno="6141">
<summary>
Delete all lock files.
</summary>
@@ -80416,7 +80562,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_read_all_locks" lineno="6105">
+<interface name="files_read_all_locks" lineno="6162">
<summary>
Read all lock files.
</summary>
@@ -80426,7 +80572,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_all_locks" lineno="6128">
+<interface name="files_manage_all_locks" lineno="6185">
<summary>
manage all lock files.
</summary>
@@ -80436,7 +80582,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_locks" lineno="6151">
+<interface name="files_relabel_all_locks" lineno="6208">
<summary>
Relabel from/to all lock files.
</summary>
@@ -80446,7 +80592,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_lock_filetrans" lineno="6190">
+<interface name="files_lock_filetrans" lineno="6247">
<summary>
Create an object in the locks directory, with a private
type using a type transition.
@@ -80472,7 +80618,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_pid_dirs" lineno="6211">
+<interface name="files_dontaudit_getattr_pid_dirs" lineno="6268">
<summary>
Do not audit attempts to get the attributes
of the /var/run directory.
@@ -80483,7 +80629,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_mounton_pid_dirs" lineno="6230">
+<interface name="files_mounton_pid_dirs" lineno="6287">
<summary>
mounton a /var/run directory.
</summary>
@@ -80493,7 +80639,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_setattr_pid_dirs" lineno="6248">
+<interface name="files_setattr_pid_dirs" lineno="6305">
<summary>
Set the attributes of the /var/run directory.
</summary>
@@ -80503,7 +80649,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_pids" lineno="6268">
+<interface name="files_search_pids" lineno="6325">
<summary>
Search the contents of runtime process
ID directories (/var/run).
@@ -80514,7 +80660,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_pids" lineno="6288">
+<interface name="files_dontaudit_search_pids" lineno="6345">
<summary>
Do not audit attempts to search
the /var/run directory.
@@ -80525,7 +80671,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_pids" lineno="6308">
+<interface name="files_list_pids" lineno="6365">
<summary>
List the contents of the runtime process
ID directories (/var/run).
@@ -80536,7 +80682,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_check_write_pid_dirs" lineno="6327">
+<interface name="files_check_write_pid_dirs" lineno="6384">
<summary>
Check write access on /var/run directories.
</summary>
@@ -80546,7 +80692,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_pid_dirs" lineno="6345">
+<interface name="files_create_pid_dirs" lineno="6402">
<summary>
Create a /var/run directory.
</summary>
@@ -80556,7 +80702,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_generic_pids" lineno="6363">
+<interface name="files_watch_runtime_dirs" lineno="6420">
+<summary>
+Watch /var/run directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="files_read_generic_pids" lineno="6438">
<summary>
Read generic process ID files.
</summary>
@@ -80566,7 +80722,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_write_generic_pid_pipes" lineno="6383">
+<interface name="files_write_generic_pid_pipes" lineno="6458">
<summary>
Write named generic process ID pipes
</summary>
@@ -80576,7 +80732,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_pid_filetrans" lineno="6444">
+<interface name="files_pid_filetrans" lineno="6519">
<summary>
Create an object in the process ID directory, with a private type.
</summary>
@@ -80628,7 +80784,7 @@ The name of the object being created.
</param>
<infoflow type="write" weight="10"/>
</interface>
-<interface name="files_pid_filetrans_lock_dir" lineno="6469">
+<interface name="files_pid_filetrans_lock_dir" lineno="6544">
<summary>
Create a generic lock directory within the run directories
</summary>
@@ -80643,7 +80799,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_rw_generic_pids" lineno="6487">
+<interface name="files_rw_generic_pids" lineno="6562">
<summary>
Read and write generic process ID files.
</summary>
@@ -80653,7 +80809,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_getattr_all_pids" lineno="6508">
+<interface name="files_dontaudit_getattr_all_pids" lineno="6583">
<summary>
Do not audit attempts to get the attributes of
daemon runtime data files.
@@ -80664,7 +80820,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_write_all_pids" lineno="6528">
+<interface name="files_dontaudit_write_all_pids" lineno="6603">
<summary>
Do not audit attempts to write to daemon runtime data files.
</summary>
@@ -80674,7 +80830,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_ioctl_all_pids" lineno="6547">
+<interface name="files_dontaudit_ioctl_all_pids" lineno="6623">
<summary>
Do not audit attempts to ioctl daemon runtime data files.
</summary>
@@ -80684,7 +80840,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_manage_all_pid_dirs" lineno="6568">
+<interface name="files_manage_all_pid_dirs" lineno="6644">
<summary>
manage all pidfile directories
in the /var/run directory.
@@ -80695,7 +80851,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_all_pids" lineno="6587">
+<interface name="files_read_all_pids" lineno="6663">
<summary>
Read all process ID files.
</summary>
@@ -80706,7 +80862,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_exec_generic_pid_files" lineno="6608">
+<interface name="files_exec_generic_pid_files" lineno="6684">
<summary>
Execute generic programs in /var/run in the caller domain.
</summary>
@@ -80716,7 +80872,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_pid_files" lineno="6626">
+<interface name="files_relabel_all_pid_files" lineno="6702">
<summary>
Relable all pid files
</summary>
@@ -80726,7 +80882,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_pids" lineno="6645">
+<interface name="files_delete_all_pids" lineno="6721">
<summary>
Delete all process IDs.
</summary>
@@ -80737,7 +80893,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_create_all_pid_sockets" lineno="6670">
+<interface name="files_create_all_pid_sockets" lineno="6746">
<summary>
Create all pid sockets
</summary>
@@ -80747,7 +80903,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_all_pid_pipes" lineno="6688">
+<interface name="files_create_all_pid_pipes" lineno="6764">
<summary>
Create all pid named pipes
</summary>
@@ -80757,7 +80913,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_create_all_spool_sockets" lineno="6706">
+<interface name="files_create_all_spool_sockets" lineno="6782">
<summary>
Create all spool sockets
</summary>
@@ -80767,7 +80923,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_spool_sockets" lineno="6724">
+<interface name="files_delete_all_spool_sockets" lineno="6800">
<summary>
Delete all spool sockets
</summary>
@@ -80777,7 +80933,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_delete_all_pid_dirs" lineno="6742">
+<interface name="files_delete_all_pid_dirs" lineno="6818">
<summary>
Delete all process ID directories.
</summary>
@@ -80787,7 +80943,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_all_pids" lineno="6764">
+<interface name="files_manage_all_pids" lineno="6840">
<summary>
Create, read, write and delete all
var_run (pid) content
@@ -80798,7 +80954,7 @@ Domain alloed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_pid_dirs" lineno="6784">
+<interface name="files_relabel_all_pid_dirs" lineno="6860">
<summary>
Relabel to/from all var_run (pid) directories
</summary>
@@ -80808,7 +80964,7 @@ Domain alloed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_pid_sock_files" lineno="6802">
+<interface name="files_relabel_all_pid_sock_files" lineno="6878">
<summary>
Relabel to/from all var_run (pid) socket files
</summary>
@@ -80818,7 +80974,7 @@ Domain alloed access.
</summary>
</param>
</interface>
-<interface name="files_relabel_all_pids" lineno="6820">
+<interface name="files_relabel_all_pids" lineno="6896">
<summary>
Relabel to/from all var_run (pid) files and directories
</summary>
@@ -80828,7 +80984,7 @@ Domain alloed access.
</summary>
</param>
</interface>
-<interface name="files_mounton_all_poly_members" lineno="6841">
+<interface name="files_mounton_all_poly_members" lineno="6917">
<summary>
Mount filesystems on all polyinstantiation
member directories.
@@ -80839,7 +80995,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_search_spool" lineno="6860">
+<interface name="files_search_spool" lineno="6936">
<summary>
Search the contents of generic spool
directories (/var/spool).
@@ -80850,7 +81006,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_dontaudit_search_spool" lineno="6879">
+<interface name="files_dontaudit_search_spool" lineno="6955">
<summary>
Do not audit attempts to search generic
spool directories.
@@ -80861,7 +81017,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="files_list_spool" lineno="6898">
+<interface name="files_list_spool" lineno="6974">
<summary>
List the contents of generic spool
(/var/spool) directories.
@@ -80872,7 +81028,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_spool_dirs" lineno="6917">
+<interface name="files_manage_generic_spool_dirs" lineno="6993">
<summary>
Create, read, write, and delete generic
spool directories (/var/spool).
@@ -80883,7 +81039,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_read_generic_spool" lineno="6936">
+<interface name="files_read_generic_spool" lineno="7012">
<summary>
Read generic spool files.
</summary>
@@ -80893,7 +81049,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_generic_spool" lineno="6956">
+<interface name="files_manage_generic_spool" lineno="7032">
<summary>
Create, read, write, and delete generic
spool files.
@@ -80904,7 +81060,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_spool_filetrans" lineno="6992">
+<interface name="files_spool_filetrans" lineno="7068">
<summary>
Create objects in the spool directory
with a private type with a type transition.
@@ -80931,7 +81087,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="files_polyinstantiate_all" lineno="7012">
+<interface name="files_polyinstantiate_all" lineno="7088">
<summary>
Allow access to manage all polyinstantiated
directories on the system.
@@ -80942,7 +81098,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_unconfined" lineno="7066">
+<interface name="files_unconfined" lineno="7142">
<summary>
Unconfined access to files.
</summary>
@@ -80952,7 +81108,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_manage_etc_runtime_lnk_files" lineno="7088">
+<interface name="files_manage_etc_runtime_lnk_files" lineno="7164">
<summary>
Create, read, write, and delete symbolic links in
/etc that are dynamically created on boot.
@@ -80964,7 +81120,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_dontaudit_read_etc_runtime" lineno="7106">
+<interface name="files_dontaudit_read_etc_runtime" lineno="7182">
<summary>
Do not audit attempts to read etc_runtime resources
</summary>
@@ -80974,7 +81130,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="files_list_src" lineno="7124">
+<interface name="files_list_src" lineno="7200">
<summary>
List usr/src files
</summary>
@@ -80984,7 +81140,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_read_src_files" lineno="7142">
+<interface name="files_read_src_files" lineno="7218">
<summary>
Read usr/src files
</summary>
@@ -80994,7 +81150,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_manage_src_files" lineno="7160">
+<interface name="files_manage_src_files" lineno="7236">
<summary>
Manage /usr/src files
</summary>
@@ -81004,7 +81160,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_lib_filetrans_kernel_modules" lineno="7191">
+<interface name="files_lib_filetrans_kernel_modules" lineno="7267">
<summary>
Create a resource in the generic lib location
with an automatic type transition towards the kernel modules
@@ -81026,7 +81182,7 @@ Optional name of the resource
</summary>
</param>
</interface>
-<interface name="files_read_etc_runtime" lineno="7209">
+<interface name="files_read_etc_runtime" lineno="7285">
<summary>
Read etc runtime resources
</summary>
@@ -81036,7 +81192,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="files_relabel_all_non_security_file_types" lineno="7231">
+<interface name="files_relabel_all_non_security_file_types" lineno="7307">
<summary>
Allow relabel from and to non-security types
</summary>
@@ -81047,7 +81203,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_manage_all_non_security_file_types" lineno="7261">
+<interface name="files_manage_all_non_security_file_types" lineno="7337">
<summary>
Manage non-security-sensitive resource types
</summary>
@@ -81058,7 +81214,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="files_relabel_all_pidfiles" lineno="7283">
+<interface name="files_relabel_all_pidfiles" lineno="7359">
<summary>
Allow relabeling from and to any pidfile associated type
</summary>
@@ -81564,7 +81720,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_create_cgroup_links" lineno="839">
+<interface name="fs_watch_cgroup_files" lineno="839">
+<summary>
+Watch cgroup files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_create_cgroup_links" lineno="858">
<summary>
Create cgroup lnk_files.
</summary>
@@ -81574,7 +81740,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_write_cgroup_files" lineno="859">
+<interface name="fs_write_cgroup_files" lineno="878">
<summary>
Write cgroup files.
</summary>
@@ -81584,7 +81750,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_cgroup_files" lineno="878">
+<interface name="fs_rw_cgroup_files" lineno="897">
<summary>
Read and write cgroup files.
</summary>
@@ -81594,7 +81760,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_rw_cgroup_files" lineno="899">
+<interface name="fs_dontaudit_rw_cgroup_files" lineno="919">
<summary>
Do not audit attempts to open,
get attributes, read and write
@@ -81606,7 +81772,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_cgroup_files" lineno="917">
+<interface name="fs_manage_cgroup_files" lineno="937">
<summary>
Manage cgroup files.
</summary>
@@ -81616,7 +81782,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_cgroup_symlinks" lineno="937">
+<interface name="fs_relabel_cgroup_symlinks" lineno="957">
<summary>
Relabel cgroup symbolic links.
</summary>
@@ -81626,7 +81792,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mounton_cgroup" lineno="955">
+<interface name="fs_mounton_cgroup" lineno="975">
<summary>
Mount on cgroup directories.
</summary>
@@ -81636,7 +81802,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_cgroup_filetrans" lineno="989">
+<interface name="fs_cgroup_filetrans" lineno="1009">
<summary>
Create an object in a cgroup tmpfs filesystem, with a private
type using a type transition.
@@ -81662,7 +81828,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_cifs_dirs" lineno="1010">
+<interface name="fs_dontaudit_list_cifs_dirs" lineno="1030">
<summary>
Do not audit attempts to read
dirs on a CIFS or SMB filesystem.
@@ -81673,7 +81839,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mount_cifs" lineno="1028">
+<interface name="fs_mount_cifs" lineno="1048">
<summary>
Mount a CIFS or SMB network filesystem.
</summary>
@@ -81683,7 +81849,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_cifs" lineno="1047">
+<interface name="fs_remount_cifs" lineno="1067">
<summary>
Remount a CIFS or SMB network filesystem.
This allows some mount options to be changed.
@@ -81694,7 +81860,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_cifs" lineno="1065">
+<interface name="fs_unmount_cifs" lineno="1085">
<summary>
Unmount a CIFS or SMB network filesystem.
</summary>
@@ -81704,7 +81870,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_cifs" lineno="1085">
+<interface name="fs_getattr_cifs" lineno="1105">
<summary>
Get the attributes of a CIFS or
SMB network filesystem.
@@ -81716,7 +81882,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_search_cifs" lineno="1103">
+<interface name="fs_search_cifs" lineno="1123">
<summary>
Search directories on a CIFS or SMB filesystem.
</summary>
@@ -81726,7 +81892,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_cifs" lineno="1122">
+<interface name="fs_list_cifs" lineno="1142">
<summary>
List the contents of directories on a
CIFS or SMB filesystem.
@@ -81737,7 +81903,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_cifs" lineno="1141">
+<interface name="fs_dontaudit_list_cifs" lineno="1161">
<summary>
Do not audit attempts to list the contents
of directories on a CIFS or SMB filesystem.
@@ -81748,7 +81914,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mounton_cifs" lineno="1159">
+<interface name="fs_mounton_cifs" lineno="1179">
<summary>
Mounton a CIFS filesystem.
</summary>
@@ -81758,7 +81924,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_cifs_files" lineno="1178">
+<interface name="fs_read_cifs_files" lineno="1198">
<summary>
Read files on a CIFS or SMB filesystem.
</summary>
@@ -81769,7 +81935,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_noxattr_fs" lineno="1199">
+<interface name="fs_getattr_noxattr_fs" lineno="1219">
<summary>
Get the attributes of filesystems that
do not have extended attribute support.
@@ -81781,7 +81947,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_list_noxattr_fs" lineno="1217">
+<interface name="fs_list_noxattr_fs" lineno="1237">
<summary>
Read all noxattrfs directories.
</summary>
@@ -81791,7 +81957,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_noxattr_fs" lineno="1236">
+<interface name="fs_dontaudit_list_noxattr_fs" lineno="1256">
<summary>
Do not audit attempts to list all
noxattrfs directories.
@@ -81802,7 +81968,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_noxattr_fs_dirs" lineno="1254">
+<interface name="fs_manage_noxattr_fs_dirs" lineno="1274">
<summary>
Create, read, write, and delete all noxattrfs directories.
</summary>
@@ -81812,7 +81978,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_noxattr_fs_files" lineno="1272">
+<interface name="fs_read_noxattr_fs_files" lineno="1292">
<summary>
Read all noxattrfs files.
</summary>
@@ -81822,7 +81988,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1292">
+<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1312">
<summary>
Do not audit attempts to read all
noxattrfs files.
@@ -81833,7 +81999,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1310">
+<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1330">
<summary>
Dont audit attempts to write to noxattrfs files.
</summary>
@@ -81843,7 +82009,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_noxattr_fs_files" lineno="1328">
+<interface name="fs_manage_noxattr_fs_files" lineno="1348">
<summary>
Create, read, write, and delete all noxattrfs files.
</summary>
@@ -81853,7 +82019,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_noxattr_fs_symlinks" lineno="1347">
+<interface name="fs_read_noxattr_fs_symlinks" lineno="1367">
<summary>
Read all noxattrfs symbolic links.
</summary>
@@ -81863,7 +82029,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_noxattr_fs_symlinks" lineno="1366">
+<interface name="fs_manage_noxattr_fs_symlinks" lineno="1386">
<summary>
Manage all noxattrfs symbolic links.
</summary>
@@ -81873,7 +82039,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_noxattr_fs" lineno="1386">
+<interface name="fs_relabelfrom_noxattr_fs" lineno="1406">
<summary>
Relabel all objets from filesystems that
do not support extended attributes.
@@ -81884,7 +82050,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_cifs_files" lineno="1412">
+<interface name="fs_dontaudit_read_cifs_files" lineno="1432">
<summary>
Do not audit attempts to read
files on a CIFS or SMB filesystem.
@@ -81895,7 +82061,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_append_cifs_files" lineno="1432">
+<interface name="fs_append_cifs_files" lineno="1452">
<summary>
Append files
on a CIFS filesystem.
@@ -81907,7 +82073,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_append_cifs_files" lineno="1452">
+<interface name="fs_dontaudit_append_cifs_files" lineno="1472">
<summary>
dontaudit Append files
on a CIFS filesystem.
@@ -81919,7 +82085,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_rw_cifs_files" lineno="1471">
+<interface name="fs_dontaudit_rw_cifs_files" lineno="1491">
<summary>
Do not audit attempts to read or
write files on a CIFS or SMB filesystem.
@@ -81930,7 +82096,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_cifs_symlinks" lineno="1489">
+<interface name="fs_read_cifs_symlinks" lineno="1509">
<summary>
Read symbolic links on a CIFS or SMB filesystem.
</summary>
@@ -81940,7 +82106,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_cifs_named_pipes" lineno="1509">
+<interface name="fs_read_cifs_named_pipes" lineno="1529">
<summary>
Read named pipes
on a CIFS or SMB network filesystem.
@@ -81951,7 +82117,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_cifs_named_sockets" lineno="1528">
+<interface name="fs_read_cifs_named_sockets" lineno="1548">
<summary>
Read named sockets
on a CIFS or SMB network filesystem.
@@ -81962,7 +82128,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_exec_cifs_files" lineno="1549">
+<interface name="fs_exec_cifs_files" lineno="1569">
<summary>
Execute files on a CIFS or SMB
network filesystem, in the caller
@@ -81975,7 +82141,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_cifs_dirs" lineno="1570">
+<interface name="fs_manage_cifs_dirs" lineno="1590">
<summary>
Create, read, write, and delete directories
on a CIFS or SMB network filesystem.
@@ -81987,7 +82153,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1590">
+<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1610">
<summary>
Do not audit attempts to create, read,
write, and delete directories
@@ -81999,7 +82165,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_cifs_files" lineno="1610">
+<interface name="fs_manage_cifs_files" lineno="1630">
<summary>
Create, read, write, and delete files
on a CIFS or SMB network filesystem.
@@ -82011,7 +82177,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_cifs_files" lineno="1630">
+<interface name="fs_dontaudit_manage_cifs_files" lineno="1650">
<summary>
Do not audit attempts to create, read,
write, and delete files
@@ -82023,7 +82189,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_cifs_symlinks" lineno="1649">
+<interface name="fs_manage_cifs_symlinks" lineno="1669">
<summary>
Create, read, write, and delete symbolic links
on a CIFS or SMB network filesystem.
@@ -82034,7 +82200,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_cifs_named_pipes" lineno="1668">
+<interface name="fs_manage_cifs_named_pipes" lineno="1688">
<summary>
Create, read, write, and delete named pipes
on a CIFS or SMB network filesystem.
@@ -82045,7 +82211,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_cifs_named_sockets" lineno="1687">
+<interface name="fs_manage_cifs_named_sockets" lineno="1707">
<summary>
Create, read, write, and delete named sockets
on a CIFS or SMB network filesystem.
@@ -82056,7 +82222,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_cifs_domtrans" lineno="1730">
+<interface name="fs_cifs_domtrans" lineno="1750">
<summary>
Execute a file on a CIFS or SMB filesystem
in the specified domain.
@@ -82091,7 +82257,7 @@ The type of the new process.
</summary>
</param>
</interface>
-<interface name="fs_manage_configfs_dirs" lineno="1750">
+<interface name="fs_manage_configfs_dirs" lineno="1770">
<summary>
Create, read, write, and delete dirs
on a configfs filesystem.
@@ -82102,7 +82268,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_configfs_files" lineno="1769">
+<interface name="fs_manage_configfs_files" lineno="1789">
<summary>
Create, read, write, and delete files
on a configfs filesystem.
@@ -82113,7 +82279,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_dos_fs" lineno="1788">
+<interface name="fs_mount_dos_fs" lineno="1808">
<summary>
Mount a DOS filesystem, such as
FAT32 or NTFS.
@@ -82124,7 +82290,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_dos_fs" lineno="1808">
+<interface name="fs_remount_dos_fs" lineno="1828">
<summary>
Remount a DOS filesystem, such as
FAT32 or NTFS. This allows
@@ -82136,7 +82302,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_dos_fs" lineno="1827">
+<interface name="fs_unmount_dos_fs" lineno="1847">
<summary>
Unmount a DOS filesystem, such as
FAT32 or NTFS.
@@ -82147,7 +82313,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_dos_fs" lineno="1847">
+<interface name="fs_getattr_dos_fs" lineno="1867">
<summary>
Get the attributes of a DOS
filesystem, such as FAT32 or NTFS.
@@ -82159,7 +82325,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_relabelfrom_dos_fs" lineno="1866">
+<interface name="fs_relabelfrom_dos_fs" lineno="1886">
<summary>
Allow changing of the label of a
DOS filesystem using the context= mount option.
@@ -82170,7 +82336,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_dos_dirs" lineno="1884">
+<interface name="fs_getattr_dos_dirs" lineno="1904">
<summary>
Get attributes of directories on a dosfs filesystem.
</summary>
@@ -82180,7 +82346,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_dos" lineno="1902">
+<interface name="fs_search_dos" lineno="1922">
<summary>
Search dosfs filesystem.
</summary>
@@ -82190,7 +82356,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_dos" lineno="1920">
+<interface name="fs_list_dos" lineno="1940">
<summary>
List dirs DOS filesystem.
</summary>
@@ -82200,7 +82366,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_dos_dirs" lineno="1939">
+<interface name="fs_manage_dos_dirs" lineno="1959">
<summary>
Create, read, write, and delete dirs
on a DOS filesystem.
@@ -82211,7 +82377,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_dos_files" lineno="1957">
+<interface name="fs_read_dos_files" lineno="1977">
<summary>
Read files on a DOS filesystem.
</summary>
@@ -82221,7 +82387,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_dos_files" lineno="1976">
+<interface name="fs_manage_dos_files" lineno="1996">
<summary>
Create, read, write, and delete files
on a DOS filesystem.
@@ -82232,7 +82398,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_efivarfs_files" lineno="1996">
+<interface name="fs_list_efivars" lineno="2014">
+<summary>
+List dirs in efivarfs filesystem.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="fs_read_efivarfs_files" lineno="2034">
<summary>
Read files in efivarfs
- contains Linux Kernel configuration options for UEFI systems
@@ -82244,7 +82420,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_fusefs" lineno="2014">
+<interface name="fs_getattr_fusefs" lineno="2052">
<summary>
stat a FUSE filesystem
</summary>
@@ -82254,7 +82430,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_fusefs" lineno="2032">
+<interface name="fs_mount_fusefs" lineno="2070">
<summary>
Mount a FUSE filesystem.
</summary>
@@ -82264,7 +82440,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_fusefs" lineno="2050">
+<interface name="fs_unmount_fusefs" lineno="2088">
<summary>
Unmount a FUSE filesystem.
</summary>
@@ -82274,7 +82450,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mounton_fusefs" lineno="2068">
+<interface name="fs_mounton_fusefs" lineno="2106">
<summary>
Mounton a FUSEFS filesystem.
</summary>
@@ -82284,7 +82460,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_fusefs" lineno="2088">
+<interface name="fs_search_fusefs" lineno="2126">
<summary>
Search directories
on a FUSEFS filesystem.
@@ -82296,7 +82472,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_list_fusefs" lineno="2107">
+<interface name="fs_dontaudit_list_fusefs" lineno="2145">
<summary>
Do not audit attempts to list the contents
of directories on a FUSEFS filesystem.
@@ -82307,7 +82483,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_fusefs_dirs" lineno="2127">
+<interface name="fs_manage_fusefs_dirs" lineno="2165">
<summary>
Create, read, write, and delete directories
on a FUSEFS filesystem.
@@ -82319,7 +82495,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2147">
+<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2185">
<summary>
Do not audit attempts to create, read,
write, and delete directories
@@ -82331,7 +82507,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_fusefs_files" lineno="2166">
+<interface name="fs_read_fusefs_files" lineno="2204">
<summary>
Read, a FUSEFS filesystem.
</summary>
@@ -82342,7 +82518,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_exec_fusefs_files" lineno="2185">
+<interface name="fs_exec_fusefs_files" lineno="2223">
<summary>
Execute files on a FUSEFS filesystem.
</summary>
@@ -82353,7 +82529,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_fusefs_files" lineno="2205">
+<interface name="fs_manage_fusefs_files" lineno="2243">
<summary>
Create, read, write, and delete files
on a FUSEFS filesystem.
@@ -82365,7 +82541,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_fusefs_files" lineno="2225">
+<interface name="fs_dontaudit_manage_fusefs_files" lineno="2263">
<summary>
Do not audit attempts to create,
read, write, and delete files
@@ -82377,7 +82553,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_fusefs_symlinks" lineno="2243">
+<interface name="fs_read_fusefs_symlinks" lineno="2281">
<summary>
Read symbolic links on a FUSEFS filesystem.
</summary>
@@ -82387,7 +82563,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_hugetlbfs" lineno="2263">
+<interface name="fs_getattr_hugetlbfs" lineno="2301">
<summary>
Get the attributes of an hugetlbfs
filesystem.
@@ -82398,7 +82574,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_hugetlbfs" lineno="2281">
+<interface name="fs_list_hugetlbfs" lineno="2319">
<summary>
List hugetlbfs.
</summary>
@@ -82408,7 +82584,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_hugetlbfs_dirs" lineno="2299">
+<interface name="fs_manage_hugetlbfs_dirs" lineno="2337">
<summary>
Manage hugetlbfs dirs.
</summary>
@@ -82418,7 +82594,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2317">
+<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2355">
<summary>
Read and write inherited hugetlbfs files.
</summary>
@@ -82428,7 +82604,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_hugetlbfs_files" lineno="2335">
+<interface name="fs_rw_hugetlbfs_files" lineno="2373">
<summary>
Read and write hugetlbfs files.
</summary>
@@ -82438,7 +82614,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2353">
+<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2391">
<summary>
Read, map and write hugetlbfs files.
</summary>
@@ -82448,7 +82624,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_associate_hugetlbfs" lineno="2372">
+<interface name="fs_associate_hugetlbfs" lineno="2410">
<summary>
Allow the type to associate to hugetlbfs filesystems.
</summary>
@@ -82458,7 +82634,7 @@ The type of the object to be associated.
</summary>
</param>
</interface>
-<interface name="fs_search_inotifyfs" lineno="2390">
+<interface name="fs_search_inotifyfs" lineno="2428">
<summary>
Search inotifyfs filesystem.
</summary>
@@ -82468,7 +82644,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_inotifyfs" lineno="2408">
+<interface name="fs_list_inotifyfs" lineno="2446">
<summary>
List inotifyfs filesystem.
</summary>
@@ -82478,7 +82654,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_inotifyfs" lineno="2426">
+<interface name="fs_dontaudit_list_inotifyfs" lineno="2464">
<summary>
Dontaudit List inotifyfs filesystem.
</summary>
@@ -82488,7 +82664,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_hugetlbfs_filetrans" lineno="2460">
+<interface name="fs_hugetlbfs_filetrans" lineno="2498">
<summary>
Create an object in a hugetlbfs filesystem, with a private
type using a type transition.
@@ -82514,7 +82690,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="fs_mount_iso9660_fs" lineno="2480">
+<interface name="fs_mount_iso9660_fs" lineno="2518">
<summary>
Mount an iso9660 filesystem, which
is usually used on CDs.
@@ -82525,7 +82701,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_iso9660_fs" lineno="2500">
+<interface name="fs_remount_iso9660_fs" lineno="2538">
<summary>
Remount an iso9660 filesystem, which
is usually used on CDs. This allows
@@ -82537,7 +82713,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_iso9660_fs" lineno="2519">
+<interface name="fs_relabelfrom_iso9660_fs" lineno="2557">
<summary>
Allow changing of the label of a
filesystem with iso9660 type
@@ -82548,7 +82724,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_iso9660_fs" lineno="2538">
+<interface name="fs_unmount_iso9660_fs" lineno="2576">
<summary>
Unmount an iso9660 filesystem, which
is usually used on CDs.
@@ -82559,7 +82735,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_iso9660_fs" lineno="2558">
+<interface name="fs_getattr_iso9660_fs" lineno="2596">
<summary>
Get the attributes of an iso9660
filesystem, which is usually used on CDs.
@@ -82571,7 +82747,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_iso9660_files" lineno="2577">
+<interface name="fs_getattr_iso9660_files" lineno="2615">
<summary>
Get the attributes of files on an iso9660
filesystem, which is usually used on CDs.
@@ -82582,7 +82758,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_iso9660_files" lineno="2597">
+<interface name="fs_read_iso9660_files" lineno="2635">
<summary>
Read files on an iso9660 filesystem, which
is usually used on CDs.
@@ -82593,7 +82769,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_nfs" lineno="2617">
+<interface name="fs_mount_nfs" lineno="2655">
<summary>
Mount a NFS filesystem.
</summary>
@@ -82603,7 +82779,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_nfs" lineno="2636">
+<interface name="fs_remount_nfs" lineno="2674">
<summary>
Remount a NFS filesystem. This allows
some mount options to be changed.
@@ -82614,7 +82790,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_nfs" lineno="2654">
+<interface name="fs_unmount_nfs" lineno="2692">
<summary>
Unmount a NFS filesystem.
</summary>
@@ -82624,7 +82800,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_nfs" lineno="2673">
+<interface name="fs_getattr_nfs" lineno="2711">
<summary>
Get the attributes of a NFS filesystem.
</summary>
@@ -82635,7 +82811,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_search_nfs" lineno="2691">
+<interface name="fs_search_nfs" lineno="2729">
<summary>
Search directories on a NFS filesystem.
</summary>
@@ -82645,7 +82821,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_nfs" lineno="2709">
+<interface name="fs_list_nfs" lineno="2747">
<summary>
List NFS filesystem.
</summary>
@@ -82655,7 +82831,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_nfs" lineno="2728">
+<interface name="fs_dontaudit_list_nfs" lineno="2766">
<summary>
Do not audit attempts to list the contents
of directories on a NFS filesystem.
@@ -82666,7 +82842,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mounton_nfs" lineno="2746">
+<interface name="fs_mounton_nfs" lineno="2784">
<summary>
Mounton a NFS filesystem.
</summary>
@@ -82676,7 +82852,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_nfs_files" lineno="2765">
+<interface name="fs_read_nfs_files" lineno="2803">
<summary>
Read files on a NFS filesystem.
</summary>
@@ -82687,7 +82863,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_read_nfs_files" lineno="2785">
+<interface name="fs_dontaudit_read_nfs_files" lineno="2823">
<summary>
Do not audit attempts to read
files on a NFS filesystem.
@@ -82698,7 +82874,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_write_nfs_files" lineno="2803">
+<interface name="fs_write_nfs_files" lineno="2841">
<summary>
Read files on a NFS filesystem.
</summary>
@@ -82708,7 +82884,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_exec_nfs_files" lineno="2823">
+<interface name="fs_exec_nfs_files" lineno="2861">
<summary>
Execute files on a NFS filesystem.
</summary>
@@ -82719,7 +82895,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_append_nfs_files" lineno="2844">
+<interface name="fs_append_nfs_files" lineno="2882">
<summary>
Append files
on a NFS filesystem.
@@ -82731,7 +82907,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_append_nfs_files" lineno="2864">
+<interface name="fs_dontaudit_append_nfs_files" lineno="2902">
<summary>
dontaudit Append files
on a NFS filesystem.
@@ -82743,7 +82919,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_rw_nfs_files" lineno="2883">
+<interface name="fs_dontaudit_rw_nfs_files" lineno="2921">
<summary>
Do not audit attempts to read or
write files on a NFS filesystem.
@@ -82754,7 +82930,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_nfs_symlinks" lineno="2901">
+<interface name="fs_read_nfs_symlinks" lineno="2939">
<summary>
Read symbolic links on a NFS filesystem.
</summary>
@@ -82764,7 +82940,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_nfs_symlinks" lineno="2920">
+<interface name="fs_dontaudit_read_nfs_symlinks" lineno="2958">
<summary>
Dontaudit read symbolic links on a NFS filesystem.
</summary>
@@ -82774,7 +82950,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_read_nfs_named_sockets" lineno="2938">
+<interface name="fs_read_nfs_named_sockets" lineno="2976">
<summary>
Read named sockets on a NFS filesystem.
</summary>
@@ -82784,7 +82960,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_nfs_named_pipes" lineno="2957">
+<interface name="fs_read_nfs_named_pipes" lineno="2995">
<summary>
Read named pipes on a NFS network filesystem.
</summary>
@@ -82795,7 +82971,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_getattr_rpc_dirs" lineno="2976">
+<interface name="fs_getattr_rpc_dirs" lineno="3014">
<summary>
Get the attributes of directories of RPC
file system pipes.
@@ -82806,7 +82982,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_rpc" lineno="2995">
+<interface name="fs_search_rpc" lineno="3033">
<summary>
Search directories of RPC file system pipes.
</summary>
@@ -82816,7 +82992,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_removable" lineno="3013">
+<interface name="fs_search_removable" lineno="3051">
<summary>
Search removable storage directories.
</summary>
@@ -82826,7 +83002,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_removable" lineno="3031">
+<interface name="fs_dontaudit_list_removable" lineno="3069">
<summary>
Do not audit attempts to list removable storage directories.
</summary>
@@ -82836,7 +83012,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="fs_read_removable_files" lineno="3049">
+<interface name="fs_read_removable_files" lineno="3087">
<summary>
Read removable storage files.
</summary>
@@ -82846,7 +83022,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_removable_files" lineno="3067">
+<interface name="fs_dontaudit_read_removable_files" lineno="3105">
<summary>
Do not audit attempts to read removable storage files.
</summary>
@@ -82856,7 +83032,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_write_removable_files" lineno="3085">
+<interface name="fs_dontaudit_write_removable_files" lineno="3123">
<summary>
Do not audit attempts to write removable storage files.
</summary>
@@ -82866,7 +83042,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="fs_read_removable_symlinks" lineno="3103">
+<interface name="fs_read_removable_symlinks" lineno="3141">
<summary>
Read removable storage symbolic links.
</summary>
@@ -82876,7 +83052,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_removable_blk_files" lineno="3121">
+<interface name="fs_read_removable_blk_files" lineno="3159">
<summary>
Read block nodes on removable filesystems.
</summary>
@@ -82886,7 +83062,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_removable_blk_files" lineno="3140">
+<interface name="fs_rw_removable_blk_files" lineno="3178">
<summary>
Read and write block nodes on removable filesystems.
</summary>
@@ -82896,7 +83072,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_rpc" lineno="3159">
+<interface name="fs_list_rpc" lineno="3197">
<summary>
Read directories of RPC file system pipes.
</summary>
@@ -82906,7 +83082,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_rpc_files" lineno="3177">
+<interface name="fs_read_rpc_files" lineno="3215">
<summary>
Read files of RPC file system pipes.
</summary>
@@ -82916,7 +83092,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_rpc_symlinks" lineno="3195">
+<interface name="fs_read_rpc_symlinks" lineno="3233">
<summary>
Read symbolic links of RPC file system pipes.
</summary>
@@ -82926,7 +83102,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_rpc_sockets" lineno="3213">
+<interface name="fs_read_rpc_sockets" lineno="3251">
<summary>
Read sockets of RPC file system pipes.
</summary>
@@ -82936,7 +83112,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_rpc_sockets" lineno="3231">
+<interface name="fs_rw_rpc_sockets" lineno="3269">
<summary>
Read and write sockets of RPC file system pipes.
</summary>
@@ -82946,7 +83122,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_nfs_dirs" lineno="3251">
+<interface name="fs_manage_nfs_dirs" lineno="3289">
<summary>
Create, read, write, and delete directories
on a NFS filesystem.
@@ -82958,7 +83134,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3271">
+<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3309">
<summary>
Do not audit attempts to create, read,
write, and delete directories
@@ -82970,7 +83146,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_nfs_files" lineno="3291">
+<interface name="fs_manage_nfs_files" lineno="3329">
<summary>
Create, read, write, and delete files
on a NFS filesystem.
@@ -82982,7 +83158,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_nfs_files" lineno="3311">
+<interface name="fs_dontaudit_manage_nfs_files" lineno="3349">
<summary>
Do not audit attempts to create,
read, write, and delete files
@@ -82994,7 +83170,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_nfs_symlinks" lineno="3331">
+<interface name="fs_manage_nfs_symlinks" lineno="3369">
<summary>
Create, read, write, and delete symbolic links
on a NFS network filesystem.
@@ -83006,7 +83182,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_manage_nfs_named_pipes" lineno="3350">
+<interface name="fs_manage_nfs_named_pipes" lineno="3388">
<summary>
Create, read, write, and delete named pipes
on a NFS filesystem.
@@ -83017,7 +83193,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_nfs_named_sockets" lineno="3369">
+<interface name="fs_manage_nfs_named_sockets" lineno="3407">
<summary>
Create, read, write, and delete named sockets
on a NFS filesystem.
@@ -83028,7 +83204,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_nfs_domtrans" lineno="3412">
+<interface name="fs_nfs_domtrans" lineno="3450">
<summary>
Execute a file on a NFS filesystem
in the specified domain.
@@ -83063,7 +83239,7 @@ The type of the new process.
</summary>
</param>
</interface>
-<interface name="fs_mount_nfsd_fs" lineno="3431">
+<interface name="fs_mount_nfsd_fs" lineno="3469">
<summary>
Mount a NFS server pseudo filesystem.
</summary>
@@ -83073,7 +83249,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_nfsd_fs" lineno="3450">
+<interface name="fs_remount_nfsd_fs" lineno="3488">
<summary>
Mount a NFS server pseudo filesystem.
This allows some mount options to be changed.
@@ -83084,7 +83260,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_nfsd_fs" lineno="3468">
+<interface name="fs_unmount_nfsd_fs" lineno="3506">
<summary>
Unmount a NFS server pseudo filesystem.
</summary>
@@ -83094,7 +83270,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_nfsd_fs" lineno="3487">
+<interface name="fs_getattr_nfsd_fs" lineno="3525">
<summary>
Get the attributes of a NFS server
pseudo filesystem.
@@ -83105,7 +83281,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_nfsd_fs" lineno="3505">
+<interface name="fs_search_nfsd_fs" lineno="3543">
<summary>
Search NFS server directories.
</summary>
@@ -83115,7 +83291,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_nfsd_fs" lineno="3523">
+<interface name="fs_list_nfsd_fs" lineno="3561">
<summary>
List NFS server directories.
</summary>
@@ -83125,7 +83301,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_nfsd_files" lineno="3541">
+<interface name="fs_getattr_nfsd_files" lineno="3579">
<summary>
Getattr files on an nfsd filesystem
</summary>
@@ -83135,7 +83311,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_nfsd_fs" lineno="3559">
+<interface name="fs_rw_nfsd_fs" lineno="3597">
<summary>
Read and write NFS server files.
</summary>
@@ -83145,7 +83321,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_nsfs_files" lineno="3577">
+<interface name="fs_read_nsfs_files" lineno="3615">
<summary>
Read nsfs inodes (e.g. /proc/pid/ns/uts)
</summary>
@@ -83155,7 +83331,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_pstorefs" lineno="3595">
+<interface name="fs_getattr_pstorefs" lineno="3633">
<summary>
Get the attributes of a pstore filesystem.
</summary>
@@ -83165,7 +83341,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_pstore_dirs" lineno="3614">
+<interface name="fs_getattr_pstore_dirs" lineno="3652">
<summary>
Get the attributes of directories
of a pstore filesystem.
@@ -83176,7 +83352,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_pstore_dirs" lineno="3633">
+<interface name="fs_relabel_pstore_dirs" lineno="3671">
<summary>
Relabel to/from pstore_t directories.
</summary>
@@ -83186,7 +83362,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_associate_ramfs" lineno="3651">
+<interface name="fs_associate_ramfs" lineno="3689">
<summary>
Allow the type to associate to ramfs filesystems.
</summary>
@@ -83196,7 +83372,7 @@ The type of the object to be associated.
</summary>
</param>
</interface>
-<interface name="fs_mount_ramfs" lineno="3669">
+<interface name="fs_mount_ramfs" lineno="3707">
<summary>
Mount a RAM filesystem.
</summary>
@@ -83206,7 +83382,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_ramfs" lineno="3688">
+<interface name="fs_remount_ramfs" lineno="3726">
<summary>
Remount a RAM filesystem. This allows
some mount options to be changed.
@@ -83217,7 +83393,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_ramfs" lineno="3706">
+<interface name="fs_unmount_ramfs" lineno="3744">
<summary>
Unmount a RAM filesystem.
</summary>
@@ -83227,7 +83403,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_ramfs" lineno="3724">
+<interface name="fs_getattr_ramfs" lineno="3762">
<summary>
Get the attributes of a RAM filesystem.
</summary>
@@ -83237,7 +83413,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_ramfs" lineno="3742">
+<interface name="fs_search_ramfs" lineno="3780">
<summary>
Search directories on a ramfs
</summary>
@@ -83247,7 +83423,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_search_ramfs" lineno="3760">
+<interface name="fs_dontaudit_search_ramfs" lineno="3798">
<summary>
Dontaudit Search directories on a ramfs
</summary>
@@ -83257,7 +83433,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_ramfs_dirs" lineno="3779">
+<interface name="fs_manage_ramfs_dirs" lineno="3817">
<summary>
Create, read, write, and delete
directories on a ramfs.
@@ -83268,7 +83444,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_ramfs_files" lineno="3797">
+<interface name="fs_dontaudit_read_ramfs_files" lineno="3835">
<summary>
Dontaudit read on a ramfs files.
</summary>
@@ -83278,7 +83454,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_read_ramfs_pipes" lineno="3815">
+<interface name="fs_dontaudit_read_ramfs_pipes" lineno="3853">
<summary>
Dontaudit read on a ramfs fifo_files.
</summary>
@@ -83288,7 +83464,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_ramfs_files" lineno="3834">
+<interface name="fs_manage_ramfs_files" lineno="3872">
<summary>
Create, read, write, and delete
files on a ramfs filesystem.
@@ -83299,7 +83475,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_write_ramfs_pipes" lineno="3852">
+<interface name="fs_write_ramfs_pipes" lineno="3890">
<summary>
Write to named pipe on a ramfs filesystem.
</summary>
@@ -83309,7 +83485,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_write_ramfs_pipes" lineno="3871">
+<interface name="fs_dontaudit_write_ramfs_pipes" lineno="3909">
<summary>
Do not audit attempts to write to named
pipes on a ramfs filesystem.
@@ -83320,7 +83496,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_rw_ramfs_pipes" lineno="3889">
+<interface name="fs_rw_ramfs_pipes" lineno="3927">
<summary>
Read and write a named pipe on a ramfs filesystem.
</summary>
@@ -83330,7 +83506,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_ramfs_pipes" lineno="3908">
+<interface name="fs_manage_ramfs_pipes" lineno="3946">
<summary>
Create, read, write, and delete
named pipes on a ramfs filesystem.
@@ -83341,7 +83517,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_write_ramfs_sockets" lineno="3926">
+<interface name="fs_write_ramfs_sockets" lineno="3964">
<summary>
Write to named socket on a ramfs filesystem.
</summary>
@@ -83351,7 +83527,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_ramfs_sockets" lineno="3945">
+<interface name="fs_manage_ramfs_sockets" lineno="3983">
<summary>
Create, read, write, and delete
named sockets on a ramfs filesystem.
@@ -83362,7 +83538,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_romfs" lineno="3963">
+<interface name="fs_mount_romfs" lineno="4001">
<summary>
Mount a ROM filesystem.
</summary>
@@ -83372,7 +83548,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_romfs" lineno="3982">
+<interface name="fs_remount_romfs" lineno="4020">
<summary>
Remount a ROM filesystem. This allows
some mount options to be changed.
@@ -83383,7 +83559,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_romfs" lineno="4000">
+<interface name="fs_unmount_romfs" lineno="4038">
<summary>
Unmount a ROM filesystem.
</summary>
@@ -83393,7 +83569,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_romfs" lineno="4019">
+<interface name="fs_getattr_romfs" lineno="4057">
<summary>
Get the attributes of a ROM
filesystem.
@@ -83404,7 +83580,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_rpc_pipefs" lineno="4037">
+<interface name="fs_mount_rpc_pipefs" lineno="4075">
<summary>
Mount a RPC pipe filesystem.
</summary>
@@ -83414,7 +83590,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_rpc_pipefs" lineno="4056">
+<interface name="fs_remount_rpc_pipefs" lineno="4094">
<summary>
Remount a RPC pipe filesystem. This
allows some mount option to be changed.
@@ -83425,7 +83601,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_rpc_pipefs" lineno="4074">
+<interface name="fs_unmount_rpc_pipefs" lineno="4112">
<summary>
Unmount a RPC pipe filesystem.
</summary>
@@ -83435,7 +83611,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_rpc_pipefs" lineno="4093">
+<interface name="fs_getattr_rpc_pipefs" lineno="4131">
<summary>
Get the attributes of a RPC pipe
filesystem.
@@ -83446,7 +83622,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_rpc_named_pipes" lineno="4111">
+<interface name="fs_rw_rpc_named_pipes" lineno="4149">
<summary>
Read and write RPC pipe filesystem named pipes.
</summary>
@@ -83456,7 +83632,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_tmpfs" lineno="4129">
+<interface name="fs_mount_tmpfs" lineno="4167">
<summary>
Mount a tmpfs filesystem.
</summary>
@@ -83466,7 +83642,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_tmpfs" lineno="4147">
+<interface name="fs_remount_tmpfs" lineno="4185">
<summary>
Remount a tmpfs filesystem.
</summary>
@@ -83476,7 +83652,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_tmpfs" lineno="4165">
+<interface name="fs_unmount_tmpfs" lineno="4203">
<summary>
Unmount a tmpfs filesystem.
</summary>
@@ -83486,7 +83662,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_tmpfs" lineno="4183">
+<interface name="fs_dontaudit_getattr_tmpfs" lineno="4221">
<summary>
Do not audit getting the attributes of a tmpfs filesystem
</summary>
@@ -83496,7 +83672,7 @@ Domain to not audit
</summary>
</param>
</interface>
-<interface name="fs_getattr_tmpfs" lineno="4203">
+<interface name="fs_getattr_tmpfs" lineno="4241">
<summary>
Get the attributes of a tmpfs
filesystem.
@@ -83508,7 +83684,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_associate_tmpfs" lineno="4221">
+<interface name="fs_associate_tmpfs" lineno="4259">
<summary>
Allow the type to associate to tmpfs filesystems.
</summary>
@@ -83518,7 +83694,7 @@ The type of the object to be associated.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_tmpfs" lineno="4239">
+<interface name="fs_relabelfrom_tmpfs" lineno="4277">
<summary>
Relabel from tmpfs filesystem.
</summary>
@@ -83528,7 +83704,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_tmpfs_dirs" lineno="4257">
+<interface name="fs_getattr_tmpfs_dirs" lineno="4295">
<summary>
Get the attributes of tmpfs directories.
</summary>
@@ -83538,7 +83714,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4276">
+<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4314">
<summary>
Do not audit attempts to get the attributes
of tmpfs directories.
@@ -83549,7 +83725,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mounton_tmpfs" lineno="4294">
+<interface name="fs_mounton_tmpfs" lineno="4332">
<summary>
Mount on tmpfs directories.
</summary>
@@ -83559,7 +83735,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mounton_tmpfs_files" lineno="4312">
+<interface name="fs_mounton_tmpfs_files" lineno="4350">
<summary>
Mount on tmpfs files.
</summary>
@@ -83569,7 +83745,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_setattr_tmpfs_dirs" lineno="4330">
+<interface name="fs_setattr_tmpfs_dirs" lineno="4368">
<summary>
Set the attributes of tmpfs directories.
</summary>
@@ -83579,7 +83755,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_tmpfs" lineno="4348">
+<interface name="fs_search_tmpfs" lineno="4386">
<summary>
Search tmpfs directories.
</summary>
@@ -83589,7 +83765,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_tmpfs" lineno="4366">
+<interface name="fs_list_tmpfs" lineno="4404">
<summary>
List the contents of generic tmpfs directories.
</summary>
@@ -83599,7 +83775,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_list_tmpfs" lineno="4385">
+<interface name="fs_dontaudit_list_tmpfs" lineno="4423">
<summary>
Do not audit attempts to list the
contents of generic tmpfs directories.
@@ -83610,7 +83786,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_dirs" lineno="4404">
+<interface name="fs_manage_tmpfs_dirs" lineno="4442">
<summary>
Create, read, write, and delete
tmpfs directories
@@ -83621,7 +83797,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="4423">
+<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="4461">
<summary>
Do not audit attempts to write
tmpfs directories
@@ -83632,7 +83808,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_tmpfs_dirs" lineno="4441">
+<interface name="fs_relabelfrom_tmpfs_dirs" lineno="4479">
<summary>
Relabel from tmpfs_t dir
</summary>
@@ -83642,7 +83818,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_dirs" lineno="4459">
+<interface name="fs_relabel_tmpfs_dirs" lineno="4497">
<summary>
Relabel directory on tmpfs filesystems.
</summary>
@@ -83652,7 +83828,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_tmpfs_filetrans" lineno="4492">
+<interface name="fs_tmpfs_filetrans" lineno="4530">
<summary>
Create an object in a tmpfs filesystem, with a private
type using a type transition.
@@ -83678,7 +83854,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="4512">
+<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="4550">
<summary>
Do not audit attempts to getattr
generic tmpfs files.
@@ -83689,7 +83865,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_rw_tmpfs_files" lineno="4531">
+<interface name="fs_dontaudit_rw_tmpfs_files" lineno="4569">
<summary>
Do not audit attempts to read or write
generic tmpfs files.
@@ -83700,7 +83876,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_delete_tmpfs_symlinks" lineno="4549">
+<interface name="fs_delete_tmpfs_symlinks" lineno="4587">
<summary>
Delete tmpfs symbolic links.
</summary>
@@ -83710,7 +83886,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_auto_mountpoints" lineno="4568">
+<interface name="fs_manage_auto_mountpoints" lineno="4606">
<summary>
Create, read, write, and delete
auto moutpoints.
@@ -83721,7 +83897,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_tmpfs_files" lineno="4586">
+<interface name="fs_read_tmpfs_files" lineno="4624">
<summary>
Read generic tmpfs files.
</summary>
@@ -83731,7 +83907,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_tmpfs_files" lineno="4604">
+<interface name="fs_rw_tmpfs_files" lineno="4642">
<summary>
Read and write generic tmpfs files.
</summary>
@@ -83741,7 +83917,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_files" lineno="4622">
+<interface name="fs_relabel_tmpfs_files" lineno="4660">
<summary>
Relabel files on tmpfs filesystems.
</summary>
@@ -83751,7 +83927,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_read_tmpfs_symlinks" lineno="4640">
+<interface name="fs_read_tmpfs_symlinks" lineno="4678">
<summary>
Read tmpfs link files.
</summary>
@@ -83761,7 +83937,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_tmpfs_sockets" lineno="4658">
+<interface name="fs_relabelfrom_tmpfs_sockets" lineno="4696">
<summary>
Relabelfrom socket files on tmpfs filesystems.
</summary>
@@ -83771,7 +83947,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="4676">
+<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="4714">
<summary>
Relabelfrom tmpfs link files.
</summary>
@@ -83781,7 +83957,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_tmpfs_chr_files" lineno="4694">
+<interface name="fs_rw_tmpfs_chr_files" lineno="4732">
<summary>
Read and write character nodes on tmpfs filesystems.
</summary>
@@ -83791,7 +83967,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="4713">
+<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="4751">
<summary>
dontaudit Read and write character nodes on tmpfs filesystems.
</summary>
@@ -83801,7 +83977,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_chr_file" lineno="4732">
+<interface name="fs_relabel_tmpfs_chr_file" lineno="4770">
<summary>
Relabel character nodes on tmpfs filesystems.
</summary>
@@ -83811,7 +83987,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_rw_tmpfs_blk_files" lineno="4751">
+<interface name="fs_rw_tmpfs_blk_files" lineno="4789">
<summary>
Read and write block nodes on tmpfs filesystems.
</summary>
@@ -83821,7 +83997,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_relabel_tmpfs_blk_file" lineno="4770">
+<interface name="fs_relabel_tmpfs_blk_file" lineno="4808">
<summary>
Relabel block nodes on tmpfs filesystems.
</summary>
@@ -83831,7 +84007,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_files" lineno="4790">
+<interface name="fs_manage_tmpfs_files" lineno="4828">
<summary>
Read and write, create and delete generic
files on tmpfs filesystems.
@@ -83842,7 +84018,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_symlinks" lineno="4809">
+<interface name="fs_manage_tmpfs_symlinks" lineno="4847">
<summary>
Read and write, create and delete symbolic
links on tmpfs filesystems.
@@ -83853,7 +84029,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_sockets" lineno="4828">
+<interface name="fs_manage_tmpfs_sockets" lineno="4866">
<summary>
Read and write, create and delete socket
files on tmpfs filesystems.
@@ -83864,7 +84040,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_chr_files" lineno="4847">
+<interface name="fs_manage_tmpfs_chr_files" lineno="4885">
<summary>
Read and write, create and delete character
nodes on tmpfs filesystems.
@@ -83875,7 +84051,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_tmpfs_blk_files" lineno="4866">
+<interface name="fs_manage_tmpfs_blk_files" lineno="4904">
<summary>
Read and write, create and delete block nodes
on tmpfs filesystems.
@@ -83886,7 +84062,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_tracefs" lineno="4884">
+<interface name="fs_getattr_tracefs" lineno="4922">
<summary>
Get the attributes of a trace filesystem.
</summary>
@@ -83896,7 +84072,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_tracefs_dirs" lineno="4902">
+<interface name="fs_getattr_tracefs_dirs" lineno="4940">
<summary>
Get attributes of dirs on tracefs filesystem.
</summary>
@@ -83906,7 +84082,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_tracefs" lineno="4920">
+<interface name="fs_search_tracefs" lineno="4958">
<summary>
search directories on a tracefs filesystem
</summary>
@@ -83916,7 +84092,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_tracefs_files" lineno="4939">
+<interface name="fs_getattr_tracefs_files" lineno="4977">
<summary>
Get the attributes of files
on a trace filesystem.
@@ -83927,7 +84103,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_mount_xenfs" lineno="4957">
+<interface name="fs_mount_xenfs" lineno="4995">
<summary>
Mount a XENFS filesystem.
</summary>
@@ -83937,7 +84113,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_xenfs" lineno="4975">
+<interface name="fs_search_xenfs" lineno="5013">
<summary>
Search the XENFS filesystem.
</summary>
@@ -83947,7 +84123,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_manage_xenfs_dirs" lineno="4995">
+<interface name="fs_manage_xenfs_dirs" lineno="5033">
<summary>
Create, read, write, and delete directories
on a XENFS filesystem.
@@ -83959,7 +84135,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5015">
+<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5053">
<summary>
Do not audit attempts to create, read,
write, and delete directories
@@ -83971,7 +84147,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_manage_xenfs_files" lineno="5035">
+<interface name="fs_manage_xenfs_files" lineno="5073">
<summary>
Create, read, write, and delete files
on a XENFS filesystem.
@@ -83983,7 +84159,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_manage_xenfs_files" lineno="5055">
+<interface name="fs_dontaudit_manage_xenfs_files" lineno="5093">
<summary>
Do not audit attempts to create,
read, write, and delete files
@@ -83995,7 +84171,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_mount_all_fs" lineno="5073">
+<interface name="fs_mount_all_fs" lineno="5111">
<summary>
Mount all filesystems.
</summary>
@@ -84005,7 +84181,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_remount_all_fs" lineno="5092">
+<interface name="fs_remount_all_fs" lineno="5130">
<summary>
Remount all filesystems. This
allows some mount options to be changed.
@@ -84016,7 +84192,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unmount_all_fs" lineno="5110">
+<interface name="fs_unmount_all_fs" lineno="5148">
<summary>
Unmount all filesystems.
</summary>
@@ -84026,7 +84202,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_fs" lineno="5142">
+<interface name="fs_getattr_all_fs" lineno="5180">
<summary>
Get the attributes of all filesystems.
</summary>
@@ -84050,7 +84226,7 @@ Domain allowed access.
<infoflow type="read" weight="5"/>
<rolecap/>
</interface>
-<interface name="fs_dontaudit_getattr_all_fs" lineno="5162">
+<interface name="fs_dontaudit_getattr_all_fs" lineno="5200">
<summary>
Do not audit attempts to get the attributes
all filesystems.
@@ -84061,7 +84237,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_get_all_fs_quotas" lineno="5181">
+<interface name="fs_get_all_fs_quotas" lineno="5219">
<summary>
Get the quotas of all filesystems.
</summary>
@@ -84072,7 +84248,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_set_all_quotas" lineno="5200">
+<interface name="fs_set_all_quotas" lineno="5238">
<summary>
Set the quotas of all filesystems.
</summary>
@@ -84083,7 +84259,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="fs_relabelfrom_all_fs" lineno="5218">
+<interface name="fs_relabelfrom_all_fs" lineno="5256">
<summary>
Relabelfrom all filesystems.
</summary>
@@ -84093,7 +84269,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_dirs" lineno="5237">
+<interface name="fs_getattr_all_dirs" lineno="5275">
<summary>
Get the attributes of all directories
with a filesystem type.
@@ -84104,7 +84280,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_search_all" lineno="5255">
+<interface name="fs_search_all" lineno="5293">
<summary>
Search all directories with a filesystem type.
</summary>
@@ -84114,7 +84290,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_list_all" lineno="5273">
+<interface name="fs_list_all" lineno="5311">
<summary>
List all directories with a filesystem type.
</summary>
@@ -84124,7 +84300,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_files" lineno="5292">
+<interface name="fs_getattr_all_files" lineno="5330">
<summary>
Get the attributes of all files with
a filesystem type.
@@ -84135,7 +84311,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_all_files" lineno="5311">
+<interface name="fs_dontaudit_getattr_all_files" lineno="5349">
<summary>
Do not audit attempts to get the attributes
of all files with a filesystem type.
@@ -84146,7 +84322,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_symlinks" lineno="5330">
+<interface name="fs_getattr_all_symlinks" lineno="5368">
<summary>
Get the attributes of all symbolic links with
a filesystem type.
@@ -84157,7 +84333,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_all_symlinks" lineno="5349">
+<interface name="fs_dontaudit_getattr_all_symlinks" lineno="5387">
<summary>
Do not audit attempts to get the attributes
of all symbolic links with a filesystem type.
@@ -84168,7 +84344,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_pipes" lineno="5368">
+<interface name="fs_getattr_all_pipes" lineno="5406">
<summary>
Get the attributes of all named pipes with
a filesystem type.
@@ -84179,7 +84355,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_all_pipes" lineno="5387">
+<interface name="fs_dontaudit_getattr_all_pipes" lineno="5425">
<summary>
Do not audit attempts to get the attributes
of all named pipes with a filesystem type.
@@ -84190,7 +84366,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_sockets" lineno="5406">
+<interface name="fs_getattr_all_sockets" lineno="5444">
<summary>
Get the attributes of all named sockets with
a filesystem type.
@@ -84201,7 +84377,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_dontaudit_getattr_all_sockets" lineno="5425">
+<interface name="fs_dontaudit_getattr_all_sockets" lineno="5463">
<summary>
Do not audit attempts to get the attributes
of all named sockets with a filesystem type.
@@ -84212,7 +84388,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_blk_files" lineno="5444">
+<interface name="fs_getattr_all_blk_files" lineno="5482">
<summary>
Get the attributes of all block device nodes with
a filesystem type.
@@ -84223,7 +84399,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_getattr_all_chr_files" lineno="5463">
+<interface name="fs_getattr_all_chr_files" lineno="5501">
<summary>
Get the attributes of all character device nodes with
a filesystem type.
@@ -84234,7 +84410,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="fs_unconfined" lineno="5481">
+<interface name="fs_unconfined" lineno="5519">
<summary>
Unconfined access to filesystems
</summary>
@@ -85461,7 +85637,39 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_search_fs_sysctls" lineno="2164">
+<interface name="kernel_read_kernel_ns_lastpid_sysctls" lineno="2164">
+<summary>
+Read kernel ns lastpid sysctls.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="kernel_dontaudit_write_kernel_ns_lastpid_sysctl" lineno="2184">
+<summary>
+Do not audit attempts to write kernel ns lastpid sysctls.
+</summary>
+<param name="domain">
+<summary>
+Domain to not audit.
+</summary>
+</param>
+</interface>
+<interface name="kernel_rw_kernel_ns_lastpid_sysctl" lineno="2203">
+<summary>
+Read and write kernel ns lastpid sysctls.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="kernel_search_fs_sysctls" lineno="2224">
<summary>
Search filesystem sysctl directories.
</summary>
@@ -85472,7 +85680,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_fs_sysctls" lineno="2183">
+<interface name="kernel_read_fs_sysctls" lineno="2243">
<summary>
Read filesystem sysctls.
</summary>
@@ -85483,7 +85691,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_fs_sysctls" lineno="2204">
+<interface name="kernel_rw_fs_sysctls" lineno="2264">
<summary>
Read and write fileystem sysctls.
</summary>
@@ -85494,7 +85702,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_irq_sysctls" lineno="2225">
+<interface name="kernel_read_irq_sysctls" lineno="2285">
<summary>
Read IRQ sysctls.
</summary>
@@ -85505,7 +85713,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_irq_sysctls" lineno="2246">
+<interface name="kernel_rw_irq_sysctls" lineno="2306">
<summary>
Read and write IRQ sysctls.
</summary>
@@ -85516,7 +85724,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_read_rpc_sysctls" lineno="2267">
+<interface name="kernel_read_rpc_sysctls" lineno="2327">
<summary>
Read RPC sysctls.
</summary>
@@ -85527,7 +85735,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_rpc_sysctls" lineno="2288">
+<interface name="kernel_rw_rpc_sysctls" lineno="2348">
<summary>
Read and write RPC sysctls.
</summary>
@@ -85538,7 +85746,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_dontaudit_list_all_sysctls" lineno="2308">
+<interface name="kernel_dontaudit_list_all_sysctls" lineno="2368">
<summary>
Do not audit attempts to list all sysctl directories.
</summary>
@@ -85548,7 +85756,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_read_all_sysctls" lineno="2328">
+<interface name="kernel_read_all_sysctls" lineno="2388">
<summary>
Allow caller to read all sysctls.
</summary>
@@ -85559,7 +85767,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_all_sysctls" lineno="2351">
+<interface name="kernel_rw_all_sysctls" lineno="2411">
<summary>
Read and write all sysctls.
</summary>
@@ -85570,7 +85778,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_kill_unlabeled" lineno="2375">
+<interface name="kernel_kill_unlabeled" lineno="2435">
<summary>
Send a kill signal to unlabeled processes.
</summary>
@@ -85580,7 +85788,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_mount_unlabeled" lineno="2393">
+<interface name="kernel_mount_unlabeled" lineno="2453">
<summary>
Mount a kernel unlabeled filesystem.
</summary>
@@ -85590,7 +85798,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_unmount_unlabeled" lineno="2411">
+<interface name="kernel_unmount_unlabeled" lineno="2471">
<summary>
Unmount a kernel unlabeled filesystem.
</summary>
@@ -85600,7 +85808,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_signal_unlabeled" lineno="2429">
+<interface name="kernel_signal_unlabeled" lineno="2489">
<summary>
Send general signals to unlabeled processes.
</summary>
@@ -85610,7 +85818,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_signull_unlabeled" lineno="2447">
+<interface name="kernel_signull_unlabeled" lineno="2507">
<summary>
Send a null signal to unlabeled processes.
</summary>
@@ -85620,7 +85828,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_sigstop_unlabeled" lineno="2465">
+<interface name="kernel_sigstop_unlabeled" lineno="2525">
<summary>
Send a stop signal to unlabeled processes.
</summary>
@@ -85630,7 +85838,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_sigchld_unlabeled" lineno="2483">
+<interface name="kernel_sigchld_unlabeled" lineno="2543">
<summary>
Send a child terminated signal to unlabeled processes.
</summary>
@@ -85640,7 +85848,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_getattr_unlabeled_dirs" lineno="2501">
+<interface name="kernel_getattr_unlabeled_dirs" lineno="2561">
<summary>
Get the attributes of unlabeled directories.
</summary>
@@ -85650,7 +85858,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_search_unlabeled" lineno="2519">
+<interface name="kernel_dontaudit_search_unlabeled" lineno="2579">
<summary>
Do not audit attempts to search unlabeled directories.
</summary>
@@ -85660,7 +85868,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_list_unlabeled" lineno="2537">
+<interface name="kernel_list_unlabeled" lineno="2597">
<summary>
List unlabeled directories.
</summary>
@@ -85670,7 +85878,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_unlabeled_state" lineno="2555">
+<interface name="kernel_read_unlabeled_state" lineno="2615">
<summary>
Read the process state (/proc/pid) of all unlabeled_t.
</summary>
@@ -85680,7 +85888,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_list_unlabeled" lineno="2575">
+<interface name="kernel_dontaudit_list_unlabeled" lineno="2635">
<summary>
Do not audit attempts to list unlabeled directories.
</summary>
@@ -85690,7 +85898,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_rw_unlabeled_dirs" lineno="2593">
+<interface name="kernel_rw_unlabeled_dirs" lineno="2653">
<summary>
Read and write unlabeled directories.
</summary>
@@ -85700,7 +85908,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_dirs" lineno="2611">
+<interface name="kernel_delete_unlabeled_dirs" lineno="2671">
<summary>
Delete unlabeled directories.
</summary>
@@ -85710,7 +85918,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_manage_unlabeled_dirs" lineno="2629">
+<interface name="kernel_manage_unlabeled_dirs" lineno="2689">
<summary>
Create, read, write, and delete unlabeled directories.
</summary>
@@ -85720,7 +85928,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_mounton_unlabeled_dirs" lineno="2647">
+<interface name="kernel_mounton_unlabeled_dirs" lineno="2707">
<summary>
Mount a filesystem on an unlabeled directory.
</summary>
@@ -85730,7 +85938,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_unlabeled_files" lineno="2665">
+<interface name="kernel_read_unlabeled_files" lineno="2725">
<summary>
Read unlabeled files.
</summary>
@@ -85740,7 +85948,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_rw_unlabeled_files" lineno="2683">
+<interface name="kernel_rw_unlabeled_files" lineno="2743">
<summary>
Read and write unlabeled files.
</summary>
@@ -85750,7 +85958,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_files" lineno="2701">
+<interface name="kernel_delete_unlabeled_files" lineno="2761">
<summary>
Delete unlabeled files.
</summary>
@@ -85760,7 +85968,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_manage_unlabeled_files" lineno="2719">
+<interface name="kernel_manage_unlabeled_files" lineno="2779">
<summary>
Create, read, write, and delete unlabeled files.
</summary>
@@ -85770,7 +85978,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2738">
+<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2798">
<summary>
Do not audit attempts by caller to get the
attributes of an unlabeled file.
@@ -85781,7 +85989,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_read_unlabeled_files" lineno="2757">
+<interface name="kernel_dontaudit_read_unlabeled_files" lineno="2817">
<summary>
Do not audit attempts by caller to
read an unlabeled file.
@@ -85792,7 +86000,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_symlinks" lineno="2775">
+<interface name="kernel_delete_unlabeled_symlinks" lineno="2835">
<summary>
Delete unlabeled symbolic links.
</summary>
@@ -85802,7 +86010,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_manage_unlabeled_symlinks" lineno="2793">
+<interface name="kernel_manage_unlabeled_symlinks" lineno="2853">
<summary>
Create, read, write, and delete unlabeled symbolic links.
</summary>
@@ -85812,7 +86020,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="2812">
+<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="2872">
<summary>
Do not audit attempts by caller to get the
attributes of unlabeled symbolic links.
@@ -85823,7 +86031,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="2831">
+<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="2891">
<summary>
Do not audit attempts by caller to get the
attributes of unlabeled named pipes.
@@ -85834,7 +86042,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="2850">
+<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="2910">
<summary>
Do not audit attempts by caller to get the
attributes of unlabeled named sockets.
@@ -85845,7 +86053,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="2869">
+<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="2929">
<summary>
Do not audit attempts by caller to get attributes for
unlabeled block devices.
@@ -85856,7 +86064,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_rw_unlabeled_blk_files" lineno="2887">
+<interface name="kernel_rw_unlabeled_blk_files" lineno="2947">
<summary>
Read and write unlabeled block device nodes.
</summary>
@@ -85866,7 +86074,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_blk_files" lineno="2905">
+<interface name="kernel_delete_unlabeled_blk_files" lineno="2965">
<summary>
Delete unlabeled block device nodes.
</summary>
@@ -85876,7 +86084,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_manage_unlabeled_blk_files" lineno="2923">
+<interface name="kernel_manage_unlabeled_blk_files" lineno="2983">
<summary>
Create, read, write, and delete unlabeled block device nodes.
</summary>
@@ -85886,7 +86094,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="2942">
+<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="3002">
<summary>
Do not audit attempts by caller to get attributes for
unlabeled character devices.
@@ -85897,7 +86105,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_write_unlabeled_chr_files" lineno="2961">
+<interface name="kernel_dontaudit_write_unlabeled_chr_files" lineno="3021">
<summary>
Do not audit attempts to
write unlabeled character devices.
@@ -85908,7 +86116,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_chr_files" lineno="2979">
+<interface name="kernel_delete_unlabeled_chr_files" lineno="3039">
<summary>
Delete unlabeled character device nodes.
</summary>
@@ -85918,7 +86126,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_manage_unlabeled_chr_files" lineno="2998">
+<interface name="kernel_manage_unlabeled_chr_files" lineno="3058">
<summary>
Create, read, write, and delete unlabeled character device nodes.
</summary>
@@ -85928,7 +86136,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="3016">
+<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="3076">
<summary>
Allow caller to relabel unlabeled directories.
</summary>
@@ -85938,7 +86146,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_files" lineno="3034">
+<interface name="kernel_relabelfrom_unlabeled_files" lineno="3094">
<summary>
Allow caller to relabel unlabeled files.
</summary>
@@ -85948,7 +86156,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="3053">
+<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="3113">
<summary>
Allow caller to relabel unlabeled symbolic links.
</summary>
@@ -85958,7 +86166,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="3072">
+<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="3132">
<summary>
Allow caller to relabel unlabeled named pipes.
</summary>
@@ -85968,7 +86176,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_pipes" lineno="3091">
+<interface name="kernel_delete_unlabeled_pipes" lineno="3151">
<summary>
Delete unlabeled named pipes
</summary>
@@ -85978,7 +86186,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="3109">
+<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="3169">
<summary>
Allow caller to relabel unlabeled named sockets.
</summary>
@@ -85988,7 +86196,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_delete_unlabeled_sockets" lineno="3128">
+<interface name="kernel_delete_unlabeled_sockets" lineno="3188">
<summary>
Delete unlabeled named sockets.
</summary>
@@ -85998,7 +86206,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_sendrecv_unlabeled_association" lineno="3160">
+<interface name="kernel_sendrecv_unlabeled_association" lineno="3220">
<summary>
Send and receive messages from an
unlabeled IPSEC association.
@@ -86023,7 +86231,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="3193">
+<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="3253">
<summary>
Do not audit attempts to send and receive messages
from an unlabeled IPSEC association.
@@ -86048,7 +86256,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_tcp_recvfrom_unlabeled" lineno="3220">
+<interface name="kernel_tcp_recvfrom_unlabeled" lineno="3280">
<summary>
Receive TCP packets from an unlabeled connection.
</summary>
@@ -86067,7 +86275,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="3249">
+<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="3309">
<summary>
Do not audit attempts to receive TCP packets from an unlabeled
connection.
@@ -86088,7 +86296,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_udp_recvfrom_unlabeled" lineno="3276">
+<interface name="kernel_udp_recvfrom_unlabeled" lineno="3336">
<summary>
Receive UDP packets from an unlabeled connection.
</summary>
@@ -86107,7 +86315,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="3305">
+<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="3365">
<summary>
Do not audit attempts to receive UDP packets from an unlabeled
connection.
@@ -86128,7 +86336,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_raw_recvfrom_unlabeled" lineno="3332">
+<interface name="kernel_raw_recvfrom_unlabeled" lineno="3392">
<summary>
Receive Raw IP packets from an unlabeled connection.
</summary>
@@ -86147,7 +86355,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="3361">
+<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="3421">
<summary>
Do not audit attempts to receive Raw IP packets from an unlabeled
connection.
@@ -86168,7 +86376,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_sendrecv_unlabeled_packets" lineno="3391">
+<interface name="kernel_sendrecv_unlabeled_packets" lineno="3451">
<summary>
Send and receive unlabeled packets.
</summary>
@@ -86190,7 +86398,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_recvfrom_unlabeled_peer" lineno="3419">
+<interface name="kernel_recvfrom_unlabeled_peer" lineno="3479">
<summary>
Receive packets from an unlabeled peer.
</summary>
@@ -86210,7 +86418,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="3447">
+<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="3507">
<summary>
Do not audit attempts to receive packets from an unlabeled peer.
</summary>
@@ -86230,7 +86438,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kernel_relabelfrom_unlabeled_database" lineno="3465">
+<interface name="kernel_relabelfrom_unlabeled_database" lineno="3525">
<summary>
Relabel from unlabeled database objects.
</summary>
@@ -86240,7 +86448,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_unconfined" lineno="3502">
+<interface name="kernel_unconfined" lineno="3562">
<summary>
Unconfined access to kernel module resources.
</summary>
@@ -86250,7 +86458,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_read_vm_overcommit_sysctl" lineno="3522">
+<interface name="kernel_read_vm_overcommit_sysctl" lineno="3582">
<summary>
Read virtual memory overcommit sysctl.
</summary>
@@ -86261,7 +86469,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_rw_vm_overcommit_sysctl" lineno="3542">
+<interface name="kernel_rw_vm_overcommit_sysctl" lineno="3602">
<summary>
Read and write virtual memory overcommit sysctl.
</summary>
@@ -86272,7 +86480,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kernel_ib_access_unlabeled_pkeys" lineno="3561">
+<interface name="kernel_ib_access_unlabeled_pkeys" lineno="3621">
<summary>
Access unlabeled infiniband pkeys.
</summary>
@@ -86282,7 +86490,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kernel_ib_manage_subnet_unlabeled_endports" lineno="3579">
+<interface name="kernel_ib_manage_subnet_unlabeled_endports" lineno="3639">
<summary>
Manage subnet on unlabeled Infiniband endports.
</summary>
@@ -87353,7 +87561,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="selinux_unconfined" lineno="648">
+<interface name="selinux_map_security_files" lineno="649">
+<summary>
+Allows caller to map secuirty_t files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="selinux_unconfined" lineno="668">
<summary>
Unconfined access to the SELinux kernel security server.
</summary>
@@ -87432,7 +87650,26 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_read_fixed_disk" lineno="118">
+<interface name="storage_raw_read_fixed_disk_cond" lineno="126">
+<summary>
+Allow the caller to directly read from a fixed disk
+if a tunable is set.
+This is extremely dangerous as it can bypass the
+SELinux protections for filesystem objects, and
+should only be used by trusted domains.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="tunable">
+<summary>
+Tunable to depend on
+</summary>
+</param>
+</interface>
+<interface name="storage_dontaudit_read_fixed_disk" lineno="151">
<summary>
Do not audit attempts made by the caller to read
fixed disk device nodes.
@@ -87443,7 +87680,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_raw_write_fixed_disk" lineno="141">
+<interface name="storage_raw_write_fixed_disk" lineno="174">
<summary>
Allow the caller to directly write to a fixed disk.
This is extremely dangerous as it can bypass the
@@ -87456,7 +87693,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_write_fixed_disk" lineno="164">
+<interface name="storage_dontaudit_write_fixed_disk" lineno="197">
<summary>
Do not audit attempts made by the caller to write
fixed disk device nodes.
@@ -87467,7 +87704,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_raw_rw_fixed_disk" lineno="186">
+<interface name="storage_raw_rw_fixed_disk" lineno="219">
<summary>
Allow the caller to directly read and write to a fixed disk.
This is extremely dangerous as it can bypass the
@@ -87480,7 +87717,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_create_fixed_disk_dev" lineno="201">
+<interface name="storage_create_fixed_disk_dev" lineno="234">
<summary>
Allow the caller to create fixed disk device nodes.
</summary>
@@ -87490,7 +87727,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_delete_fixed_disk_dev" lineno="221">
+<interface name="storage_delete_fixed_disk_dev" lineno="254">
<summary>
Allow the caller to delete fixed disk device nodes.
</summary>
@@ -87500,7 +87737,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_manage_fixed_disk" lineno="240">
+<interface name="storage_manage_fixed_disk" lineno="273">
<summary>
Create, read, write, and delete fixed disk device nodes.
</summary>
@@ -87510,7 +87747,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dev_filetrans_fixed_disk" lineno="269">
+<interface name="storage_dev_filetrans_fixed_disk" lineno="302">
<summary>
Create block devices in /dev with the fixed disk type
via an automatic type transition.
@@ -87526,7 +87763,7 @@ Optional filename of the block device to be created
</summary>
</param>
</interface>
-<interface name="storage_tmpfs_filetrans_fixed_disk" lineno="288">
+<interface name="storage_tmpfs_filetrans_fixed_disk" lineno="321">
<summary>
Create block devices in on a tmpfs filesystem with the
fixed disk type via an automatic type transition.
@@ -87537,7 +87774,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_relabel_fixed_disk" lineno="306">
+<interface name="storage_relabel_fixed_disk" lineno="339">
<summary>
Relabel fixed disk device nodes.
</summary>
@@ -87547,7 +87784,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_swapon_fixed_disk" lineno="325">
+<interface name="storage_swapon_fixed_disk" lineno="358">
<summary>
Enable a fixed disk device as swap space
</summary>
@@ -87557,7 +87794,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_getattr_fuse_dev" lineno="345">
+<interface name="storage_getattr_fuse_dev" lineno="378">
<summary>
Allow the caller to get the attributes
of device nodes of fuse devices.
@@ -87568,7 +87805,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_rw_fuse" lineno="364">
+<interface name="storage_rw_fuse" lineno="397">
<summary>
read or write fuse device interfaces.
</summary>
@@ -87578,7 +87815,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_rw_fuse" lineno="383">
+<interface name="storage_dontaudit_rw_fuse" lineno="416">
<summary>
Do not audit attempts to read or write
fuse device interfaces.
@@ -87589,7 +87826,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_getattr_scsi_generic_dev" lineno="402">
+<interface name="storage_getattr_scsi_generic_dev" lineno="435">
<summary>
Allow the caller to get the attributes of
the generic SCSI interface device nodes.
@@ -87600,7 +87837,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_setattr_scsi_generic_dev" lineno="422">
+<interface name="storage_setattr_scsi_generic_dev" lineno="455">
<summary>
Allow the caller to set the attributes of
the generic SCSI interface device nodes.
@@ -87611,7 +87848,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_read_scsi_generic" lineno="445">
+<interface name="storage_read_scsi_generic" lineno="478">
<summary>
Allow the caller to directly read, in a
generic fashion, from any SCSI device.
@@ -87625,7 +87862,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_write_scsi_generic" lineno="470">
+<interface name="storage_write_scsi_generic" lineno="503">
<summary>
Allow the caller to directly write, in a
generic fashion, from any SCSI device.
@@ -87639,7 +87876,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_setattr_scsi_generic_dev_dev" lineno="492">
+<interface name="storage_setattr_scsi_generic_dev_dev" lineno="525">
<summary>
Set attributes of the device nodes
for the SCSI generic inerface.
@@ -87650,7 +87887,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_rw_scsi_generic" lineno="512">
+<interface name="storage_dontaudit_rw_scsi_generic" lineno="545">
<summary>
Do not audit attempts to read or write
SCSI generic device interfaces.
@@ -87661,7 +87898,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_getattr_removable_dev" lineno="531">
+<interface name="storage_getattr_removable_dev" lineno="564">
<summary>
Allow the caller to get the attributes of removable
devices device nodes.
@@ -87672,7 +87909,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_getattr_removable_dev" lineno="551">
+<interface name="storage_dontaudit_getattr_removable_dev" lineno="584">
<summary>
Do not audit attempts made by the caller to get
the attributes of removable devices device nodes.
@@ -87683,7 +87920,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_read_removable_device" lineno="570">
+<interface name="storage_dontaudit_read_removable_device" lineno="603">
<summary>
Do not audit attempts made by the caller to read
removable devices device nodes.
@@ -87694,7 +87931,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_write_removable_device" lineno="590">
+<interface name="storage_dontaudit_write_removable_device" lineno="623">
<summary>
Do not audit attempts made by the caller to write
removable devices device nodes.
@@ -87705,7 +87942,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_setattr_removable_dev" lineno="609">
+<interface name="storage_setattr_removable_dev" lineno="642">
<summary>
Allow the caller to set the attributes of removable
devices device nodes.
@@ -87716,7 +87953,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_setattr_removable_dev" lineno="629">
+<interface name="storage_dontaudit_setattr_removable_dev" lineno="662">
<summary>
Do not audit attempts made by the caller to set
the attributes of removable devices device nodes.
@@ -87727,7 +87964,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_raw_read_removable_device" lineno="651">
+<interface name="storage_raw_read_removable_device" lineno="684">
<summary>
Allow the caller to directly read from
a removable device.
@@ -87741,7 +87978,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_raw_read_removable_device" lineno="670">
+<interface name="storage_dontaudit_raw_read_removable_device" lineno="703">
<summary>
Do not audit attempts to directly read removable devices.
</summary>
@@ -87751,7 +87988,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_raw_write_removable_device" lineno="692">
+<interface name="storage_raw_write_removable_device" lineno="725">
<summary>
Allow the caller to directly write to
a removable device.
@@ -87765,7 +88002,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_dontaudit_raw_write_removable_device" lineno="711">
+<interface name="storage_dontaudit_raw_write_removable_device" lineno="744">
<summary>
Do not audit attempts to directly write removable devices.
</summary>
@@ -87775,7 +88012,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="storage_read_tape" lineno="730">
+<interface name="storage_read_tape" lineno="763">
<summary>
Allow the caller to directly read
a tape device.
@@ -87786,7 +88023,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_write_tape" lineno="750">
+<interface name="storage_write_tape" lineno="783">
<summary>
Allow the caller to directly write
a tape device.
@@ -87797,7 +88034,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_getattr_tape_dev" lineno="770">
+<interface name="storage_getattr_tape_dev" lineno="803">
<summary>
Allow the caller to get the attributes
of device nodes of tape devices.
@@ -87808,7 +88045,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_setattr_tape_dev" lineno="790">
+<interface name="storage_setattr_tape_dev" lineno="823">
<summary>
Allow the caller to set the attributes
of device nodes of tape devices.
@@ -87819,7 +88056,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="storage_unconfined" lineno="809">
+<interface name="storage_unconfined" lineno="842">
<summary>
Unconfined access to storage devices.
</summary>
@@ -87884,7 +88121,7 @@ An object type that will applied to a tty.
</summary>
</param>
</interface>
-<interface name="term_user_tty" lineno="110">
+<interface name="term_user_tty" lineno="109">
<summary>
Transform specified type into a user tty type.
</summary>
@@ -87899,7 +88136,7 @@ An object type that will applied to a tty.
</summary>
</param>
</interface>
-<interface name="term_mount_devpts" lineno="144">
+<interface name="term_mount_devpts" lineno="143">
<summary>
mount a devpts_t filesystem
</summary>
@@ -87909,7 +88146,7 @@ The type of the process to mount it
</summary>
</param>
</interface>
-<interface name="term_create_devpts_dirs" lineno="162">
+<interface name="term_create_devpts_dirs" lineno="161">
<summary>
Create directory /dev/pts.
</summary>
@@ -87919,7 +88156,7 @@ The type of the process creating the directory.
</summary>
</param>
</interface>
-<interface name="term_create_pty" lineno="185">
+<interface name="term_create_pty" lineno="184">
<summary>
Create a pty in the /dev/pts directory.
</summary>
@@ -87934,7 +88171,7 @@ The type of the pty.
</summary>
</param>
</interface>
-<interface name="term_write_all_terms" lineno="211">
+<interface name="term_write_all_terms" lineno="210">
<summary>
Write the console, all
ttys and all ptys.
@@ -87946,7 +88183,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_use_all_terms" lineno="234">
+<interface name="term_use_all_terms" lineno="233">
<summary>
Read and write the console, all
ttys and all ptys.
@@ -87958,7 +88195,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_write_console" lineno="256">
+<interface name="term_write_console" lineno="255">
<summary>
Write to the console.
</summary>
@@ -87969,7 +88206,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_read_console" lineno="276">
+<interface name="term_read_console" lineno="275">
<summary>
Read from the console.
</summary>
@@ -87980,7 +88217,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_dontaudit_read_console" lineno="296">
+<interface name="term_dontaudit_read_console" lineno="295">
<summary>
Do not audit attempts to read from the console.
</summary>
@@ -87991,7 +88228,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="term_use_console" lineno="315">
+<interface name="term_use_console" lineno="314">
<summary>
Read from and write to the console.
</summary>
@@ -88002,7 +88239,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_dontaudit_use_console" lineno="335">
+<interface name="term_dontaudit_use_console" lineno="334">
<summary>
Do not audit attemtps to read from
or write to the console.
@@ -88013,7 +88250,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_setattr_console" lineno="355">
+<interface name="term_setattr_console" lineno="354">
<summary>
Set the attributes of the console
device node.
@@ -88025,7 +88262,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_relabel_console" lineno="374">
+<interface name="term_relabel_console" lineno="373">
<summary>
Relabel from and to the console type.
</summary>
@@ -88035,7 +88272,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_create_console_dev" lineno="393">
+<interface name="term_create_console_dev" lineno="392">
<summary>
Create the console device (/dev/console).
</summary>
@@ -88045,7 +88282,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_getattr_pty_fs" lineno="413">
+<interface name="term_getattr_pty_fs" lineno="412">
<summary>
Get the attributes of a pty filesystem
</summary>
@@ -88055,7 +88292,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_relabel_pty_fs" lineno="431">
+<interface name="term_relabel_pty_fs" lineno="430">
<summary>
Relabel from and to pty filesystem.
</summary>
@@ -88065,7 +88302,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_getattr_pty_dirs" lineno="451">
+<interface name="term_getattr_pty_dirs" lineno="450">
<summary>
Get the attributes of the
/dev/pts directory.
@@ -88076,7 +88313,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_dontaudit_getattr_pty_dirs" lineno="470">
+<interface name="term_dontaudit_getattr_pty_dirs" lineno="469">
<summary>
Do not audit attempts to get the
attributes of the /dev/pts directory.
@@ -88087,7 +88324,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_search_ptys" lineno="488">
+<interface name="term_search_ptys" lineno="487">
<summary>
Search the contents of the /dev/pts directory.
</summary>
@@ -88097,7 +88334,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_dontaudit_search_ptys" lineno="508">
+<interface name="term_dontaudit_search_ptys" lineno="507">
<summary>
Do not audit attempts to search the
contents of the /dev/pts directory.
@@ -88108,7 +88345,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_list_ptys" lineno="528">
+<interface name="term_list_ptys" lineno="527">
<summary>
Read the /dev/pts directory to
list all ptys.
@@ -88119,7 +88356,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_dontaudit_list_ptys" lineno="548">
+<interface name="term_dontaudit_list_ptys" lineno="547">
<summary>
Do not audit attempts to read the
/dev/pts directory.
@@ -88130,7 +88367,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_dontaudit_manage_pty_dirs" lineno="567">
+<interface name="term_dontaudit_manage_pty_dirs" lineno="566">
<summary>
Do not audit attempts to create, read,
write, or delete the /dev/pts directory.
@@ -88141,7 +88378,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_relabel_pty_dirs" lineno="585">
+<interface name="term_relabel_pty_dirs" lineno="584">
<summary>
Relabel from and to pty directories.
</summary>
@@ -88151,7 +88388,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_getattr_generic_ptys" lineno="604">
+<interface name="term_getattr_generic_ptys" lineno="603">
<summary>
Get the attributes of generic pty devices.
</summary>
@@ -88161,7 +88398,7 @@ Domain to allow
</summary>
</param>
</interface>
-<interface name="term_dontaudit_getattr_generic_ptys" lineno="623">
+<interface name="term_dontaudit_getattr_generic_ptys" lineno="622">
<summary>
Do not audit attempts to get the attributes
of generic pty devices.
@@ -88172,7 +88409,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_ioctl_generic_ptys" lineno="641">
+<interface name="term_ioctl_generic_ptys" lineno="640">
<summary>
ioctl of generic pty devices.
</summary>
@@ -88182,7 +88419,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_setattr_generic_ptys" lineno="663">
+<interface name="term_setattr_generic_ptys" lineno="662">
<summary>
Allow setting the attributes of
generic pty devices.
@@ -88193,7 +88430,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_dontaudit_setattr_generic_ptys" lineno="683">
+<interface name="term_dontaudit_setattr_generic_ptys" lineno="682">
<summary>
Dontaudit setting the attributes of
generic pty devices.
@@ -88204,7 +88441,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_use_generic_ptys" lineno="703">
+<interface name="term_use_generic_ptys" lineno="702">
<summary>
Read and write the generic pty
type. This is generally only used in
@@ -88216,7 +88453,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_dontaudit_use_generic_ptys" lineno="725">
+<interface name="term_dontaudit_use_generic_ptys" lineno="724">
<summary>
Dot not audit attempts to read and
write the generic pty type. This is
@@ -88228,7 +88465,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_setattr_controlling_term" lineno="743">
+<interface name="term_setattr_controlling_term" lineno="742">
<summary>
Set the attributes of the tty device
</summary>
@@ -88238,7 +88475,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_use_controlling_term" lineno="763">
+<interface name="term_use_controlling_term" lineno="762">
<summary>
Read and write the controlling
terminal (/dev/tty).
@@ -88249,7 +88486,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_getattr_ptmx" lineno="782">
+<interface name="term_getattr_ptmx" lineno="781">
<summary>
Get the attributes of the pty multiplexor (/dev/ptmx).
</summary>
@@ -88259,7 +88496,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_dontaudit_getattr_ptmx" lineno="801">
+<interface name="term_dontaudit_getattr_ptmx" lineno="800">
<summary>
Do not audit attempts to get attributes
on the pty multiplexor (/dev/ptmx).
@@ -88270,7 +88507,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_use_ptmx" lineno="819">
+<interface name="term_use_ptmx" lineno="818">
<summary>
Read and write the pty multiplexor (/dev/ptmx).
</summary>
@@ -88280,7 +88517,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_dontaudit_use_ptmx" lineno="839">
+<interface name="term_dontaudit_use_ptmx" lineno="838">
<summary>
Do not audit attempts to read and
write the pty multiplexor (/dev/ptmx).
@@ -88291,7 +88528,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_getattr_all_ptys" lineno="859">
+<interface name="term_getattr_all_ptys" lineno="858">
<summary>
Get the attributes of all
pty device nodes.
@@ -88303,7 +88540,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_dontaudit_getattr_all_ptys" lineno="882">
+<interface name="term_dontaudit_getattr_all_ptys" lineno="881">
<summary>
Do not audit attempts to get the
attributes of any pty
@@ -88315,7 +88552,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_setattr_all_ptys" lineno="902">
+<interface name="term_setattr_all_ptys" lineno="901">
<summary>
Set the attributes of all
pty device nodes.
@@ -88327,7 +88564,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_relabelto_all_ptys" lineno="923">
+<interface name="term_relabelto_all_ptys" lineno="922">
<summary>
Relabel to all ptys.
</summary>
@@ -88337,7 +88574,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_write_all_ptys" lineno="941">
+<interface name="term_write_all_ptys" lineno="940">
<summary>
Write to all ptys.
</summary>
@@ -88347,7 +88584,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_use_all_ptys" lineno="961">
+<interface name="term_use_all_ptys" lineno="960">
<summary>
Read and write all ptys.
</summary>
@@ -88358,7 +88595,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_dontaudit_use_all_ptys" lineno="982">
+<interface name="term_dontaudit_use_all_ptys" lineno="981">
<summary>
Do not audit attempts to read or write any ptys.
</summary>
@@ -88368,7 +88605,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_relabel_all_ptys" lineno="1000">
+<interface name="term_relabel_all_ptys" lineno="999">
<summary>
Relabel from and to all pty device nodes.
</summary>
@@ -88378,7 +88615,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_getattr_unallocated_ttys" lineno="1022">
+<interface name="term_getattr_unallocated_ttys" lineno="1021">
<summary>
Get the attributes of all unallocated
tty device nodes.
@@ -88390,7 +88627,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_setattr_unlink_unallocated_ttys" lineno="1042">
+<interface name="term_setattr_unlink_unallocated_ttys" lineno="1041">
<summary>
Setattr and unlink unallocated tty device nodes.
</summary>
@@ -88401,7 +88638,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_dontaudit_getattr_unallocated_ttys" lineno="1062">
+<interface name="term_dontaudit_getattr_unallocated_ttys" lineno="1061">
<summary>
Do not audit attempts to get the attributes
of all unallocated tty device nodes.
@@ -88412,7 +88649,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_setattr_unallocated_ttys" lineno="1082">
+<interface name="term_setattr_unallocated_ttys" lineno="1081">
<summary>
Set the attributes of all unallocated
tty device nodes.
@@ -88424,7 +88661,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_dontaudit_setattr_unallocated_ttys" lineno="1102">
+<interface name="term_dontaudit_setattr_unallocated_ttys" lineno="1101">
<summary>
Do not audit attempts to set the attributes
of unallocated tty device nodes.
@@ -88435,7 +88672,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_dontaudit_ioctl_unallocated_ttys" lineno="1121">
+<interface name="term_dontaudit_ioctl_unallocated_ttys" lineno="1120">
<summary>
Do not audit attempts to ioctl
unallocated tty device nodes.
@@ -88446,7 +88683,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_relabel_unallocated_ttys" lineno="1140">
+<interface name="term_relabel_unallocated_ttys" lineno="1139">
<summary>
Relabel from and to the unallocated
tty type.
@@ -88457,7 +88694,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_reset_tty_labels" lineno="1160">
+<interface name="term_reset_tty_labels" lineno="1159">
<summary>
Relabel from all user tty types to
the unallocated tty type.
@@ -88468,7 +88705,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_append_unallocated_ttys" lineno="1181">
+<interface name="term_append_unallocated_ttys" lineno="1180">
<summary>
Append to unallocated ttys.
</summary>
@@ -88478,7 +88715,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_write_unallocated_ttys" lineno="1200">
+<interface name="term_write_unallocated_ttys" lineno="1199">
<summary>
Write to unallocated ttys.
</summary>
@@ -88488,7 +88725,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_use_unallocated_ttys" lineno="1220">
+<interface name="term_use_unallocated_ttys" lineno="1219">
<summary>
Read and write unallocated ttys.
</summary>
@@ -88499,7 +88736,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_dontaudit_use_unallocated_ttys" lineno="1240">
+<interface name="term_dontaudit_use_unallocated_ttys" lineno="1239">
<summary>
Do not audit attempts to read or
write unallocated ttys.
@@ -88510,7 +88747,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_getattr_all_ttys" lineno="1259">
+<interface name="term_getattr_all_ttys" lineno="1258">
<summary>
Get the attributes of all tty device nodes.
</summary>
@@ -88521,7 +88758,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_dontaudit_getattr_all_ttys" lineno="1279">
+<interface name="term_dontaudit_getattr_all_ttys" lineno="1278">
<summary>
Do not audit attempts to get the
attributes of any tty device nodes.
@@ -88532,7 +88769,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_setattr_all_ttys" lineno="1299">
+<interface name="term_setattr_all_ttys" lineno="1298">
<summary>
Set the attributes of all tty device nodes.
</summary>
@@ -88543,7 +88780,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_relabel_all_ttys" lineno="1318">
+<interface name="term_relabel_all_ttys" lineno="1317">
<summary>
Relabel from and to all tty device nodes.
</summary>
@@ -88553,7 +88790,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_write_all_ttys" lineno="1337">
+<interface name="term_write_all_ttys" lineno="1336">
<summary>
Write to all ttys.
</summary>
@@ -88563,7 +88800,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="term_use_all_ttys" lineno="1357">
+<interface name="term_use_all_ttys" lineno="1356">
<summary>
Read and write all ttys.
</summary>
@@ -88574,7 +88811,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="term_dontaudit_use_all_ttys" lineno="1377">
+<interface name="term_dontaudit_use_all_ttys" lineno="1376">
<summary>
Do not audit attempts to read or write
any ttys.
@@ -88585,7 +88822,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="term_use_virtio_console" lineno="1395">
+<interface name="term_use_virtio_console" lineno="1394">
<summary>
Read from and write virtio console.
</summary>
@@ -89949,7 +90186,7 @@ The prefix to be used for deriving type names.
</summary>
</param>
</template>
-<interface name="apache_role" lineno="141">
+<interface name="apache_role" lineno="118">
<summary>
Role access for apache.
</summary>
@@ -89964,7 +90201,7 @@ User domain for the role.
</summary>
</param>
</interface>
-<interface name="apache_read_user_scripts" lineno="196">
+<interface name="apache_read_user_scripts" lineno="173">
<summary>
Read user httpd script executable files.
</summary>
@@ -89974,7 +90211,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_user_content" lineno="216">
+<interface name="apache_read_user_content" lineno="193">
<summary>
Read user httpd content.
</summary>
@@ -89984,7 +90221,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_domtrans" lineno="236">
+<interface name="apache_domtrans" lineno="213">
<summary>
Execute httpd with a domain transition.
</summary>
@@ -89994,7 +90231,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="apache_initrc_domtrans" lineno="255">
+<interface name="apache_initrc_domtrans" lineno="232">
<summary>
Execute httpd server in the httpd domain.
</summary>
@@ -90004,7 +90241,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="apache_signal" lineno="273">
+<interface name="apache_signal" lineno="250">
<summary>
Send generic signals to httpd.
</summary>
@@ -90014,7 +90251,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_signull" lineno="291">
+<interface name="apache_signull" lineno="268">
<summary>
Send null signals to httpd.
</summary>
@@ -90024,7 +90261,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_sigchld" lineno="309">
+<interface name="apache_sigchld" lineno="286">
<summary>
Send child terminated signals to httpd.
</summary>
@@ -90034,7 +90271,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_use_fds" lineno="328">
+<interface name="apache_use_fds" lineno="305">
<summary>
Inherit and use file descriptors
from httpd.
@@ -90045,7 +90282,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_dontaudit_rw_fifo_file" lineno="347">
+<interface name="apache_dontaudit_rw_fifo_file" lineno="324">
<summary>
Do not audit attempts to read and
write httpd unnamed pipes.
@@ -90056,7 +90293,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="apache_dontaudit_rw_stream_sockets" lineno="366">
+<interface name="apache_dontaudit_rw_stream_sockets" lineno="343">
<summary>
Do not audit attempts to read and
write httpd unix domain stream sockets.
@@ -90067,7 +90304,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="apache_rw_stream_sockets" lineno="385">
+<interface name="apache_rw_stream_sockets" lineno="362">
<summary>
Read and write httpd unix domain
stream sockets.
@@ -90078,7 +90315,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_dontaudit_rw_tcp_sockets" lineno="404">
+<interface name="apache_dontaudit_rw_tcp_sockets" lineno="381">
<summary>
Do not audit attempts to read and
write httpd TCP sockets.
@@ -90089,7 +90326,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="apache_reload" lineno="422">
+<interface name="apache_reload" lineno="399">
<summary>
Reload the httpd service (systemd).
</summary>
@@ -90099,7 +90336,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_all_ra_content" lineno="441">
+<interface name="apache_read_all_ra_content" lineno="418">
<summary>
Read all appendable content
</summary>
@@ -90109,7 +90346,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_append_all_ra_content" lineno="460">
+<interface name="apache_append_all_ra_content" lineno="437">
<summary>
Append to all appendable web content
</summary>
@@ -90119,7 +90356,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_all_rw_content" lineno="478">
+<interface name="apache_read_all_rw_content" lineno="455">
<summary>
Read all read/write content
</summary>
@@ -90129,7 +90366,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_manage_all_rw_content" lineno="497">
+<interface name="apache_manage_all_rw_content" lineno="474">
<summary>
Manage all read/write content
</summary>
@@ -90139,7 +90376,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_all_content" lineno="516">
+<interface name="apache_read_all_content" lineno="493">
<summary>
Read all web content.
</summary>
@@ -90149,7 +90386,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_search_all_content" lineno="538">
+<interface name="apache_search_all_content" lineno="515">
<summary>
Search all apache content.
</summary>
@@ -90159,7 +90396,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_manage_all_content" lineno="558">
+<interface name="apache_manage_all_content" lineno="535">
<summary>
Create, read, write, and delete
all httpd content.
@@ -90171,7 +90408,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="apache_setattr_cache_dirs" lineno="582">
+<interface name="apache_setattr_cache_dirs" lineno="559">
<summary>
Set attributes httpd cache directories.
</summary>
@@ -90181,7 +90418,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_list_cache" lineno="600">
+<interface name="apache_list_cache" lineno="577">
<summary>
List httpd cache directories.
</summary>
@@ -90191,7 +90428,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_rw_cache_files" lineno="618">
+<interface name="apache_rw_cache_files" lineno="595">
<summary>
Read and write httpd cache files.
</summary>
@@ -90201,7 +90438,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_delete_cache_dirs" lineno="636">
+<interface name="apache_delete_cache_dirs" lineno="613">
<summary>
Delete httpd cache directories.
</summary>
@@ -90211,7 +90448,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_delete_cache_files" lineno="654">
+<interface name="apache_delete_cache_files" lineno="631">
<summary>
Delete httpd cache files.
</summary>
@@ -90221,7 +90458,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_config" lineno="673">
+<interface name="apache_read_config" lineno="650">
<summary>
Read httpd configuration files.
</summary>
@@ -90232,7 +90469,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="apache_search_config" lineno="694">
+<interface name="apache_search_config" lineno="671">
<summary>
Search httpd configuration directories.
</summary>
@@ -90242,7 +90479,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_manage_config" lineno="714">
+<interface name="apache_manage_config" lineno="691">
<summary>
Create, read, write, and delete
httpd configuration files.
@@ -90253,7 +90490,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_domtrans_helper" lineno="736">
+<interface name="apache_domtrans_helper" lineno="713">
<summary>
Execute the Apache helper program
with a domain transition.
@@ -90264,7 +90501,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_run_helper" lineno="763">
+<interface name="apache_run_helper" lineno="740">
<summary>
Execute the Apache helper program with
a domain transition, and allow the
@@ -90282,7 +90519,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="apache_read_log" lineno="783">
+<interface name="apache_read_log" lineno="760">
<summary>
Read httpd log files.
</summary>
@@ -90293,7 +90530,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="apache_append_log" lineno="804">
+<interface name="apache_append_log" lineno="781">
<summary>
Append httpd log files.
</summary>
@@ -90303,7 +90540,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_dontaudit_append_log" lineno="825">
+<interface name="apache_dontaudit_append_log" lineno="802">
<summary>
Do not audit attempts to append
httpd log files.
@@ -90314,7 +90551,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="apache_manage_log" lineno="844">
+<interface name="apache_manage_log" lineno="821">
<summary>
Create, read, write, and delete
httpd log files.
@@ -90325,7 +90562,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_write_log" lineno="865">
+<interface name="apache_write_log" lineno="842">
<summary>
Write apache log files.
</summary>
@@ -90335,7 +90572,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_dontaudit_search_modules" lineno="885">
+<interface name="apache_dontaudit_search_modules" lineno="862">
<summary>
Do not audit attempts to search
httpd module directories.
@@ -90346,7 +90583,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="apache_list_modules" lineno="903">
+<interface name="apache_list_modules" lineno="880">
<summary>
List httpd module directories.
</summary>
@@ -90356,7 +90593,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_exec_modules" lineno="921">
+<interface name="apache_exec_modules" lineno="898">
<summary>
Execute httpd module files.
</summary>
@@ -90366,7 +90603,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_module_files" lineno="941">
+<interface name="apache_read_module_files" lineno="918">
<summary>
Read httpd module files.
</summary>
@@ -90376,7 +90613,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_domtrans_rotatelogs" lineno="961">
+<interface name="apache_domtrans_rotatelogs" lineno="938">
<summary>
Execute a domain transition to
run httpd_rotatelogs.
@@ -90387,7 +90624,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="apache_list_sys_content" lineno="980">
+<interface name="apache_list_sys_content" lineno="957">
<summary>
List httpd system content directories.
</summary>
@@ -90397,7 +90634,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_manage_sys_content" lineno="1001">
+<interface name="apache_manage_sys_content" lineno="978">
<summary>
Create, read, write, and delete
httpd system content files.
@@ -90409,7 +90646,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="apache_manage_sys_rw_content" lineno="1023">
+<interface name="apache_manage_sys_rw_content" lineno="1000">
<summary>
Create, read, write, and delete
httpd system rw content.
@@ -90420,7 +90657,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_domtrans_sys_script" lineno="1045">
+<interface name="apache_domtrans_sys_script" lineno="1022">
<summary>
Execute all httpd scripts in the
system script domain.
@@ -90431,7 +90668,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="apache_dontaudit_rw_sys_script_stream_sockets" lineno="1068">
+<interface name="apache_dontaudit_rw_sys_script_stream_sockets" lineno="1045">
<summary>
Do not audit attempts to read and
write httpd system script unix
@@ -90443,7 +90680,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="apache_domtrans_all_scripts" lineno="1087">
+<interface name="apache_domtrans_all_scripts" lineno="1064">
<summary>
Execute all user scripts in the user
script domain.
@@ -90454,7 +90691,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="apache_run_all_scripts" lineno="1112">
+<interface name="apache_run_all_scripts" lineno="1089">
<summary>
Execute all user scripts in the user
script domain. Add user script domains
@@ -90471,7 +90708,7 @@ Role allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_squirrelmail_data" lineno="1131">
+<interface name="apache_read_squirrelmail_data" lineno="1108">
<summary>
Read httpd squirrelmail data files.
</summary>
@@ -90481,7 +90718,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_append_squirrelmail_data" lineno="1149">
+<interface name="apache_append_squirrelmail_data" lineno="1126">
<summary>
Append httpd squirrelmail data files.
</summary>
@@ -90491,7 +90728,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_search_sys_content" lineno="1167">
+<interface name="apache_search_sys_content" lineno="1144">
<summary>
Search httpd system content.
</summary>
@@ -90501,7 +90738,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_sys_content" lineno="1186">
+<interface name="apache_read_sys_content" lineno="1163">
<summary>
Read httpd system content.
</summary>
@@ -90511,7 +90748,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_search_sys_scripts" lineno="1206">
+<interface name="apache_search_sys_scripts" lineno="1183">
<summary>
Search httpd system CGI directories.
</summary>
@@ -90521,7 +90758,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_manage_all_user_content" lineno="1226">
+<interface name="apache_manage_all_user_content" lineno="1203">
<summary>
Create, read, write, and delete all
user httpd content.
@@ -90533,7 +90770,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="apache_search_sys_script_state" lineno="1247">
+<interface name="apache_search_sys_script_state" lineno="1224">
<summary>
Search system script state directories.
</summary>
@@ -90543,7 +90780,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_read_tmp_files" lineno="1265">
+<interface name="apache_read_tmp_files" lineno="1242">
<summary>
Read httpd tmp files.
</summary>
@@ -90553,7 +90790,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="apache_dontaudit_write_tmp_files" lineno="1285">
+<interface name="apache_dontaudit_write_tmp_files" lineno="1262">
<summary>
Do not audit attempts to write
httpd tmp files.
@@ -90564,7 +90801,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="apache_delete_lib_files" lineno="1303">
+<interface name="apache_delete_lib_files" lineno="1280">
<summary>
Delete httpd_var_lib_t files
</summary>
@@ -90574,7 +90811,7 @@ Domain that can delete the files
</summary>
</param>
</interface>
-<interface name="apache_cgi_domain" lineno="1334">
+<interface name="apache_cgi_domain" lineno="1311">
<summary>
Execute CGI in the specified domain.
</summary>
@@ -90596,7 +90833,7 @@ Type of the executable to enter the cgi domain.
</summary>
</param>
</interface>
-<interface name="apache_admin" lineno="1362">
+<interface name="apache_admin" lineno="1339">
<summary>
All of the rules required to
administrate an apache environment.
@@ -93161,6 +93398,65 @@ Domain allowed access.
</param>
</interface>
</module>
+<module name="consolesetup" filename="policy/modules/services/consolesetup.if">
+<summary>console font and keymap setup program for debian</summary>
+<interface name="consolesetup_domtrans" lineno="13">
+<summary>
+Execute console-setup in the consolesetup domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="consolesetup_read_conf" lineno="33">
+<summary>
+Read console-setup configuration files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="consolesetup_exec_conf" lineno="55">
+<summary>
+Execute console-setup configuration files
+in the caller domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="consolesetup_manage_runtime" lineno="76">
+<summary>
+Allow the caller to manage
+consolesetup_runtime_t files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="consolesetup_pid_filetrans_runtime" lineno="98">
+<summary>
+Create a console-setup directory in
+the runtime directory.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+</module>
<module name="corosync" filename="policy/modules/services/corosync.if">
<summary>Corosync Cluster Engine.</summary>
<interface name="corosync_domtrans" lineno="13">
@@ -94581,7 +94877,27 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="dbus_unconfined" lineno="600">
+<interface name="dbus_watch_system_bus_runtime_dirs" lineno="600">
+<summary>
+Watch system bus runtime directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dbus_watch_system_bus_runtime_named_sockets" lineno="618">
+<summary>
+Watch system bus runtime named sockets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="dbus_unconfined" lineno="636">
<summary>
Unconfined access to DBUS.
</summary>
@@ -94591,9 +94907,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="630">
+<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="666">
<summary>
-Create resources in /run or /var/run with the system_dbusd_var_run_t
+Create resources in /run or /var/run with the system_dbusd_runtime_t
label. This method is deprecated in favor of the init_daemon_run_dir
call.
</summary>
@@ -94613,9 +94929,9 @@ Optional file name used for the resource
</summary>
</param>
</interface>
-<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="644">
+<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="680">
<summary>
-Create directories with the system_dbusd_var_run_t label
+Create directories with the system_dbusd_runtime_t label
</summary>
<param name="domain">
<summary>
@@ -98005,7 +98321,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kerberos_read_config" lineno="112">
+<interface name="kerberos_read_config" lineno="109">
<summary>
Read kerberos configuration files.
</summary>
@@ -98016,7 +98332,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kerberos_dontaudit_write_config" lineno="135">
+<interface name="kerberos_dontaudit_write_config" lineno="132">
<summary>
Do not audit attempts to write
kerberos configuration files.
@@ -98027,7 +98343,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="kerberos_rw_config" lineno="155">
+<interface name="kerberos_rw_config" lineno="152">
<summary>
Read and write kerberos
configuration files.
@@ -98039,7 +98355,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kerberos_manage_krb5_home_files" lineno="175">
+<interface name="kerberos_manage_krb5_home_files" lineno="172">
<summary>
Create, read, write, and delete
kerberos home files.
@@ -98050,7 +98366,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kerberos_relabel_krb5_home_files" lineno="194">
+<interface name="kerberos_relabel_krb5_home_files" lineno="191">
<summary>
Relabel kerberos home files.
</summary>
@@ -98060,7 +98376,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kerberos_home_filetrans_krb5_home" lineno="224">
+<interface name="kerberos_home_filetrans_krb5_home" lineno="221">
<summary>
Create objects in user home
directories with the krb5 home type.
@@ -98081,7 +98397,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="kerberos_read_keytab" lineno="243">
+<interface name="kerberos_read_keytab" lineno="240">
<summary>
Read kerberos key table files.
</summary>
@@ -98092,7 +98408,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kerberos_rw_keytab" lineno="262">
+<interface name="kerberos_rw_keytab" lineno="259">
<summary>
Read and write kerberos key table files.
</summary>
@@ -98102,7 +98418,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kerberos_manage_keytab_files" lineno="282">
+<interface name="kerberos_manage_keytab_files" lineno="279">
<summary>
Create, read, write, and delete
kerberos key table files.
@@ -98113,7 +98429,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kerberos_etc_filetrans_keytab" lineno="313">
+<interface name="kerberos_etc_filetrans_keytab" lineno="310">
<summary>
Create specified objects in generic
etc directories with the kerberos
@@ -98135,7 +98451,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="kerberos_read_kdc_config" lineno="332">
+<interface name="kerberos_read_kdc_config" lineno="329">
<summary>
Read kerberos kdc configuration files.
</summary>
@@ -98146,7 +98462,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kerberos_manage_host_rcache" lineno="353">
+<interface name="kerberos_manage_host_rcache" lineno="350">
<summary>
Create, read, write, and delete
kerberos host rcache files.
@@ -98158,7 +98474,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="kerberos_tmp_filetrans_host_rcache" lineno="394">
+<interface name="kerberos_tmp_filetrans_host_rcache" lineno="391">
<summary>
Create objects in generic temporary
directories with the kerberos host
@@ -98180,7 +98496,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="kerberos_connect_524" lineno="412">
+<interface name="kerberos_connect_524" lineno="409">
<summary>
Connect to krb524 service.
</summary>
@@ -98190,7 +98506,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="kerberos_admin" lineno="443">
+<interface name="kerberos_admin" lineno="439">
<summary>
All of the rules required to
administrate an kerberos environment.
@@ -98312,6 +98628,63 @@ Role allowed access.
<rolecap/>
</interface>
</module>
+<module name="knot" filename="policy/modules/services/knot.if">
+<summary>high-performance authoritative-only DNS server.</summary>
+<interface name="knot_domtrans_client" lineno="13">
+<summary>
+Execute knotc in the knotc domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="knot_run_client" lineno="39">
+<summary>
+Execute knotc in the knotc domain, and
+allow the specified role the knotc domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="knot_read_config_files" lineno="58">
+<summary>
+Read knot config files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="knot_admin" lineno="84">
+<summary>
+All of the rules required to
+administrate an knot environment.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+</module>
<module name="ksmtuned" filename="policy/modules/services/ksmtuned.if">
<summary>Kernel Samepage Merging Tuning Daemon.</summary>
<interface name="ksmtuned_domtrans" lineno="13">
@@ -98452,7 +98825,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ldap_admin" lineno="100">
+<interface name="ldap_admin" lineno="99">
<summary>
All of the rules required to
administrate an ldap environment.
@@ -98469,7 +98842,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="ldap_run" lineno="148">
+<interface name="ldap_run" lineno="147">
<summary>
Execute slapd in the slapd domain, and
allow the given role the slapd_t type.
@@ -99043,7 +99416,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="memcached_admin" lineno="119">
+<interface name="memcached_admin" lineno="118">
<summary>
All of the rules required to
administrate an memcached environment.
@@ -100214,7 +100587,7 @@ Domain prefix to be used.
</summary>
</param>
</template>
-<interface name="munin_stream_connect" lineno="58">
+<interface name="munin_stream_connect" lineno="55">
<summary>
Connect to munin over a unix domain
stream socket.
@@ -100225,7 +100598,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="munin_read_config" lineno="78">
+<interface name="munin_read_config" lineno="75">
<summary>
Read munin configuration content.
</summary>
@@ -100236,7 +100609,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="munin_append_log" lineno="100">
+<interface name="munin_append_log" lineno="97">
<summary>
Append munin log files.
</summary>
@@ -100247,7 +100620,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="munin_search_lib" lineno="120">
+<interface name="munin_search_lib" lineno="117">
<summary>
Search munin library directories.
</summary>
@@ -100257,7 +100630,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="munin_dontaudit_search_lib" lineno="140">
+<interface name="munin_dontaudit_search_lib" lineno="137">
<summary>
Do not audit attempts to search
munin library directories.
@@ -100268,7 +100641,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="munin_admin" lineno="165">
+<interface name="munin_admin" lineno="162">
<summary>
All of the rules required to
administrate an munin environment.
@@ -100344,7 +100717,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mysql_stream_connect" lineno="98">
+<interface name="mysql_stream_connect" lineno="97">
<summary>
Connect to mysqld with a unix
</summary>
@@ -100355,7 +100728,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="mysql_read_config" lineno="118">
+<interface name="mysql_read_config" lineno="117">
<summary>
Read mysqld configuration content.
</summary>
@@ -100366,7 +100739,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="mysql_search_db" lineno="139">
+<interface name="mysql_search_db" lineno="138">
<summary>
Search mysqld db directories.
</summary>
@@ -100376,7 +100749,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mysql_rw_db_dirs" lineno="158">
+<interface name="mysql_rw_db_dirs" lineno="157">
<summary>
Read and write mysqld database directories.
</summary>
@@ -100386,7 +100759,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mysql_manage_db_dirs" lineno="178">
+<interface name="mysql_manage_db_dirs" lineno="177">
<summary>
Create, read, write, and delete
mysqld database directories.
@@ -100397,7 +100770,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mysql_append_db_files" lineno="197">
+<interface name="mysql_append_db_files" lineno="196">
<summary>
Append mysqld database files.
</summary>
@@ -100407,7 +100780,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mysql_rw_db_files" lineno="216">
+<interface name="mysql_rw_db_files" lineno="215">
<summary>
Read and write mysqld database files.
</summary>
@@ -100417,7 +100790,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mysql_manage_db_files" lineno="236">
+<interface name="mysql_manage_db_files" lineno="235">
<summary>
Create, read, write, and delete
mysqld database files.
@@ -100428,7 +100801,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mysql_manage_mysqld_home_files" lineno="256">
+<interface name="mysql_manage_mysqld_home_files" lineno="255">
<summary>
Create, read, write, and delete
mysqld home files.
@@ -100439,7 +100812,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mysql_relabel_mysqld_home_files" lineno="275">
+<interface name="mysql_relabel_mysqld_home_files" lineno="274">
<summary>
Relabel mysqld home files.
</summary>
@@ -100449,7 +100822,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mysql_home_filetrans_mysqld_home" lineno="305">
+<interface name="mysql_home_filetrans_mysqld_home" lineno="304">
<summary>
Create objects in user home
directories with the mysqld home type.
@@ -100470,7 +100843,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="mysql_write_log" lineno="323">
+<interface name="mysql_write_log" lineno="322">
<summary>
Write mysqld log files.
</summary>
@@ -100480,7 +100853,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mysql_domtrans_mysql_safe" lineno="343">
+<interface name="mysql_domtrans_mysql_safe" lineno="342">
<summary>
Execute mysqld safe in the
mysqld safe domain.
@@ -100491,7 +100864,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="mysql_read_pid_files" lineno="362">
+<interface name="mysql_read_pid_files" lineno="361">
<summary>
Read mysqld pid files.
</summary>
@@ -100501,7 +100874,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mysql_search_pid_files" lineno="382">
+<interface name="mysql_search_pid_files" lineno="381">
<summary>
Search mysqld pid files.
</summary>
@@ -100512,7 +100885,7 @@ Domain allowed access.
</param>
</interface>
-<interface name="mysql_admin" lineno="408">
+<interface name="mysql_admin" lineno="407">
<summary>
All of the rules required to
administrate an mysqld environment.
@@ -100529,7 +100902,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="mysql_setattr_run_dirs" lineno="450">
+<interface name="mysql_setattr_run_dirs" lineno="449">
<summary>
Set the attributes of the MySQL run directories
</summary>
@@ -100539,7 +100912,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="mysql_create_run_dirs" lineno="468">
+<interface name="mysql_create_run_dirs" lineno="467">
<summary>
Create MySQL run directories
</summary>
@@ -100549,7 +100922,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="mysql_generic_run_filetrans_run" lineno="499">
+<interface name="mysql_generic_run_filetrans_run" lineno="498">
<summary>
Automatically use the MySQL run label for created resources in generic
run locations. This method is deprecated in favor of the
@@ -100872,7 +101245,37 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="networkmanager_admin" lineno="313">
+<interface name="networkmanager_enabledisable" lineno="306">
+<summary>
+Allow specified domain to enable/disable NetworkManager units
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="networkmanager_startstop" lineno="325">
+<summary>
+Allow specified domain to start/stop NetworkManager units
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="networkmanager_status" lineno="344">
+<summary>
+Allow specified domain to get status of NetworkManager
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="networkmanager_admin" lineno="370">
<summary>
All of the rules required to
administrate an networkmanager environment.
@@ -100889,7 +101292,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="networkmanager_dontaudit_use_wpa_cli_fds" lineno="352">
+<interface name="networkmanager_dontaudit_use_wpa_cli_fds" lineno="409">
<summary>
Do not audit use of wpa_cli file descriptors
</summary>
@@ -100899,7 +101302,7 @@ Domain to dontaudit access.
</summary>
</param>
</interface>
-<interface name="networkmanager_domtrans_wpa_cli" lineno="371">
+<interface name="networkmanager_domtrans_wpa_cli" lineno="428">
<summary>
Execute wpa_cli in the wpa_cli domain.
</summary>
@@ -100909,7 +101312,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="networkmanager_run_wpa_cli" lineno="397">
+<interface name="networkmanager_run_wpa_cli" lineno="454">
<summary>
Execute wpa cli in the wpa_cli domain, and
allow the specified role the wpa_cli domain.
@@ -100926,7 +101329,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="networkmanager_rw_rawip_sockets" lineno="418">
+<interface name="networkmanager_rw_rawip_sockets" lineno="475">
<summary>
Read and write networkmanager rawip sockets.
</summary>
@@ -100962,7 +101365,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nis_use_ypbind" lineno="90">
+<interface name="nis_use_ypbind" lineno="88">
<summary>
Use the ypbind service to access NIS services.
</summary>
@@ -100985,7 +101388,7 @@ Domain allowed access.
<infoflow type="both" weight="10"/>
<rolecap/>
</interface>
-<interface name="nis_authenticate" lineno="107">
+<interface name="nis_authenticate" lineno="105">
<summary>
Use nis to authenticate passwords.
</summary>
@@ -100996,7 +101399,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="nis_domtrans_ypbind" lineno="125">
+<interface name="nis_domtrans_ypbind" lineno="123">
<summary>
Execute ypbind in the ypbind domain.
</summary>
@@ -101006,7 +101409,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="nis_exec_ypbind" lineno="144">
+<interface name="nis_exec_ypbind" lineno="142">
<summary>
Execute ypbind in the caller domain.
</summary>
@@ -101016,7 +101419,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nis_run_ypbind" lineno="170">
+<interface name="nis_run_ypbind" lineno="168">
<summary>
Execute ypbind in the ypbind domain, and
allow the specified role the ypbind domain.
@@ -101033,7 +101436,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="nis_signal_ypbind" lineno="189">
+<interface name="nis_signal_ypbind" lineno="187">
<summary>
Send generic signals to ypbind.
</summary>
@@ -101043,7 +101446,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nis_list_var_yp" lineno="207">
+<interface name="nis_list_var_yp" lineno="205">
<summary>
List nis data directories.
</summary>
@@ -101053,7 +101456,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nis_read_ypbind_pid" lineno="226">
+<interface name="nis_read_ypbind_pid" lineno="224">
<summary>
Read ypbind pid files.
</summary>
@@ -101063,7 +101466,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nis_delete_ypbind_pid" lineno="245">
+<interface name="nis_delete_ypbind_pid" lineno="243">
<summary>
Delete ypbind pid files.
</summary>
@@ -101073,7 +101476,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nis_read_ypserv_config" lineno="263">
+<interface name="nis_read_ypserv_config" lineno="261">
<summary>
Read ypserv configuration files.
</summary>
@@ -101083,7 +101486,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="nis_domtrans_ypxfr" lineno="282">
+<interface name="nis_domtrans_ypxfr" lineno="280">
<summary>
Execute ypxfr in the ypxfr domain.
</summary>
@@ -101093,7 +101496,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="nis_initrc_domtrans" lineno="303">
+<interface name="nis_initrc_domtrans" lineno="301">
<summary>
Execute nis init scripts in
the init script domain.
@@ -101104,7 +101507,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="nis_initrc_domtrans_ypbind" lineno="322">
+<interface name="nis_initrc_domtrans_ypbind" lineno="320">
<summary>
Execute ypbind init scripts in
the init script domain.
@@ -101115,7 +101518,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="nis_admin" lineno="347">
+<interface name="nis_admin" lineno="345">
<summary>
All of the rules required to
administrate an nis environment.
@@ -102507,7 +102910,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="plymouthd_manage_lib_files" lineno="206">
+<interface name="plymouthd_rw_lib_files" lineno="205">
+<summary>
+Read and write plymouthd lib files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="plymouthd_manage_lib_files" lineno="225">
<summary>
Create, read, write, and delete
plymouthd lib files.
@@ -102518,7 +102931,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="plymouthd_read_pid_files" lineno="225">
+<interface name="plymouthd_read_pid_files" lineno="244">
<summary>
Read plymouthd pid files.
</summary>
@@ -102528,7 +102941,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="plymouthd_admin" lineno="252">
+<interface name="plymouthd_delete_pid_files" lineno="264">
+<summary>
+Delete the plymouthd pid files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="plymouthd_admin" lineno="290">
<summary>
All of the rules required to
administrate an plymouthd environment.
@@ -102944,7 +103367,7 @@ Domain prefix to be used.
</summary>
</param>
</template>
-<template name="postfix_user_domain_template" lineno="104">
+<template name="postfix_user_domain_template" lineno="105">
<summary>
The template to define a postfix user domain.
</summary>
@@ -102954,7 +103377,7 @@ Domain prefix to be used.
</summary>
</param>
</template>
-<interface name="postfix_read_config" lineno="141">
+<interface name="postfix_read_config" lineno="142">
<summary>
Read postfix configuration content.
</summary>
@@ -102965,7 +103388,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="postfix_config_filetrans" lineno="178">
+<interface name="postfix_config_filetrans" lineno="179">
<summary>
Create specified object in postfix
etc directories with a type transition.
@@ -102991,7 +103414,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="postfix_dontaudit_rw_local_tcp_sockets" lineno="198">
+<interface name="postfix_dontaudit_rw_local_tcp_sockets" lineno="199">
<summary>
Do not audit attempts to read and
write postfix local delivery
@@ -103003,7 +103426,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="postfix_rw_local_pipes" lineno="216">
+<interface name="postfix_rw_local_pipes" lineno="217">
<summary>
Read and write postfix local pipes.
</summary>
@@ -103013,7 +103436,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_read_local_state" lineno="234">
+<interface name="postfix_read_local_state" lineno="235">
<summary>
Read postfix local process state files.
</summary>
@@ -103023,7 +103446,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_rw_inherited_master_pipes" lineno="255">
+<interface name="postfix_rw_inherited_master_pipes" lineno="256">
<summary>
Read and write inherited postfix master pipes.
</summary>
@@ -103033,7 +103456,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_read_master_state" lineno="274">
+<interface name="postfix_read_master_state" lineno="275">
<summary>
Read postfix master process state files.
</summary>
@@ -103043,7 +103466,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_use_fds_master" lineno="295">
+<interface name="postfix_use_fds_master" lineno="296">
<summary>
Use postfix master file descriptors.
</summary>
@@ -103053,7 +103476,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_dontaudit_use_fds" lineno="315">
+<interface name="postfix_dontaudit_use_fds" lineno="316">
<summary>
Do not audit attempts to use
postfix master process file
@@ -103065,7 +103488,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="postfix_domtrans_map" lineno="333">
+<interface name="postfix_domtrans_map" lineno="334">
<summary>
Execute postfix_map in the postfix_map domain.
</summary>
@@ -103075,7 +103498,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="postfix_run_map" lineno="360">
+<interface name="postfix_run_map" lineno="361">
<summary>
Execute postfix map in the postfix
map domain, and allow the specified
@@ -103093,7 +103516,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="postfix_domtrans_master" lineno="380">
+<interface name="postfix_domtrans_master" lineno="381">
<summary>
Execute the master postfix program
in the postfix_master domain.
@@ -103104,7 +103527,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="postfix_exec_master" lineno="400">
+<interface name="postfix_exec_master" lineno="401">
<summary>
Execute the master postfix program
in the caller domain.
@@ -103115,7 +103538,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_stream_connect_master" lineno="421">
+<interface name="postfix_stream_connect_master" lineno="422">
<summary>
Connect to postfix master process
using a unix domain stream socket.
@@ -103127,7 +103550,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="postfix_domtrans_postdrop" lineno="440">
+<interface name="postfix_domtrans_postdrop" lineno="441">
<summary>
Execute the master postdrop in the
postfix postdrop domain.
@@ -103138,7 +103561,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="postfix_domtrans_postqueue" lineno="460">
+<interface name="postfix_domtrans_postqueue" lineno="461">
<summary>
Execute the master postqueue in the
postfix postqueue domain.
@@ -103149,7 +103572,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="postfix_exec_postqueue" lineno="480">
+<interface name="postfix_exec_postqueue" lineno="481">
<summary>
Execute postfix postqueue in
the caller domain.
@@ -103160,7 +103583,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_create_private_sockets" lineno="499">
+<interface name="postfix_create_private_sockets" lineno="500">
<summary>
Create postfix private sock files.
</summary>
@@ -103170,7 +103593,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_manage_private_sockets" lineno="518">
+<interface name="postfix_manage_private_sockets" lineno="519">
<summary>
Create, read, write, and delete
postfix private sock files.
@@ -103181,7 +103604,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_domtrans_smtp" lineno="537">
+<interface name="postfix_domtrans_smtp" lineno="538">
<summary>
Execute the smtp postfix program
in the postfix smtp domain.
@@ -103192,7 +103615,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="postfix_getattr_all_spool_files" lineno="557">
+<interface name="postfix_getattr_all_spool_files" lineno="558">
<summary>
Get attributes of all postfix mail
spool files.
@@ -103203,7 +103626,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_search_spool" lineno="576">
+<interface name="postfix_search_spool" lineno="577">
<summary>
Search postfix mail spool directories.
</summary>
@@ -103213,7 +103636,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_list_spool" lineno="595">
+<interface name="postfix_list_spool" lineno="596">
<summary>
List postfix mail spool directories.
</summary>
@@ -103223,7 +103646,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_read_spool_files" lineno="614">
+<interface name="postfix_read_spool_files" lineno="615">
<summary>
Read postfix mail spool files.
</summary>
@@ -103233,7 +103656,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_manage_spool_files" lineno="634">
+<interface name="postfix_manage_spool_files" lineno="635">
<summary>
Create, read, write, and delete
postfix mail spool files.
@@ -103244,7 +103667,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_domtrans_user_mail_handler" lineno="654">
+<interface name="postfix_domtrans_user_mail_handler" lineno="655">
<summary>
Execute postfix user mail programs
in their respective domains.
@@ -103255,7 +103678,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postfix_admin" lineno="679">
+<interface name="postfix_admin" lineno="680">
<summary>
All of the rules required to
administrate an postfix environment.
@@ -103527,7 +103950,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postgresql_stream_connect" lineno="444">
+<interface name="postgresql_stream_connect" lineno="443">
<summary>
Allow the specified domain to connect to postgresql with a unix socket.
</summary>
@@ -103538,7 +103961,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="postgresql_unpriv_client" lineno="466">
+<interface name="postgresql_unpriv_client" lineno="465">
<summary>
Allow the specified domain unprivileged accesses to unifined database objects
managed by SE-PostgreSQL,
@@ -103549,7 +103972,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postgresql_unconfined" lineno="558">
+<interface name="postgresql_unconfined" lineno="557">
<summary>
Allow the specified domain unconfined accesses to any database objects
managed by SE-PostgreSQL,
@@ -103560,7 +103983,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="postgresql_admin" lineno="582">
+<interface name="postgresql_admin" lineno="581">
<summary>
All of the rules required to administrate an postgresql environment
</summary>
@@ -107546,7 +107969,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="snmp_manage_var_lib_dirs" lineno="55">
+<interface name="snmp_manage_var_lib_dirs" lineno="54">
<summary>
Create, read, write, and delete
snmp lib directories.
@@ -107557,7 +107980,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="snmp_manage_var_lib_files" lineno="75">
+<interface name="snmp_manage_var_lib_files" lineno="74">
<summary>
Create, read, write, and delete
snmp lib files.
@@ -107568,7 +107991,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="snmp_read_snmp_var_lib_files" lineno="95">
+<interface name="snmp_read_snmp_var_lib_files" lineno="94">
<summary>
Read snmpd lib content.
</summary>
@@ -107578,7 +108001,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="snmp_dontaudit_read_snmp_var_lib_files" lineno="116">
+<interface name="snmp_dontaudit_read_snmp_var_lib_files" lineno="115">
<summary>
Do not audit attempts to read
snmpd lib content.
@@ -107589,7 +108012,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="snmp_dontaudit_write_snmp_var_lib_files" lineno="137">
+<interface name="snmp_dontaudit_write_snmp_var_lib_files" lineno="136">
<summary>
Do not audit attempts to write
snmpd lib files.
@@ -107600,7 +108023,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="snmp_admin" lineno="162">
+<interface name="snmp_admin" lineno="161">
<summary>
All of the rules required to
administrate an snmp environment.
@@ -107617,7 +108040,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="snmp_append_var_lib_files" lineno="195">
+<interface name="snmp_append_var_lib_files" lineno="194">
<summary>
Append to the snmp variable lib data
</summary>
@@ -108122,7 +108545,7 @@ The role associated with the user domain.
</summary>
</param>
</template>
-<template name="ssh_server_template" lineno="171">
+<template name="ssh_server_template" lineno="169">
<summary>
The template to define a ssh server.
</summary>
@@ -108142,7 +108565,7 @@ is the prefix for sshd_t).
</summary>
</param>
</template>
-<template name="ssh_role_template" lineno="301">
+<template name="ssh_role_template" lineno="300">
<summary>
Role access for ssh
</summary>
@@ -108163,7 +108586,7 @@ User domain for the role
</summary>
</param>
</template>
-<interface name="ssh_sigchld" lineno="455">
+<interface name="ssh_sigchld" lineno="453">
<summary>
Send a SIGCHLD signal to the ssh server.
</summary>
@@ -108173,7 +108596,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_signal" lineno="473">
+<interface name="ssh_signal" lineno="471">
<summary>
Send a generic signal to the ssh server.
</summary>
@@ -108183,7 +108606,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_signull" lineno="491">
+<interface name="ssh_signull" lineno="489">
<summary>
Send a null signal to sshd processes.
</summary>
@@ -108193,7 +108616,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_read_pipes" lineno="509">
+<interface name="ssh_read_pipes" lineno="507">
<summary>
Read a ssh server unnamed pipe.
</summary>
@@ -108203,7 +108626,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_rw_pipes" lineno="526">
+<interface name="ssh_rw_pipes" lineno="524">
<summary>
Read and write a ssh server unnamed pipe.
</summary>
@@ -108213,7 +108636,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_rw_stream_sockets" lineno="544">
+<interface name="ssh_rw_stream_sockets" lineno="542">
<summary>
Read and write ssh server unix domain stream sockets.
</summary>
@@ -108223,7 +108646,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_rw_tcp_sockets" lineno="562">
+<interface name="ssh_rw_tcp_sockets" lineno="560">
<summary>
Read and write ssh server TCP sockets.
</summary>
@@ -108233,7 +108656,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="581">
+<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="579">
<summary>
Do not audit attempts to read and write
ssh server TCP sockets.
@@ -108244,7 +108667,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="ssh_exec_sshd" lineno="599">
+<interface name="ssh_exec_sshd" lineno="597">
<summary>
Execute the ssh daemon in the caller domain.
</summary>
@@ -108254,7 +108677,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_domtrans" lineno="618">
+<interface name="ssh_domtrans" lineno="616">
<summary>
Execute the ssh daemon sshd domain.
</summary>
@@ -108264,7 +108687,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="ssh_exec" lineno="636">
+<interface name="ssh_exec" lineno="634">
<summary>
Execute the ssh client in the caller domain.
</summary>
@@ -108274,7 +108697,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_setattr_key_files" lineno="655">
+<interface name="ssh_setattr_key_files" lineno="653">
<summary>
Set the attributes of sshd key files.
</summary>
@@ -108284,7 +108707,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_agent_exec" lineno="674">
+<interface name="ssh_agent_exec" lineno="672">
<summary>
Execute the ssh agent client in the caller domain.
</summary>
@@ -108294,7 +108717,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_read_user_home_files" lineno="693">
+<interface name="ssh_read_user_home_files" lineno="691">
<summary>
Read ssh home directory content
</summary>
@@ -108304,7 +108727,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_domtrans_keygen" lineno="714">
+<interface name="ssh_domtrans_keygen" lineno="712">
<summary>
Execute the ssh key generator in the ssh keygen domain.
</summary>
@@ -108314,7 +108737,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="ssh_dontaudit_read_server_keys" lineno="732">
+<interface name="ssh_dontaudit_read_server_keys" lineno="730">
<summary>
Read ssh server keys
</summary>
@@ -108324,7 +108747,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="ssh_manage_home_files" lineno="750">
+<interface name="ssh_manage_home_files" lineno="748">
<summary>
Manage ssh home directory content
</summary>
@@ -108334,7 +108757,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="ssh_delete_tmp" lineno="769">
+<interface name="ssh_delete_tmp" lineno="767">
<summary>
Delete from the ssh temp files.
</summary>
@@ -109002,6 +109425,39 @@ tcp sockets to all unreserved ports.
</desc>
</tunable>
</module>
+<module name="tpm2" filename="policy/modules/services/tpm2.if">
+<summary>Trusted Platform Module 2.0</summary>
+<interface name="tpm2_enabledisable_abrmd" lineno="13">
+<summary>
+Allow specified domain to enable/disable tpm2-abrmd unit
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="tpm2_startstop_abrmd" lineno="32">
+<summary>
+Allow specified domain to start/stop tpm2-abrmd unit
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="tpm2_status_abrmd" lineno="51">
+<summary>
+Allow specified domain to get status of tpm2-abrmd unit
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+</module>
<module name="transproxy" filename="policy/modules/services/transproxy.if">
<summary>Portable Transparent Proxy Solution.</summary>
<interface name="transproxy_admin" lineno="20">
@@ -110223,7 +110679,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_rw_all_image_chr_files" lineno="1059">
+<interface name="virt_rw_all_image_chr_files" lineno="1058">
<summary>
Read and write all virt image
character files.
@@ -110234,7 +110690,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_manage_virt_cache" lineno="1080">
+<interface name="virt_manage_virt_cache" lineno="1079">
<summary>
Create, read, write, and delete
virt cache content.
@@ -110245,7 +110701,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_manage_images" lineno="1102">
+<interface name="virt_manage_images" lineno="1101">
<summary>
Create, read, write, and delete
virt image files.
@@ -110256,7 +110712,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="virt_admin" lineno="1145">
+<interface name="virt_admin" lineno="1143">
<summary>
All of the rules required to
administrate an virt environment.
@@ -110510,6 +110966,54 @@ Role allowed access.
<rolecap/>
</interface>
</module>
+<module name="wireguard" filename="policy/modules/services/wireguard.if">
+<summary>WireGuard VPN.</summary>
+<interface name="wireguard_domtrans" lineno="13">
+<summary>
+Execute WireGuard in the wireguard domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+</interface>
+<interface name="wireguard_run" lineno="39">
+<summary>
+Execute WireGuard in the wireguard domain, and
+allow the specified role the wireguard domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed to transition.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="wireguard_admin" lineno="66">
+<summary>
+All of the rules required to
+administrate a WireGuard
+environment.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<param name="role">
+<summary>
+Role allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+</module>
<module name="xfs" filename="policy/modules/services/xfs.if">
<summary>X Windows Font Server.</summary>
<interface name="xfs_read_sockets" lineno="13">
@@ -110592,7 +111096,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_role" lineno="138">
+<interface name="xserver_role" lineno="139">
<summary>
Rules required for using the X Windows server
and environment.
@@ -110608,7 +111112,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_ro_session" lineno="232">
+<interface name="xserver_ro_session" lineno="236">
<summary>
Create sessions on the X server, with read-only
access to the X server shared
@@ -110625,7 +111129,7 @@ The type of the domain SYSV tmpfs files.
</summary>
</param>
</interface>
-<interface name="xserver_rw_session" lineno="274">
+<interface name="xserver_rw_session" lineno="278">
<summary>
Create sessions on the X server, with read and write
access to the X server shared
@@ -110642,7 +111146,7 @@ The type of the domain SYSV tmpfs files.
</summary>
</param>
</interface>
-<interface name="xserver_non_drawing_client" lineno="294">
+<interface name="xserver_non_drawing_client" lineno="298">
<summary>
Create non-drawing client sessions on an X server.
</summary>
@@ -110652,7 +111156,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<template name="xserver_common_x_domain_template" lineno="333">
+<template name="xserver_common_x_domain_template" lineno="337">
<summary>
Interface to provide X object permissions on a given X server to
an X client domain. Provides the minimal set required by a basic
@@ -110670,7 +111174,7 @@ Client domain allowed access.
</summary>
</param>
</template>
-<template name="xserver_object_types_template" lineno="393">
+<template name="xserver_object_types_template" lineno="396">
<summary>
Template for creating the set of types used
in an X windows domain.
@@ -110682,7 +111186,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="xserver_user_x_domain_template" lineno="435">
+<template name="xserver_user_x_domain_template" lineno="438">
<summary>
Interface to provide X object permissions on a given X server to
an X client domain. Provides the minimal set required by a basic
@@ -110705,7 +111209,7 @@ The type of the domain SYSV tmpfs files.
</summary>
</param>
</template>
-<interface name="xserver_use_user_fonts" lineno="502">
+<interface name="xserver_use_user_fonts" lineno="505">
<summary>
Read user fonts, user font configuration,
and manage the user font cache.
@@ -110726,7 +111230,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_domtrans_xauth" lineno="534">
+<interface name="xserver_domtrans_xauth" lineno="537">
<summary>
Transition to the Xauthority domain.
</summary>
@@ -110736,7 +111240,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="xserver_user_home_dir_filetrans_user_xauth" lineno="557">
+<interface name="xserver_user_home_dir_filetrans_user_xauth" lineno="560">
<summary>
Create a Xauthority file in the user home directory.
</summary>
@@ -110751,7 +111255,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="xserver_user_home_dir_filetrans_user_iceauth" lineno="581">
+<interface name="xserver_user_home_dir_filetrans_user_iceauth" lineno="584">
<summary>
Create a ICEauthority file in
the user home directory.
@@ -110767,7 +111271,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="xserver_user_home_dir_filetrans_user_xsession_log" lineno="600">
+<interface name="xserver_user_home_dir_filetrans_user_xsession_log" lineno="603">
<summary>
Create a .xsession-errors log
file in the user home directory.
@@ -110778,7 +111282,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_user_xauth" lineno="618">
+<interface name="xserver_read_user_xauth" lineno="621">
<summary>
Read all users .Xauthority.
</summary>
@@ -110788,7 +111292,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_user_dmrc" lineno="637">
+<interface name="xserver_read_user_dmrc" lineno="640">
<summary>
Read all users .dmrc.
</summary>
@@ -110798,7 +111302,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_user_iceauth" lineno="656">
+<interface name="xserver_read_user_iceauth" lineno="659">
<summary>
Read all users .ICEauthority.
</summary>
@@ -110808,7 +111312,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_setattr_console_pipes" lineno="675">
+<interface name="xserver_setattr_console_pipes" lineno="678">
<summary>
Set the attributes of the X windows console named pipes.
</summary>
@@ -110818,7 +111322,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_console" lineno="693">
+<interface name="xserver_rw_console" lineno="696">
<summary>
Read and write the X windows console named pipe.
</summary>
@@ -110828,7 +111332,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_create_console_pipes" lineno="711">
+<interface name="xserver_create_console_pipes" lineno="714">
<summary>
Create the X windows console named pipes.
</summary>
@@ -110838,7 +111342,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_relabel_console_pipes" lineno="729">
+<interface name="xserver_relabel_console_pipes" lineno="732">
<summary>
relabel the X windows console named pipes.
</summary>
@@ -110848,7 +111352,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_use_xdm_fds" lineno="747">
+<interface name="xserver_use_xdm_fds" lineno="750">
<summary>
Use file descriptors for xdm.
</summary>
@@ -110858,7 +111362,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_use_xdm_fds" lineno="766">
+<interface name="xserver_dontaudit_use_xdm_fds" lineno="769">
<summary>
Do not audit attempts to inherit
XDM file descriptors.
@@ -110869,7 +111373,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_sigchld_xdm" lineno="784">
+<interface name="xserver_sigchld_xdm" lineno="787">
<summary>
Allow domain to send sigchld to xdm_t
</summary>
@@ -110879,7 +111383,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_xdm_pipes" lineno="802">
+<interface name="xserver_rw_xdm_pipes" lineno="805">
<summary>
Read and write XDM unnamed pipes.
</summary>
@@ -110889,7 +111393,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_rw_xdm_pipes" lineno="821">
+<interface name="xserver_dontaudit_rw_xdm_pipes" lineno="824">
<summary>
Do not audit attempts to read and write
XDM unnamed pipes.
@@ -110900,7 +111404,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_dbus_chat_xdm" lineno="841">
+<interface name="xserver_dbus_chat_xdm" lineno="844">
<summary>
Send and receive messages from
xdm over dbus.
@@ -110911,7 +111415,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xdm_state" lineno="861">
+<interface name="xserver_read_xdm_state" lineno="864">
<summary>
Read xdm process state files.
</summary>
@@ -110921,7 +111425,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_setsched_xdm" lineno="883">
+<interface name="xserver_setsched_xdm" lineno="886">
<summary>
Set the priority of the X Display
Manager (XDM).
@@ -110932,7 +111436,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_manage_xdm_spool_files" lineno="902">
+<interface name="xserver_manage_xdm_spool_files" lineno="905">
<summary>
Create, read, write, and delete
xdm_spool files.
@@ -110943,7 +111447,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_stream_connect_xdm" lineno="917">
+<interface name="xserver_stream_connect_xdm" lineno="920">
<summary>
Connect to XDM over a unix domain
stream socket.
@@ -110954,7 +111458,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xdm_rw_config" lineno="936">
+<interface name="xserver_read_xdm_rw_config" lineno="939">
<summary>
Read xdm-writable configuration files.
</summary>
@@ -110964,7 +111468,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_setattr_xdm_tmp_dirs" lineno="955">
+<interface name="xserver_setattr_xdm_tmp_dirs" lineno="958">
<summary>
Set the attributes of XDM temporary directories.
</summary>
@@ -110974,7 +111478,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_create_xdm_tmp_sockets" lineno="974">
+<interface name="xserver_create_xdm_tmp_sockets" lineno="977">
<summary>
Create a named socket in a XDM
temporary directory.
@@ -110985,7 +111489,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_delete_xdm_tmp_sockets" lineno="995">
+<interface name="xserver_delete_xdm_tmp_sockets" lineno="998">
<summary>
Delete a named socket in a XDM
temporary directory.
@@ -110996,7 +111500,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xdm_pid" lineno="1014">
+<interface name="xserver_read_xdm_pid" lineno="1017">
<summary>
Read XDM pid files.
</summary>
@@ -111006,7 +111510,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xdm_lib_files" lineno="1033">
+<interface name="xserver_read_xdm_lib_files" lineno="1036">
<summary>
Read XDM var lib files.
</summary>
@@ -111016,7 +111520,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_xsession_entry_type" lineno="1051">
+<interface name="xserver_xsession_entry_type" lineno="1054">
<summary>
Make an X session script an entrypoint for the specified domain.
</summary>
@@ -111026,7 +111530,7 @@ The domain for which the shell is an entrypoint.
</summary>
</param>
</interface>
-<interface name="xserver_xsession_spec_domtrans" lineno="1088">
+<interface name="xserver_xsession_spec_domtrans" lineno="1091">
<summary>
Execute an X session in the target domain. This
is an explicit transition, requiring the
@@ -111055,7 +111559,7 @@ The type of the shell process.
</summary>
</param>
</interface>
-<interface name="xserver_write_inherited_xsession_log" lineno="1107">
+<interface name="xserver_write_inherited_xsession_log" lineno="1110">
<summary>
Write to inherited xsession log
files such as .xsession-errors.
@@ -111066,7 +111570,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_xsession_log" lineno="1127">
+<interface name="xserver_rw_xsession_log" lineno="1130">
<summary>
Read and write xsession log
files such as .xsession-errors.
@@ -111077,7 +111581,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_manage_xsession_log" lineno="1146">
+<interface name="xserver_manage_xsession_log" lineno="1149">
<summary>
Manage xsession log files such
as .xsession-errors.
@@ -111088,7 +111592,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_write_inherited_log" lineno="1165">
+<interface name="xserver_write_inherited_log" lineno="1168">
<summary>
Write to inherited X server log
files like /var/log/lightdm/lightdm.log
@@ -111099,7 +111603,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_getattr_log" lineno="1183">
+<interface name="xserver_getattr_log" lineno="1186">
<summary>
Get the attributes of X server logs.
</summary>
@@ -111109,7 +111613,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_write_log" lineno="1203">
+<interface name="xserver_dontaudit_write_log" lineno="1206">
<summary>
Do not audit attempts to write the X server
log files.
@@ -111120,7 +111624,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_delete_log" lineno="1221">
+<interface name="xserver_delete_log" lineno="1224">
<summary>
Delete X server log files.
</summary>
@@ -111130,7 +111634,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xkb_libs" lineno="1242">
+<interface name="xserver_read_xkb_libs" lineno="1245">
<summary>
Read X keyboard extension libraries.
</summary>
@@ -111140,7 +111644,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_create_xdm_tmp_dirs" lineno="1263">
+<interface name="xserver_create_xdm_tmp_dirs" lineno="1266">
<summary>
Create xdm temporary directories.
</summary>
@@ -111150,7 +111654,7 @@ Domain to allow access.
</summary>
</param>
</interface>
-<interface name="xserver_read_xdm_tmp_files" lineno="1281">
+<interface name="xserver_read_xdm_tmp_files" lineno="1284">
<summary>
Read xdm temporary files.
</summary>
@@ -111160,7 +111664,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_read_xdm_tmp_files" lineno="1300">
+<interface name="xserver_dontaudit_read_xdm_tmp_files" lineno="1303">
<summary>
Do not audit attempts to read xdm temporary files.
</summary>
@@ -111170,7 +111674,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_rw_xdm_tmp_files" lineno="1319">
+<interface name="xserver_rw_xdm_tmp_files" lineno="1322">
<summary>
Read write xdm temporary files.
</summary>
@@ -111180,7 +111684,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_manage_xdm_tmp_files" lineno="1338">
+<interface name="xserver_manage_xdm_tmp_files" lineno="1341">
<summary>
Create, read, write, and delete xdm temporary files.
</summary>
@@ -111190,7 +111694,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_getattr_xdm_tmp_sockets" lineno="1357">
+<interface name="xserver_dontaudit_getattr_xdm_tmp_sockets" lineno="1360">
<summary>
Do not audit attempts to get the attributes of
xdm temporary named sockets.
@@ -111201,7 +111705,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_list_xdm_tmp" lineno="1375">
+<interface name="xserver_list_xdm_tmp" lineno="1378">
<summary>
list xdm_tmp_t directories
</summary>
@@ -111211,7 +111715,7 @@ Domain to allow
</summary>
</param>
</interface>
-<interface name="xserver_domtrans" lineno="1393">
+<interface name="xserver_domtrans" lineno="1396">
<summary>
Execute the X server in the X server domain.
</summary>
@@ -111221,7 +111725,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="xserver_signal" lineno="1412">
+<interface name="xserver_signal" lineno="1415">
<summary>
Signal X servers
</summary>
@@ -111231,7 +111735,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_kill" lineno="1430">
+<interface name="xserver_kill" lineno="1433">
<summary>
Kill X servers
</summary>
@@ -111241,7 +111745,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_state" lineno="1448">
+<interface name="xserver_read_state" lineno="1451">
<summary>
Allow reading xserver_t files to get cgroup and sessionid
</summary>
@@ -111251,7 +111755,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_shm" lineno="1468">
+<interface name="xserver_rw_shm" lineno="1471">
<summary>
Read and write X server Sys V Shared
memory segments.
@@ -111262,7 +111766,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_rw_tcp_sockets" lineno="1487">
+<interface name="xserver_dontaudit_rw_tcp_sockets" lineno="1490">
<summary>
Do not audit attempts to read and write to
X server sockets.
@@ -111273,7 +111777,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_dontaudit_rw_stream_sockets" lineno="1506">
+<interface name="xserver_dontaudit_rw_stream_sockets" lineno="1509">
<summary>
Do not audit attempts to read and write X server
unix domain stream sockets.
@@ -111284,7 +111788,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="xserver_stream_connect" lineno="1525">
+<interface name="xserver_stream_connect" lineno="1528">
<summary>
Connect to the X server over a unix domain
stream socket.
@@ -111295,7 +111799,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_read_tmp_files" lineno="1544">
+<interface name="xserver_read_tmp_files" lineno="1547">
<summary>
Read X server temporary files.
</summary>
@@ -111305,7 +111809,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_dbus_chat" lineno="1563">
+<interface name="xserver_dbus_chat" lineno="1566">
<summary>
talk to xserver_t by dbus
</summary>
@@ -111315,7 +111819,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_manage_core_devices" lineno="1584">
+<interface name="xserver_manage_core_devices" lineno="1587">
<summary>
Interface to provide X object permissions on a given X server to
an X client domain. Gives the domain permission to read the
@@ -111327,7 +111831,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_unconfined" lineno="1607">
+<interface name="xserver_unconfined" lineno="1610">
<summary>
Interface to provide X object permissions on a given X server to
an X client domain. Gives the domain complete control over the
@@ -111339,7 +111843,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_xdm_keys" lineno="1627">
+<interface name="xserver_rw_xdm_keys" lineno="1630">
<summary>
Manage keys for xdm.
</summary>
@@ -111349,7 +111853,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_link_xdm_keys" lineno="1645">
+<interface name="xserver_link_xdm_keys" lineno="1648">
<summary>
Manage keys for xdm.
</summary>
@@ -111359,7 +111863,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="xserver_rw_mesa_shader_cache" lineno="1663">
+<interface name="xserver_rw_mesa_shader_cache" lineno="1666">
<summary>
Read and write the mesa shader cache.
</summary>
@@ -111422,7 +111926,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="zabbix_read_log" lineno="54">
+<interface name="zabbix_read_log" lineno="53">
<summary>
Read zabbix log files.
</summary>
@@ -111433,7 +111937,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="zabbix_append_log" lineno="73">
+<interface name="zabbix_append_log" lineno="72">
<summary>
Append zabbix log files.
</summary>
@@ -111443,7 +111947,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="zabbix_read_pid_files" lineno="92">
+<interface name="zabbix_read_pid_files" lineno="91">
<summary>
Read zabbix pid files.
</summary>
@@ -111453,7 +111957,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="zabbix_agent_tcp_connect" lineno="111">
+<interface name="zabbix_agent_tcp_connect" lineno="110">
<summary>
Connect to zabbix agent on the TCP network.
</summary>
@@ -111463,7 +111967,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="zabbix_admin" lineno="139">
+<interface name="zabbix_admin" lineno="137">
<summary>
All of the rules required to
administrate an zabbix environment.
@@ -111807,7 +112311,19 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_login_pgm_domain" lineno="118">
+<interface name="auth_use_pam_motd_dynamic" lineno="120">
+<summary>
+Use the pam module motd with dynamic support during authentication.
+This module comes from Ubuntu (https://bugs.launchpad.net/ubuntu/+source/pam/+bug/399071)
+and was added to Debian (https://sources.debian.org/src/pam/1.3.1-5/debian/patches-applied/update-motd/)
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="auth_login_pgm_domain" lineno="144">
<summary>
Make the specified domain used for a login program.
</summary>
@@ -111817,7 +112333,7 @@ Domain type used for a login program domain.
</summary>
</param>
</interface>
-<interface name="auth_login_entry_type" lineno="205">
+<interface name="auth_login_entry_type" lineno="231">
<summary>
Use the login program as an entry point program.
</summary>
@@ -111827,7 +112343,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_login_program" lineno="228">
+<interface name="auth_domtrans_login_program" lineno="254">
<summary>
Execute a login_program in the target domain.
</summary>
@@ -111842,7 +112358,7 @@ The type of the login_program process.
</summary>
</param>
</interface>
-<interface name="auth_ranged_domtrans_login_program" lineno="258">
+<interface name="auth_ranged_domtrans_login_program" lineno="284">
<summary>
Execute a login_program in the target domain,
with a range transition.
@@ -111863,7 +112379,7 @@ Range of the login program.
</summary>
</param>
</interface>
-<interface name="auth_search_cache" lineno="284">
+<interface name="auth_search_cache" lineno="310">
<summary>
Search authentication cache
</summary>
@@ -111873,7 +112389,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_read_cache" lineno="302">
+<interface name="auth_read_cache" lineno="328">
<summary>
Read authentication cache
</summary>
@@ -111883,7 +112399,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_rw_cache" lineno="320">
+<interface name="auth_rw_cache" lineno="346">
<summary>
Read/Write authentication cache
</summary>
@@ -111893,7 +112409,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_cache" lineno="338">
+<interface name="auth_manage_cache" lineno="364">
<summary>
Manage authentication cache
</summary>
@@ -111903,7 +112419,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_var_filetrans_cache" lineno="357">
+<interface name="auth_var_filetrans_cache" lineno="383">
<summary>
Automatic transition from cache_t to cache.
</summary>
@@ -111913,7 +112429,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_chk_passwd" lineno="375">
+<interface name="auth_domtrans_chk_passwd" lineno="401">
<summary>
Run unix_chkpwd to check a password.
</summary>
@@ -111923,7 +112439,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_chkpwd" lineno="423">
+<interface name="auth_domtrans_chkpwd" lineno="449">
<summary>
Run unix_chkpwd to check a password.
Stripped down version to be called within boolean
@@ -111934,7 +112450,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="auth_run_chk_passwd" lineno="449">
+<interface name="auth_run_chk_passwd" lineno="475">
<summary>
Execute chkpwd programs in the chkpwd domain.
</summary>
@@ -111949,7 +112465,7 @@ The role to allow the chkpwd domain.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_upd_passwd" lineno="468">
+<interface name="auth_domtrans_upd_passwd" lineno="494">
<summary>
Execute a domain transition to run unix_update.
</summary>
@@ -111959,7 +112475,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="auth_run_upd_passwd" lineno="493">
+<interface name="auth_run_upd_passwd" lineno="519">
<summary>
Execute updpwd programs in the updpwd domain.
</summary>
@@ -111974,7 +112490,7 @@ The role to allow the updpwd domain.
</summary>
</param>
</interface>
-<interface name="auth_getattr_shadow" lineno="512">
+<interface name="auth_getattr_shadow" lineno="538">
<summary>
Get the attributes of the shadow passwords file.
</summary>
@@ -111984,7 +112500,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_dontaudit_getattr_shadow" lineno="532">
+<interface name="auth_dontaudit_getattr_shadow" lineno="558">
<summary>
Do not audit attempts to get the attributes
of the shadow passwords file.
@@ -111995,7 +112511,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="auth_read_shadow" lineno="554">
+<interface name="auth_read_shadow" lineno="580">
<summary>
Read the shadow passwords file (/etc/shadow)
</summary>
@@ -112005,7 +112521,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_can_read_shadow_passwords" lineno="578">
+<interface name="auth_can_read_shadow_passwords" lineno="604">
<summary>
Pass shadow assertion for reading.
</summary>
@@ -112024,7 +112540,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_tunable_read_shadow" lineno="604">
+<interface name="auth_tunable_read_shadow" lineno="630">
<summary>
Read the shadow password file.
</summary>
@@ -112042,7 +112558,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_dontaudit_read_shadow" lineno="624">
+<interface name="auth_dontaudit_read_shadow" lineno="650">
<summary>
Do not audit attempts to read the shadow
password file (/etc/shadow).
@@ -112053,7 +112569,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="auth_rw_shadow" lineno="642">
+<interface name="auth_rw_shadow" lineno="668">
<summary>
Read and write the shadow password file (/etc/shadow).
</summary>
@@ -112063,7 +112579,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_shadow" lineno="664">
+<interface name="auth_manage_shadow" lineno="690">
<summary>
Create, read, write, and delete the shadow
password file.
@@ -112074,7 +112590,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_etc_filetrans_shadow" lineno="684">
+<interface name="auth_etc_filetrans_shadow" lineno="710">
<summary>
Automatic transition from etc to shadow.
</summary>
@@ -112084,7 +112600,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_relabelto_shadow" lineno="703">
+<interface name="auth_relabelto_shadow" lineno="729">
<summary>
Relabel to the shadow
password file type.
@@ -112095,7 +112611,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_relabel_shadow" lineno="725">
+<interface name="auth_relabel_shadow" lineno="751">
<summary>
Relabel from and to the shadow
password file type.
@@ -112106,7 +112622,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_append_faillog" lineno="746">
+<interface name="auth_append_faillog" lineno="772">
<summary>
Append to the login failure log.
</summary>
@@ -112116,7 +112632,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_create_faillog_files" lineno="765">
+<interface name="auth_create_faillog_files" lineno="791">
<summary>
Create fail log lock (in /run/faillock).
</summary>
@@ -112126,7 +112642,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_rw_faillog" lineno="783">
+<interface name="auth_rw_faillog" lineno="809">
<summary>
Read and write the login failure log.
</summary>
@@ -112136,7 +112652,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_faillog" lineno="802">
+<interface name="auth_manage_faillog" lineno="828">
<summary>
Manage the login failure logs.
</summary>
@@ -112146,7 +112662,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_setattr_faillog_files" lineno="821">
+<interface name="auth_setattr_faillog_files" lineno="847">
<summary>
Setattr the login failure logs.
</summary>
@@ -112156,7 +112672,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_read_lastlog" lineno="840">
+<interface name="auth_read_lastlog" lineno="866">
<summary>
Read the last logins log.
</summary>
@@ -112167,7 +112683,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="auth_append_lastlog" lineno="859">
+<interface name="auth_append_lastlog" lineno="885">
<summary>
Append only to the last logins log.
</summary>
@@ -112177,7 +112693,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_relabel_lastlog" lineno="878">
+<interface name="auth_relabel_lastlog" lineno="904">
<summary>
relabel the last logins log.
</summary>
@@ -112187,7 +112703,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_rw_lastlog" lineno="897">
+<interface name="auth_rw_lastlog" lineno="923">
<summary>
Read and write to the last logins log.
</summary>
@@ -112197,7 +112713,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_lastlog" lineno="916">
+<interface name="auth_manage_lastlog" lineno="942">
<summary>
Manage the last logins log.
</summary>
@@ -112207,7 +112723,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_pam" lineno="935">
+<interface name="auth_domtrans_pam" lineno="961">
<summary>
Execute pam programs in the pam domain.
</summary>
@@ -112217,7 +112733,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="auth_signal_pam" lineno="953">
+<interface name="auth_signal_pam" lineno="979">
<summary>
Send generic signals to pam processes.
</summary>
@@ -112227,7 +112743,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_run_pam" lineno="976">
+<interface name="auth_run_pam" lineno="1002">
<summary>
Execute pam programs in the PAM domain.
</summary>
@@ -112242,7 +112758,7 @@ The role to allow the PAM domain.
</summary>
</param>
</interface>
-<interface name="auth_exec_pam" lineno="995">
+<interface name="auth_exec_pam" lineno="1021">
<summary>
Execute the pam program.
</summary>
@@ -112252,7 +112768,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_read_var_auth" lineno="1014">
+<interface name="auth_read_var_auth" lineno="1040">
<summary>
Read var auth files. Used by various other applications
and pam applets etc.
@@ -112263,7 +112779,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_rw_var_auth" lineno="1034">
+<interface name="auth_rw_var_auth" lineno="1060">
<summary>
Read and write var auth files. Used by various other applications
and pam applets etc.
@@ -112274,7 +112790,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_var_auth" lineno="1054">
+<interface name="auth_manage_var_auth" lineno="1080">
<summary>
Manage var auth files. Used by various other applications
and pam applets etc.
@@ -112285,7 +112801,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_read_pam_pid" lineno="1075">
+<interface name="auth_read_pam_pid" lineno="1101">
<summary>
Read PAM PID files.
</summary>
@@ -112295,7 +112811,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_dontaudit_read_pam_pid" lineno="1095">
+<interface name="auth_dontaudit_read_pam_pid" lineno="1121">
<summary>
Do not audit attemps to read PAM PID files.
</summary>
@@ -112305,7 +112821,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="auth_pid_filetrans_pam_var_run" lineno="1126">
+<interface name="auth_pid_filetrans_pam_var_run" lineno="1152">
<summary>
Create specified objects in
pid directories with the pam var
@@ -112328,7 +112844,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="auth_delete_pam_pid" lineno="1144">
+<interface name="auth_delete_pam_pid" lineno="1170">
<summary>
Delete pam PID files.
</summary>
@@ -112338,7 +112854,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_pam_pid" lineno="1164">
+<interface name="auth_manage_pam_pid" lineno="1190">
<summary>
Manage pam PID files.
</summary>
@@ -112348,7 +112864,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_pam_console" lineno="1184">
+<interface name="auth_domtrans_pam_console" lineno="1210">
<summary>
Execute pam_console with a domain transition.
</summary>
@@ -112358,7 +112874,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="auth_search_pam_console_data" lineno="1203">
+<interface name="auth_search_pam_console_data" lineno="1229">
<summary>
Search the contents of the
pam_console data directory.
@@ -112369,7 +112885,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_list_pam_console_data" lineno="1223">
+<interface name="auth_list_pam_console_data" lineno="1249">
<summary>
List the contents of the pam_console
data directory.
@@ -112380,7 +112896,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_create_pam_console_data_dirs" lineno="1242">
+<interface name="auth_create_pam_console_data_dirs" lineno="1268">
<summary>
Create pam var console pid directories.
</summary>
@@ -112390,7 +112906,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_relabel_pam_console_data_dirs" lineno="1261">
+<interface name="auth_relabel_pam_console_data_dirs" lineno="1287">
<summary>
Relabel pam_console data directories.
</summary>
@@ -112400,7 +112916,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_read_pam_console_data" lineno="1279">
+<interface name="auth_read_pam_console_data" lineno="1305">
<summary>
Read pam_console data files.
</summary>
@@ -112410,7 +112926,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_pam_console_data" lineno="1300">
+<interface name="auth_manage_pam_console_data" lineno="1326">
<summary>
Create, read, write, and delete
pam_console data files.
@@ -112421,7 +112937,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_delete_pam_console_data" lineno="1320">
+<interface name="auth_delete_pam_console_data" lineno="1346">
<summary>
Delete pam_console data.
</summary>
@@ -112431,7 +112947,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_pid_filetrans_pam_var_console" lineno="1353">
+<interface name="auth_pid_filetrans_pam_var_console" lineno="1379">
<summary>
Create specified objects in
pid directories with the pam var
@@ -112454,7 +112970,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="auth_domtrans_utempter" lineno="1371">
+<interface name="auth_domtrans_utempter" lineno="1397">
<summary>
Execute utempter programs in the utempter domain.
</summary>
@@ -112464,7 +112980,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="auth_run_utempter" lineno="1394">
+<interface name="auth_run_utempter" lineno="1420">
<summary>
Execute utempter programs in the utempter domain.
</summary>
@@ -112479,7 +112995,7 @@ The role to allow the utempter domain.
</summary>
</param>
</interface>
-<interface name="auth_dontaudit_exec_utempter" lineno="1413">
+<interface name="auth_dontaudit_exec_utempter" lineno="1439">
<summary>
Do not audit attemps to execute utempter executable.
</summary>
@@ -112489,7 +113005,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="auth_setattr_login_records" lineno="1431">
+<interface name="auth_setattr_login_records" lineno="1457">
<summary>
Set the attributes of login record files.
</summary>
@@ -112499,7 +113015,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_read_login_records" lineno="1451">
+<interface name="auth_read_login_records" lineno="1477">
<summary>
Read login records files (/var/log/wtmp).
</summary>
@@ -112510,7 +113026,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="auth_dontaudit_read_login_records" lineno="1472">
+<interface name="auth_dontaudit_read_login_records" lineno="1498">
<summary>
Do not audit attempts to read login records
files (/var/log/wtmp).
@@ -112522,7 +113038,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="auth_dontaudit_write_login_records" lineno="1491">
+<interface name="auth_dontaudit_write_login_records" lineno="1517">
<summary>
Do not audit attempts to write to
login records files.
@@ -112533,7 +113049,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="auth_append_login_records" lineno="1509">
+<interface name="auth_append_login_records" lineno="1535">
<summary>
Append to login records (wtmp).
</summary>
@@ -112543,7 +113059,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_write_login_records" lineno="1528">
+<interface name="auth_write_login_records" lineno="1554">
<summary>
Write to login records (wtmp).
</summary>
@@ -112553,7 +113069,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_rw_login_records" lineno="1546">
+<interface name="auth_rw_login_records" lineno="1572">
<summary>
Read and write login records.
</summary>
@@ -112563,7 +113079,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_log_filetrans_login_records" lineno="1566">
+<interface name="auth_log_filetrans_login_records" lineno="1592">
<summary>
Create a login records in the log directory
using a type transition.
@@ -112574,7 +113090,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_manage_login_records" lineno="1585">
+<interface name="auth_manage_login_records" lineno="1611">
<summary>
Create, read, write, and delete login
records files.
@@ -112585,7 +113101,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_relabel_login_records" lineno="1604">
+<interface name="auth_relabel_login_records" lineno="1630">
<summary>
Relabel login record files.
</summary>
@@ -112595,7 +113111,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="auth_use_nsswitch" lineno="1632">
+<interface name="auth_use_nsswitch" lineno="1658">
<summary>
Use nsswitch to look up user, password, group, or
host information.
@@ -112615,7 +113131,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="auth_unconfined" lineno="1660">
+<interface name="auth_unconfined" lineno="1686">
<summary>
Unconfined access to the authlogin module.
</summary>
@@ -113197,7 +113713,31 @@ Domain allowed access.
</module>
<module name="init" filename="policy/modules/system/init.if">
<summary>System initialization programs (init and init scripts).</summary>
-<interface name="init_script_file" lineno="32">
+<interface name="init_mountpoint" lineno="17">
+<summary>
+Make the specified type usable as a mountpoint.
+</summary>
+<desc>
+Make the specified type usable as a mountpoint.
+This is normally used for systemd BindPaths options.
+</desc>
+<param name="file_type">
+<summary>
+Type to be used as a mountpoint.
+</summary>
+</param>
+</interface>
+<interface name="init_path_unit_location_file" lineno="35">
+<summary>
+Create a file type monitored by a systemd path unit.
+</summary>
+<param name="script_file">
+<summary>
+Type to be used for a path unit monitored location.
+</summary>
+</param>
+</interface>
+<interface name="init_script_file" lineno="73">
<summary>
Create a file type used for init scripts.
</summary>
@@ -113226,7 +113766,7 @@ Type to be used for a script file.
</param>
<infoflow type="none"/>
</interface>
-<interface name="init_unit_file" lineno="56">
+<interface name="init_unit_file" lineno="97">
<summary>
Make the specified type usable for
systemd unit files.
@@ -113237,7 +113777,7 @@ Type to be used for systemd unit files.
</summary>
</param>
</interface>
-<interface name="init_script_domain" lineno="87">
+<interface name="init_script_domain" lineno="128">
<summary>
Create a domain used for init scripts.
</summary>
@@ -113259,7 +113799,7 @@ Type of the script file used as an entry point to this domain.
</summary>
</param>
</interface>
-<interface name="init_domain" lineno="119">
+<interface name="init_domain" lineno="170">
<summary>
Create a domain which can be started by init.
</summary>
@@ -113274,7 +113814,7 @@ Type of the program to be used as an entry point to this domain.
</summary>
</param>
</interface>
-<interface name="init_ranged_domain" lineno="162">
+<interface name="init_ranged_domain" lineno="213">
<summary>
Create a domain which can be started by init,
with a range transition.
@@ -113295,7 +113835,7 @@ Range for the domain.
</summary>
</param>
</interface>
-<interface name="init_spec_daemon_domain" lineno="203">
+<interface name="init_spec_daemon_domain" lineno="254">
<summary>
Setup a domain which can be manually transitioned to from init.
</summary>
@@ -113319,7 +113859,7 @@ Type of the program being executed when starting this domain.
</summary>
</param>
</interface>
-<interface name="init_daemon_domain" lineno="276">
+<interface name="init_daemon_domain" lineno="327">
<summary>
Create a domain for long running processes
(daemons/services) which are started by init scripts.
@@ -113354,7 +113894,7 @@ Type of the program to be used as an entry point to this domain.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="init_ranged_daemon_domain" lineno="363">
+<interface name="init_ranged_daemon_domain" lineno="412">
<summary>
Create a domain for long running processes
(daemons/services) which are started by init scripts,
@@ -113396,7 +113936,7 @@ MLS/MCS range for the domain.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="init_abstract_socket_activation" lineno="394">
+<interface name="init_abstract_socket_activation" lineno="443">
<summary>
Abstract socket service activation (systemd).
</summary>
@@ -113406,7 +113946,7 @@ The domain to be started by systemd socket activation.
</summary>
</param>
</interface>
-<interface name="init_named_socket_activation" lineno="419">
+<interface name="init_named_socket_activation" lineno="468">
<summary>
Named socket service activation (systemd).
</summary>
@@ -113421,7 +113961,7 @@ The domain socket file type.
</summary>
</param>
</interface>
-<interface name="init_system_domain" lineno="470">
+<interface name="init_system_domain" lineno="519">
<summary>
Create a domain for short running processes
which are started by init scripts.
@@ -113458,7 +113998,7 @@ Type of the program to be used as an entry point to this domain.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="init_ranged_system_domain" lineno="532">
+<interface name="init_ranged_system_domain" lineno="581">
<summary>
Create a domain for short running processes
which are started by init scripts.
@@ -113501,7 +114041,7 @@ Range for the domain.
</param>
<infoflow type="read" weight="10"/>
</interface>
-<interface name="init_dyntrans" lineno="563">
+<interface name="init_dyntrans" lineno="612">
<summary>
Allow domain dyntransition to init_t domain.
</summary>
@@ -113511,7 +114051,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_daemon_pid_file" lineno="592">
+<interface name="init_daemon_pid_file" lineno="641">
<summary>
Mark the file type as a daemon pid file, allowing initrc_t
to create it
@@ -113532,7 +114072,7 @@ Filename of the file that the init script creates
</summary>
</param>
</interface>
-<interface name="init_daemon_lock_file" lineno="625">
+<interface name="init_daemon_lock_file" lineno="674">
<summary>
Mark the file type as a daemon lock file, allowing initrc_t
to create it
@@ -113553,7 +114093,7 @@ Filename of the file that the init script creates
</summary>
</param>
</interface>
-<interface name="init_domtrans" lineno="647">
+<interface name="init_domtrans" lineno="696">
<summary>
Execute init (/sbin/init) with a domain transition.
</summary>
@@ -113563,7 +114103,23 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_exec" lineno="666">
+<interface name="init_pgm_spec_user_daemon_domain" lineno="720">
+<summary>
+Execute init (/sbin/init) with a domain transition
+to the provided domain.
+</summary>
+<desc>
+Execute init (/sbin/init) with a domain transition
+to the provided domain. This is used by systemd
+to execute the systemd user session.
+</desc>
+<param name="domain">
+<summary>
+The type to be used as a systemd --user domain.
+</summary>
+</param>
+</interface>
+<interface name="init_exec" lineno="748">
<summary>
Execute the init program in the caller domain.
</summary>
@@ -113574,7 +114130,19 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_exec_rc" lineno="696">
+<interface name="init_pgm_entrypoint" lineno="769">
+<summary>
+Allow the init program to be an entrypoint
+for the specified domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+<rolecap/>
+</interface>
+<interface name="init_exec_rc" lineno="798">
<summary>
Execute the rc application in the caller domain.
</summary>
@@ -113595,7 +114163,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getpgid" lineno="715">
+<interface name="init_getpgid" lineno="817">
<summary>
Get the process group of init.
</summary>
@@ -113605,7 +114173,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_signal" lineno="733">
+<interface name="init_signal" lineno="835">
<summary>
Send init a generic signal.
</summary>
@@ -113615,7 +114183,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_signull" lineno="751">
+<interface name="init_signull" lineno="853">
<summary>
Send init a null signal.
</summary>
@@ -113625,7 +114193,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_sigchld" lineno="769">
+<interface name="init_sigchld" lineno="871">
<summary>
Send init a SIGCHLD signal.
</summary>
@@ -113635,7 +114203,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stream_connect" lineno="787">
+<interface name="init_stream_connect" lineno="889">
<summary>
Connect to init with a unix socket.
</summary>
@@ -113645,7 +114213,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_use_fds" lineno="847">
+<interface name="init_use_fds" lineno="949">
<summary>
Inherit and use file descriptors from init.
</summary>
@@ -113695,7 +114263,7 @@ Domain allowed access.
</param>
<infoflow type="read" weight="1"/>
</interface>
-<interface name="init_dontaudit_use_fds" lineno="866">
+<interface name="init_dontaudit_use_fds" lineno="968">
<summary>
Do not audit attempts to inherit file
descriptors from init.
@@ -113706,7 +114274,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_dgram_send" lineno="885">
+<interface name="init_dgram_send" lineno="987">
<summary>
Send messages to init unix datagram sockets.
</summary>
@@ -113717,7 +114285,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_rw_inherited_stream_socket" lineno="905">
+<interface name="init_rw_inherited_stream_socket" lineno="1007">
<summary>
Read and write to inherited init unix streams.
</summary>
@@ -113727,7 +114295,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_stream_sockets" lineno="924">
+<interface name="init_rw_stream_sockets" lineno="1026">
<summary>
Allow the specified domain to read/write to
init with unix domain stream sockets.
@@ -113738,7 +114306,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_start_system" lineno="942">
+<interface name="init_start_system" lineno="1044">
<summary>
start service (systemd).
</summary>
@@ -113748,7 +114316,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stop_system" lineno="960">
+<interface name="init_stop_system" lineno="1062">
<summary>
stop service (systemd).
</summary>
@@ -113758,7 +114326,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_get_system_status" lineno="978">
+<interface name="init_get_system_status" lineno="1080">
<summary>
Get all service status (systemd).
</summary>
@@ -113768,7 +114336,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_enable" lineno="996">
+<interface name="init_enable" lineno="1098">
<summary>
Enable all systemd services (systemd).
</summary>
@@ -113778,7 +114346,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_disable" lineno="1014">
+<interface name="init_disable" lineno="1116">
<summary>
Disable all services (systemd).
</summary>
@@ -113788,7 +114356,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_reload" lineno="1032">
+<interface name="init_reload" lineno="1134">
<summary>
Reload all services (systemd).
</summary>
@@ -113798,7 +114366,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_reboot_system" lineno="1050">
+<interface name="init_reboot_system" lineno="1152">
<summary>
Reboot the system (systemd).
</summary>
@@ -113808,7 +114376,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_shutdown_system" lineno="1068">
+<interface name="init_shutdown_system" lineno="1170">
<summary>
Shutdown (halt) the system (systemd).
</summary>
@@ -113818,7 +114386,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_service_status" lineno="1086">
+<interface name="init_service_status" lineno="1188">
<summary>
Allow specified domain to get init status
</summary>
@@ -113828,7 +114396,7 @@ Domain to allow access.
</summary>
</param>
</interface>
-<interface name="init_service_start" lineno="1105">
+<interface name="init_service_start" lineno="1207">
<summary>
Allow specified domain to get init start
</summary>
@@ -113838,7 +114406,7 @@ Domain to allow access.
</summary>
</param>
</interface>
-<interface name="init_dbus_chat" lineno="1125">
+<interface name="init_dbus_chat" lineno="1227">
<summary>
Send and receive messages from
systemd over dbus.
@@ -113849,7 +114417,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_var_lib_links" lineno="1145">
+<interface name="init_read_var_lib_links" lineno="1247">
<summary>
read/follow symlinks under /var/lib/systemd/
</summary>
@@ -113859,7 +114427,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_list_var_lib_dirs" lineno="1164">
+<interface name="init_list_var_lib_dirs" lineno="1266">
<summary>
List /var/lib/systemd/ dir
</summary>
@@ -113869,7 +114437,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_relabel_var_lib_dirs" lineno="1182">
+<interface name="init_relabel_var_lib_dirs" lineno="1284">
<summary>
Relabel dirs in /var/lib/systemd/.
</summary>
@@ -113879,7 +114447,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_var_lib_files" lineno="1200">
+<interface name="init_manage_var_lib_files" lineno="1302">
<summary>
Manage files in /var/lib/systemd/.
</summary>
@@ -113889,7 +114457,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_var_lib_filetrans" lineno="1235">
+<interface name="init_var_lib_filetrans" lineno="1337">
<summary>
Create files in /var/lib/systemd
with an automatic type transition.
@@ -113915,7 +114483,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="init_search_pids" lineno="1254">
+<interface name="init_search_pids" lineno="1356">
<summary>
Allow search directory in the /run/systemd directory.
</summary>
@@ -113925,7 +114493,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_list_pids" lineno="1272">
+<interface name="init_list_pids" lineno="1374">
<summary>
Allow listing of the /run/systemd directory.
</summary>
@@ -113935,7 +114503,48 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_pid_filetrans" lineno="1306">
+<interface name="init_manage_pid_symlinks" lineno="1393">
+<summary>
+Create symbolic links in the /run/systemd directory.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_create_pid_files" lineno="1411">
+<summary>
+Create files in the /run/systemd directory.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_write_pid_files" lineno="1429">
+<summary>
+Write files in the /run/systemd directory.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_manage_pid_dirs" lineno="1448">
+<summary>
+Create, read, write, and delete
+directories in the /run/systemd directory.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_pid_filetrans" lineno="1481">
<summary>
Create files in an init PID directory.
</summary>
@@ -113960,7 +114569,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="init_getattr_initctl" lineno="1325">
+<interface name="init_getattr_initctl" lineno="1500">
<summary>
Get the attributes of initctl.
</summary>
@@ -113970,7 +114579,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_getattr_initctl" lineno="1346">
+<interface name="init_dontaudit_getattr_initctl" lineno="1521">
<summary>
Do not audit attempts to get the
attributes of initctl.
@@ -113981,7 +114590,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_write_initctl" lineno="1364">
+<interface name="init_write_initctl" lineno="1539">
<summary>
Write to initctl.
</summary>
@@ -113991,7 +114600,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_telinit" lineno="1385">
+<interface name="init_telinit" lineno="1560">
<summary>
Use telinit (Read and write initctl).
</summary>
@@ -114002,7 +114611,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_rw_initctl" lineno="1418">
+<interface name="init_rw_initctl" lineno="1593">
<summary>
Read and write initctl.
</summary>
@@ -114012,7 +114621,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_rw_initctl" lineno="1439">
+<interface name="init_dontaudit_rw_initctl" lineno="1614">
<summary>
Do not audit attempts to read and
write initctl.
@@ -114023,7 +114632,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_script_file_entry_type" lineno="1458">
+<interface name="init_script_file_entry_type" lineno="1633">
<summary>
Make init scripts an entry point for
the specified domain.
@@ -114034,7 +114643,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_spec_domtrans_script" lineno="1481">
+<interface name="init_spec_domtrans_script" lineno="1656">
<summary>
Execute init scripts with a specified domain transition.
</summary>
@@ -114044,7 +114653,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_domtrans_script" lineno="1508">
+<interface name="init_domtrans_script" lineno="1683">
<summary>
Execute init scripts with an automatic domain transition.
</summary>
@@ -114054,7 +114663,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_domtrans_labeled_script" lineno="1543">
+<interface name="init_domtrans_labeled_script" lineno="1718">
<summary>
Execute labelled init scripts with an automatic domain transition.
</summary>
@@ -114064,7 +114673,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_script_file_domtrans" lineno="1589">
+<interface name="init_script_file_domtrans" lineno="1764">
<summary>
Execute a init script in a specified domain.
</summary>
@@ -114089,7 +114698,7 @@ Domain to transition to.
</summary>
</param>
</interface>
-<interface name="init_kill_scripts" lineno="1608">
+<interface name="init_kill_scripts" lineno="1783">
<summary>
Send a kill signal to init scripts.
</summary>
@@ -114099,7 +114708,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_script_service" lineno="1626">
+<interface name="init_manage_script_service" lineno="1801">
<summary>
Allow manage service for initrc_exec_t scripts
</summary>
@@ -114109,7 +114718,7 @@ Target domain
</summary>
</param>
</interface>
-<interface name="init_labeled_script_domtrans" lineno="1651">
+<interface name="init_labeled_script_domtrans" lineno="1826">
<summary>
Transition to the init script domain
on a specified labeled init script.
@@ -114125,7 +114734,7 @@ Labeled init script file.
</summary>
</param>
</interface>
-<interface name="init_all_labeled_script_domtrans" lineno="1673">
+<interface name="init_all_labeled_script_domtrans" lineno="1848">
<summary>
Transition to the init script domain
for all labeled init script types
@@ -114136,7 +114745,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="init_get_script_status" lineno="1691">
+<interface name="init_get_script_status" lineno="1866">
<summary>
Allow getting service status of initrc_exec_t scripts
</summary>
@@ -114146,7 +114755,7 @@ Target domain
</summary>
</param>
</interface>
-<interface name="init_startstop_service" lineno="1731">
+<interface name="init_startstop_service" lineno="1906">
<summary>
Allow the role to start and stop
labeled services.
@@ -114177,7 +114786,7 @@ Systemd unit file type.
</summary>
</param>
</interface>
-<interface name="init_run_daemon" lineno="1784">
+<interface name="init_run_daemon" lineno="1960">
<summary>
Start and stop daemon programs directly.
</summary>
@@ -114199,7 +114808,7 @@ The role to be performing this action.
</summary>
</param>
</interface>
-<interface name="init_startstop_all_script_services" lineno="1806">
+<interface name="init_startstop_all_script_services" lineno="1982">
<summary>
Start and stop init_script_file_type services
</summary>
@@ -114209,7 +114818,7 @@ domain that can start and stop the services
</summary>
</param>
</interface>
-<interface name="init_read_state" lineno="1825">
+<interface name="init_read_state" lineno="2001">
<summary>
Read the process state (/proc/pid) of init.
</summary>
@@ -114219,7 +114828,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_read_state" lineno="1845">
+<interface name="init_dontaudit_read_state" lineno="2021">
<summary>
Dontaudit read the process state (/proc/pid) of init.
</summary>
@@ -114229,7 +114838,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_ptrace" lineno="1866">
+<interface name="init_ptrace" lineno="2042">
<summary>
Ptrace init
</summary>
@@ -114240,7 +114849,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_getattr" lineno="1885">
+<interface name="init_getattr" lineno="2061">
<summary>
get init process stats
</summary>
@@ -114251,7 +114860,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="init_read_script_pipes" lineno="1903">
+<interface name="init_read_script_pipes" lineno="2079">
<summary>
Read an init script unnamed pipe.
</summary>
@@ -114261,7 +114870,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_write_script_pipes" lineno="1921">
+<interface name="init_write_script_pipes" lineno="2097">
<summary>
Write an init script unnamed pipe.
</summary>
@@ -114271,7 +114880,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getattr_script_files" lineno="1939">
+<interface name="init_getattr_script_files" lineno="2115">
<summary>
Get the attribute of init script entrypoint files.
</summary>
@@ -114281,7 +114890,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_script_files" lineno="1958">
+<interface name="init_read_script_files" lineno="2134">
<summary>
Read init scripts.
</summary>
@@ -114291,7 +114900,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_exec_script_files" lineno="1977">
+<interface name="init_exec_script_files" lineno="2153">
<summary>
Execute init scripts in the caller domain.
</summary>
@@ -114301,7 +114910,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getattr_all_script_files" lineno="1996">
+<interface name="init_getattr_all_script_files" lineno="2172">
<summary>
Get the attribute of all init script entrypoint files.
</summary>
@@ -114311,7 +114920,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_all_script_files" lineno="2015">
+<interface name="init_read_all_script_files" lineno="2191">
<summary>
Read all init script files.
</summary>
@@ -114321,7 +114930,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_read_all_script_files" lineno="2039">
+<interface name="init_dontaudit_read_all_script_files" lineno="2215">
<summary>
Dontaudit read all init script files.
</summary>
@@ -114331,7 +114940,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_exec_all_script_files" lineno="2057">
+<interface name="init_exec_all_script_files" lineno="2233">
<summary>
Execute all init scripts in the caller domain.
</summary>
@@ -114341,7 +114950,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_script_state" lineno="2076">
+<interface name="init_read_script_state" lineno="2252">
<summary>
Read the process state (/proc/pid) of the init scripts.
</summary>
@@ -114351,7 +114960,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_use_script_fds" lineno="2095">
+<interface name="init_use_script_fds" lineno="2271">
<summary>
Inherit and use init script file descriptors.
</summary>
@@ -114361,7 +114970,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_use_script_fds" lineno="2114">
+<interface name="init_dontaudit_use_script_fds" lineno="2290">
<summary>
Do not audit attempts to inherit
init script file descriptors.
@@ -114372,7 +114981,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_search_script_keys" lineno="2132">
+<interface name="init_search_script_keys" lineno="2308">
<summary>
Search init script keys.
</summary>
@@ -114382,7 +114991,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_getpgid_script" lineno="2150">
+<interface name="init_getpgid_script" lineno="2326">
<summary>
Get the process group ID of init scripts.
</summary>
@@ -114392,7 +115001,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_sigchld_script" lineno="2168">
+<interface name="init_sigchld_script" lineno="2344">
<summary>
Send SIGCHLD signals to init scripts.
</summary>
@@ -114402,7 +115011,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_signal_script" lineno="2186">
+<interface name="init_signal_script" lineno="2362">
<summary>
Send generic signals to init scripts.
</summary>
@@ -114412,7 +115021,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_signull_script" lineno="2204">
+<interface name="init_signull_script" lineno="2380">
<summary>
Send null signals to init scripts.
</summary>
@@ -114422,7 +115031,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_script_pipes" lineno="2222">
+<interface name="init_rw_script_pipes" lineno="2398">
<summary>
Read and write init script unnamed pipes.
</summary>
@@ -114432,7 +115041,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stream_connect_script" lineno="2241">
+<interface name="init_stream_connect_script" lineno="2417">
<summary>
Allow the specified domain to connect to
init scripts with a unix socket.
@@ -114443,7 +115052,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_script_stream_sockets" lineno="2260">
+<interface name="init_rw_script_stream_sockets" lineno="2436">
<summary>
Allow the specified domain to read/write to
init scripts with a unix domain stream sockets.
@@ -114454,7 +115063,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_stream_connect_script" lineno="2279">
+<interface name="init_dontaudit_stream_connect_script" lineno="2455">
<summary>
Dont audit the specified domain connecting to
init scripts with a unix domain stream socket.
@@ -114465,7 +115074,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_dbus_send_script" lineno="2296">
+<interface name="init_dbus_send_script" lineno="2472">
<summary>
Send messages to init scripts over dbus.
</summary>
@@ -114475,7 +115084,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dbus_chat_script" lineno="2316">
+<interface name="init_dbus_chat_script" lineno="2492">
<summary>
Send and receive messages from
init scripts over dbus.
@@ -114486,7 +115095,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_use_script_ptys" lineno="2345">
+<interface name="init_use_script_ptys" lineno="2521">
<summary>
Read and write the init script pty.
</summary>
@@ -114505,7 +115114,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_use_inherited_script_ptys" lineno="2364">
+<interface name="init_use_inherited_script_ptys" lineno="2540">
<summary>
Read and write inherited init script ptys.
</summary>
@@ -114515,7 +115124,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_use_script_ptys" lineno="2386">
+<interface name="init_dontaudit_use_script_ptys" lineno="2562">
<summary>
Do not audit attempts to read and
write the init script pty.
@@ -114526,7 +115135,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_getattr_script_status_files" lineno="2405">
+<interface name="init_getattr_script_status_files" lineno="2581">
<summary>
Get the attributes of init script
status files.
@@ -114537,7 +115146,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_read_script_status_files" lineno="2424">
+<interface name="init_dontaudit_read_script_status_files" lineno="2600">
<summary>
Do not audit attempts to read init script
status files.
@@ -114548,7 +115157,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_search_run" lineno="2443">
+<interface name="init_search_run" lineno="2619">
<summary>
Search the /run/systemd directory.
</summary>
@@ -114558,7 +115167,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_script_tmp_files" lineno="2462">
+<interface name="init_read_script_tmp_files" lineno="2638">
<summary>
Read init script temporary data.
</summary>
@@ -114568,7 +115177,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_inherited_script_tmp_files" lineno="2481">
+<interface name="init_rw_inherited_script_tmp_files" lineno="2657">
<summary>
Read and write init script inherited temporary data.
</summary>
@@ -114578,7 +115187,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rw_script_tmp_files" lineno="2499">
+<interface name="init_rw_script_tmp_files" lineno="2675">
<summary>
Read and write init script temporary data.
</summary>
@@ -114588,7 +115197,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_script_tmp_filetrans" lineno="2534">
+<interface name="init_script_tmp_filetrans" lineno="2710">
<summary>
Create files in a init script
temporary data directory.
@@ -114614,7 +115223,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="init_getattr_utmp" lineno="2553">
+<interface name="init_getattr_utmp" lineno="2729">
<summary>
Get the attributes of init script process id files.
</summary>
@@ -114624,7 +115233,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_utmp" lineno="2571">
+<interface name="init_read_utmp" lineno="2747">
<summary>
Read utmp.
</summary>
@@ -114634,7 +115243,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_write_utmp" lineno="2590">
+<interface name="init_dontaudit_write_utmp" lineno="2766">
<summary>
Do not audit attempts to write utmp.
</summary>
@@ -114644,7 +115253,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_write_utmp" lineno="2608">
+<interface name="init_write_utmp" lineno="2784">
<summary>
Write to utmp.
</summary>
@@ -114654,7 +115263,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_lock_utmp" lineno="2628">
+<interface name="init_dontaudit_lock_utmp" lineno="2804">
<summary>
Do not audit attempts to lock
init script pid files.
@@ -114665,7 +115274,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_rw_utmp" lineno="2646">
+<interface name="init_rw_utmp" lineno="2822">
<summary>
Read and write utmp.
</summary>
@@ -114675,7 +115284,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_dontaudit_rw_utmp" lineno="2665">
+<interface name="init_dontaudit_rw_utmp" lineno="2841">
<summary>
Do not audit attempts to read and write utmp.
</summary>
@@ -114685,7 +115294,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_manage_utmp" lineno="2683">
+<interface name="init_manage_utmp" lineno="2859">
<summary>
Create, read, write, and delete utmp.
</summary>
@@ -114695,7 +115304,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_relabel_utmp" lineno="2702">
+<interface name="init_relabel_utmp" lineno="2878">
<summary>
Relabel utmp.
</summary>
@@ -114705,7 +115314,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_pid_filetrans_utmp" lineno="2721">
+<interface name="init_pid_filetrans_utmp" lineno="2897">
<summary>
Create files in /var/run with the
utmp file type.
@@ -114716,7 +115325,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_runtime_filetrans_utmp" lineno="2737">
+<interface name="init_runtime_filetrans_utmp" lineno="2913">
<summary>
Create files in /var/run with the
utmp file type.
@@ -114727,7 +115336,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_create_pid_dirs" lineno="2755">
+<interface name="init_create_pid_dirs" lineno="2931">
<summary>
Create a directory in the /run/systemd directory.
</summary>
@@ -114737,7 +115346,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_create_runtime_dirs" lineno="2770">
+<interface name="init_create_runtime_dirs" lineno="2946">
<summary>
Create a directory in the /run/systemd directory.
</summary>
@@ -114747,9 +115356,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_rename_pid_files" lineno="2789">
+<interface name="init_rename_pid_files" lineno="2965">
<summary>
-Rename init_var_run_t files
+Rename init_runtime_t files
</summary>
<param name="domain">
<summary>
@@ -114757,9 +115366,9 @@ domain
</summary>
</param>
</interface>
-<interface name="init_rename_runtime_files" lineno="2804">
+<interface name="init_rename_runtime_files" lineno="2980">
<summary>
-Rename init_var_run_t files
+Rename init_runtime_t files
</summary>
<param name="domain">
<summary>
@@ -114767,9 +115376,9 @@ domain
</summary>
</param>
</interface>
-<interface name="init_delete_pid_files" lineno="2822">
+<interface name="init_delete_pid_files" lineno="2998">
<summary>
-Delete init_var_run_t files
+Delete init_runtime_t files
</summary>
<param name="domain">
<summary>
@@ -114777,9 +115386,9 @@ domain
</summary>
</param>
</interface>
-<interface name="init_delete_runtime_files" lineno="2837">
+<interface name="init_delete_runtime_files" lineno="3013">
<summary>
-Delete init_var_run_t files
+Delete init_runtime_t files
</summary>
<param name="domain">
<summary>
@@ -114787,7 +115396,7 @@ domain
</summary>
</param>
</interface>
-<interface name="init_write_pid_socket" lineno="2856">
+<interface name="init_write_pid_socket" lineno="3032">
<summary>
Allow the specified domain to write to
init sock file.
@@ -114798,7 +115407,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_write_runtime_socket" lineno="2872">
+<interface name="init_write_runtime_socket" lineno="3048">
<summary>
Allow the specified domain to write to
init sock file.
@@ -114809,7 +115418,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_pid_pipes" lineno="2890">
+<interface name="init_read_pid_pipes" lineno="3066">
<summary>
Read init unnamed pipes.
</summary>
@@ -114819,7 +115428,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_runtime_pipes" lineno="2905">
+<interface name="init_read_runtime_pipes" lineno="3081">
<summary>
Read init unnamed pipes.
</summary>
@@ -114829,7 +115438,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_runtime_symlinks" lineno="2923">
+<interface name="init_read_runtime_symlinks" lineno="3099">
<summary>
read systemd unit symlinks (usually under /run/systemd/units/)
</summary>
@@ -114839,7 +115448,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_tcp_recvfrom_all_daemons" lineno="2941">
+<interface name="init_tcp_recvfrom_all_daemons" lineno="3117">
<summary>
Allow the specified domain to connect to daemon with a tcp socket
</summary>
@@ -114849,7 +115458,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_udp_recvfrom_all_daemons" lineno="2959">
+<interface name="init_udp_recvfrom_all_daemons" lineno="3135">
<summary>
Allow the specified domain to connect to daemon with a udp socket
</summary>
@@ -114859,7 +115468,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_script_status_files" lineno="2978">
+<interface name="init_read_script_status_files" lineno="3154">
<summary>
Allow reading the init script state files
</summary>
@@ -114869,7 +115478,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="init_relabelto_script_state" lineno="2996">
+<interface name="init_relabelto_script_state" lineno="3172">
<summary>
Label to init script status files
</summary>
@@ -114879,7 +115488,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="init_script_readable_type" lineno="3015">
+<interface name="init_script_readable_type" lineno="3191">
<summary>
Mark as a readable type for the initrc_t domain
</summary>
@@ -114889,7 +115498,7 @@ Type that initrc_t needs read access to
</summary>
</param>
</interface>
-<interface name="init_search_units" lineno="3033">
+<interface name="init_search_units" lineno="3209">
<summary>
Search systemd unit dirs.
</summary>
@@ -114899,7 +115508,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_read_generic_units_symlinks" lineno="3058">
+<interface name="init_list_unit_dirs" lineno="3234">
+<summary>
+List systemd unit dirs.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="init_read_generic_units_symlinks" lineno="3254">
<summary>
Read systemd unit links
</summary>
@@ -114909,7 +115528,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_get_generic_units_status" lineno="3076">
+<interface name="init_get_generic_units_status" lineno="3272">
<summary>
Get status of generic systemd units.
</summary>
@@ -114919,7 +115538,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_start_generic_units" lineno="3095">
+<interface name="init_start_generic_units" lineno="3291">
<summary>
Start generic systemd units.
</summary>
@@ -114929,7 +115548,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stop_generic_units" lineno="3114">
+<interface name="init_stop_generic_units" lineno="3310">
<summary>
Stop generic systemd units.
</summary>
@@ -114939,7 +115558,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_reload_generic_units" lineno="3133">
+<interface name="init_reload_generic_units" lineno="3329">
<summary>
Reload generic systemd units.
</summary>
@@ -114949,7 +115568,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_get_all_units_status" lineno="3152">
+<interface name="init_get_all_units_status" lineno="3348">
<summary>
Get status of all systemd units.
</summary>
@@ -114959,7 +115578,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_manage_all_units" lineno="3171">
+<interface name="init_manage_all_units" lineno="3367">
<summary>
All perms on all systemd units.
</summary>
@@ -114969,7 +115588,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_start_all_units" lineno="3191">
+<interface name="init_start_all_units" lineno="3387">
<summary>
Start all systemd units.
</summary>
@@ -114979,7 +115598,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_stop_all_units" lineno="3210">
+<interface name="init_stop_all_units" lineno="3406">
<summary>
Stop all systemd units.
</summary>
@@ -114989,7 +115608,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="init_reload_all_units" lineno="3229">
+<interface name="init_reload_all_units" lineno="3425">
<summary>
Reload all systemd units.
</summary>
@@ -114999,7 +115618,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="init_admin" lineno="3248">
+<interface name="init_admin" lineno="3444">
<summary>
Allow unconfined access to send instructions to init
</summary>
@@ -115009,7 +115628,7 @@ Target domain
</summary>
</param>
</interface>
-<interface name="init_getrlimit" lineno="3285">
+<interface name="init_getrlimit" lineno="3476">
<summary>
Allow getting init_t rlimit
</summary>
@@ -115033,6 +115652,13 @@ Allow all daemons the ability to read/write terminals
</p>
</desc>
</tunable>
+<tunable name="init_mounton_non_security" dftval="false">
+<desc>
+<p>
+Enable systemd to mount on all non-security files.
+</p>
+</desc>
+</tunable>
</module>
<module name="ipsec" filename="policy/modules/system/ipsec.if">
<summary>TCP/IP encryption</summary>
@@ -115171,7 +115797,7 @@ Domain allowed access.
</interface>
<interface name="ipsec_write_pid" lineno="259">
<summary>
-write the ipsec_var_run_t files.
+write the ipsec_runtime_t files.
</summary>
<param name="domain">
<summary>
@@ -115357,7 +115983,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="iptables_dontaudit_read_pids" lineno="178">
+<interface name="iptables_dontaudit_read_pids" lineno="177">
<summary>
dontaudit reading iptables_runtime_t
</summary>
@@ -115367,7 +115993,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="iptables_startstop" lineno="196">
+<interface name="iptables_startstop" lineno="195">
<summary>
Allow specified domain to start and stop iptables service
</summary>
@@ -115377,7 +116003,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="iptables_status" lineno="215">
+<interface name="iptables_status" lineno="214">
<summary>
Allow specified domain to get status of iptables service
</summary>
@@ -115387,7 +116013,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="iptables_admin" lineno="242">
+<interface name="iptables_admin" lineno="241">
<summary>
All of the rules required to
administrate an iptables
@@ -116259,7 +116885,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_relabelto_devlog_sock_files" lineno="659">
+<interface name="logging_relabelto_devlog_sock_files" lineno="663">
<summary>
Allow domain to relabelto devlog sock_files
</summary>
@@ -116270,7 +116896,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_create_devlog" lineno="677">
+<interface name="logging_create_devlog" lineno="681">
<summary>
Connect to the syslog control unix stream socket.
</summary>
@@ -116280,7 +116906,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_read_audit_config" lineno="698">
+<interface name="logging_read_audit_config" lineno="702">
<summary>
Read the auditd configuration files.
</summary>
@@ -116291,7 +116917,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_dontaudit_search_audit_config" lineno="721">
+<interface name="logging_dontaudit_search_audit_config" lineno="725">
<summary>
dontaudit search of auditd configuration files.
</summary>
@@ -116302,7 +116928,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="logging_read_syslog_config" lineno="740">
+<interface name="logging_read_syslog_config" lineno="744">
<summary>
Read syslog configuration files.
</summary>
@@ -116313,7 +116939,17 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_delete_devlog_socket" lineno="759">
+<interface name="logging_watch_runtime_dirs" lineno="762">
+<summary>
+Watch syslog runtime dirs.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="logging_delete_devlog_socket" lineno="781">
<summary>
Delete the syslog socket files
</summary>
@@ -116324,7 +116960,7 @@ Domain allowed access
</param>
<rolecap/>
</interface>
-<interface name="logging_manage_pid_sockets" lineno="777">
+<interface name="logging_manage_pid_sockets" lineno="799">
<summary>
Create, read, write, and delete syslog PID sockets.
</summary>
@@ -116334,7 +116970,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_search_logs" lineno="798">
+<interface name="logging_search_logs" lineno="820">
<summary>
Allows the domain to open a file in the
log directory, but does not allow the listing
@@ -116346,7 +116982,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_dontaudit_search_logs" lineno="818">
+<interface name="logging_dontaudit_search_logs" lineno="840">
<summary>
Do not audit attempts to search the var log directory.
</summary>
@@ -116356,7 +116992,7 @@ Domain not to audit.
</summary>
</param>
</interface>
-<interface name="logging_list_logs" lineno="836">
+<interface name="logging_list_logs" lineno="858">
<summary>
List the contents of the generic log directory (/var/log).
</summary>
@@ -116366,7 +117002,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_rw_generic_log_dirs" lineno="856">
+<interface name="logging_rw_generic_log_dirs" lineno="878">
<summary>
Read and write the generic log directory (/var/log).
</summary>
@@ -116376,7 +117012,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_search_all_logs" lineno="877">
+<interface name="logging_search_all_logs" lineno="899">
<summary>
Search through all log dirs.
</summary>
@@ -116387,7 +117023,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_setattr_all_log_dirs" lineno="896">
+<interface name="logging_setattr_all_log_dirs" lineno="918">
<summary>
Set attributes on all log dirs.
</summary>
@@ -116398,7 +117034,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_dontaudit_getattr_all_logs" lineno="915">
+<interface name="logging_dontaudit_getattr_all_logs" lineno="937">
<summary>
Do not audit attempts to get the attributes
of any log files.
@@ -116409,7 +117045,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="logging_getattr_all_logs" lineno="933">
+<interface name="logging_getattr_all_logs" lineno="955">
<summary>
Read the atttributes of any log file
</summary>
@@ -116419,7 +117055,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="logging_append_all_logs" lineno="951">
+<interface name="logging_append_all_logs" lineno="973">
<summary>
Append to all log files.
</summary>
@@ -116429,7 +117065,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_append_all_inherited_logs" lineno="972">
+<interface name="logging_append_all_inherited_logs" lineno="994">
<summary>
Append to all log files.
</summary>
@@ -116439,7 +117075,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_read_all_logs" lineno="991">
+<interface name="logging_read_all_logs" lineno="1013">
<summary>
Read all log files.
</summary>
@@ -116450,7 +117086,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_exec_all_logs" lineno="1013">
+<interface name="logging_exec_all_logs" lineno="1035">
<summary>
Execute all log files in the caller domain.
</summary>
@@ -116460,7 +117096,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_rw_all_logs" lineno="1033">
+<interface name="logging_rw_all_logs" lineno="1055">
<summary>
read/write to all log files.
</summary>
@@ -116470,7 +117106,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_manage_all_logs" lineno="1053">
+<interface name="logging_manage_all_logs" lineno="1075">
<summary>
Create, read, write, and delete all log files.
</summary>
@@ -116481,7 +117117,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_manage_generic_log_dirs" lineno="1074">
+<interface name="logging_manage_generic_log_dirs" lineno="1096">
<summary>
Create, read, write, and delete generic log directories.
</summary>
@@ -116492,7 +117128,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_relabel_generic_log_dirs" lineno="1094">
+<interface name="logging_relabel_generic_log_dirs" lineno="1116">
<summary>
Relabel from and to generic log directory type.
</summary>
@@ -116503,7 +117139,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_read_generic_logs" lineno="1114">
+<interface name="logging_read_generic_logs" lineno="1136">
<summary>
Read generic log files.
</summary>
@@ -116514,7 +117150,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_mmap_generic_logs" lineno="1135">
+<interface name="logging_mmap_generic_logs" lineno="1157">
<summary>
Map generic log files.
</summary>
@@ -116525,7 +117161,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_write_generic_logs" lineno="1153">
+<interface name="logging_write_generic_logs" lineno="1175">
<summary>
Write generic log files.
</summary>
@@ -116535,7 +117171,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_dontaudit_write_generic_logs" lineno="1174">
+<interface name="logging_dontaudit_write_generic_logs" lineno="1196">
<summary>
Dontaudit Write generic log files.
</summary>
@@ -116545,7 +117181,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="logging_rw_generic_logs" lineno="1192">
+<interface name="logging_rw_generic_logs" lineno="1214">
<summary>
Read and write generic log files.
</summary>
@@ -116555,7 +117191,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="logging_manage_generic_logs" lineno="1215">
+<interface name="logging_manage_generic_logs" lineno="1237">
<summary>
Create, read, write, and delete
generic log files.
@@ -116567,7 +117203,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_admin_audit" lineno="1241">
+<interface name="logging_admin_audit" lineno="1263">
<summary>
All of the rules required to administrate
the audit environment
@@ -116584,7 +117220,7 @@ User role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_admin_syslog" lineno="1285">
+<interface name="logging_admin_syslog" lineno="1307">
<summary>
All of the rules required to administrate
the syslog environment
@@ -116601,7 +117237,7 @@ User role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_admin" lineno="1341">
+<interface name="logging_admin" lineno="1363">
<summary>
All of the rules required to administrate
the logging environment
@@ -116618,7 +117254,7 @@ User role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="logging_syslog_managed_log_file" lineno="1364">
+<interface name="logging_syslog_managed_log_file" lineno="1386">
<summary>
Mark the type as a syslog managed log file
and introduce the proper file transition when
@@ -116636,7 +117272,7 @@ Name to use for the file
</summary>
</param>
</interface>
-<interface name="logging_syslog_managed_log_dir" lineno="1403">
+<interface name="logging_syslog_managed_log_dir" lineno="1425">
<summary>
Mark the type as a syslog managed log dir
and introduce the proper file transition when
@@ -116663,7 +117299,7 @@ Name to use for the directory
</summary>
</param>
</interface>
-<interface name="logging_mmap_journal" lineno="1425">
+<interface name="logging_mmap_journal" lineno="1447">
<summary>
Map files in /run/log/journal/ directory.
</summary>
@@ -117134,7 +117770,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_search_man_pages" lineno="603">
+<interface name="miscfiles_watch_localization" lineno="603">
+<summary>
+Watch time localization info
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="miscfiles_search_man_pages" lineno="621">
<summary>
Search man pages.
</summary>
@@ -117144,7 +117790,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_dontaudit_search_man_pages" lineno="622">
+<interface name="miscfiles_dontaudit_search_man_pages" lineno="640">
<summary>
Do not audit attempts to search man pages.
</summary>
@@ -117154,7 +117800,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="miscfiles_read_man_pages" lineno="641">
+<interface name="miscfiles_read_man_pages" lineno="659">
<summary>
Read man pages
</summary>
@@ -117165,7 +117811,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_delete_man_pages" lineno="663">
+<interface name="miscfiles_delete_man_pages" lineno="681">
<summary>
Delete man pages
</summary>
@@ -117175,7 +117821,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_manage_man_pages" lineno="685">
+<interface name="miscfiles_manage_man_pages" lineno="703">
<summary>
Create, read, write, and delete man pages
</summary>
@@ -117185,7 +117831,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_read_man_cache" lineno="706">
+<interface name="miscfiles_read_man_cache" lineno="724">
<summary>
Read man cache content.
</summary>
@@ -117195,7 +117841,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_map_man_cache" lineno="727">
+<interface name="miscfiles_map_man_cache" lineno="745">
<summary>
Map man cache content.
</summary>
@@ -117205,7 +117851,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_manage_man_cache" lineno="746">
+<interface name="miscfiles_manage_man_cache" lineno="764">
<summary>
Create, read, write, and delete
man cache content.
@@ -117216,7 +117862,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_relabel_man_cache" lineno="767">
+<interface name="miscfiles_relabel_man_cache" lineno="785">
<summary>
Relabel from and to man cache.
</summary>
@@ -117226,7 +117872,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_read_public_files" lineno="788">
+<interface name="miscfiles_read_public_files" lineno="806">
<summary>
Read public files used for file
transfer services.
@@ -117238,7 +117884,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_manage_public_files" lineno="810">
+<interface name="miscfiles_manage_public_files" lineno="828">
<summary>
Create, read, write, and delete public files
and directories used for file transfer services.
@@ -117250,7 +117896,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="miscfiles_read_tetex_data" lineno="830">
+<interface name="miscfiles_read_tetex_data" lineno="848">
<summary>
Read TeX data
</summary>
@@ -117260,7 +117906,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_exec_tetex_data" lineno="854">
+<interface name="miscfiles_exec_tetex_data" lineno="872">
<summary>
Execute TeX data programs in the caller domain.
</summary>
@@ -117270,7 +117916,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_domain_entry_test_files" lineno="879">
+<interface name="miscfiles_domain_entry_test_files" lineno="896">
<summary>
Let test files be an entry point for
a specified domain.
@@ -117281,7 +117927,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_read_test_files" lineno="897">
+<interface name="miscfiles_read_test_files" lineno="914">
<summary>
Read test files and directories.
</summary>
@@ -117291,7 +117937,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_exec_test_files" lineno="916">
+<interface name="miscfiles_exec_test_files" lineno="933">
<summary>
Execute test files.
</summary>
@@ -117301,7 +117947,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_etc_filetrans_localization" lineno="936">
+<interface name="miscfiles_etc_filetrans_localization" lineno="953">
<summary>
Create files in etc directories
with localization file type.
@@ -117312,7 +117958,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="miscfiles_manage_localization" lineno="956">
+<interface name="miscfiles_manage_localization" lineno="973">
<summary>
Create, read, write, and delete localization
</summary>
@@ -117589,7 +118235,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="mount_run" lineno="39">
+<interface name="mount_run" lineno="40">
<summary>
Execute mount in the mount domain, and
allow the specified role the mount domain,
@@ -117607,7 +118253,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="mount_exec" lineno="58">
+<interface name="mount_exec" lineno="59">
<summary>
Execute mount in the caller domain.
</summary>
@@ -117617,7 +118263,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_signal" lineno="80">
+<interface name="mount_signal" lineno="82">
<summary>
Send a generic signal to mount.
</summary>
@@ -117627,7 +118273,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_use_fds" lineno="98">
+<interface name="mount_use_fds" lineno="100">
<summary>
Use file descriptors for mount.
</summary>
@@ -117637,7 +118283,7 @@ The type of the process performing this action.
</summary>
</param>
</interface>
-<interface name="mount_domtrans_unconfined" lineno="116">
+<interface name="mount_domtrans_unconfined" lineno="118">
<summary>
Execute mount in the unconfined mount domain.
</summary>
@@ -117647,7 +118293,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="mount_run_unconfined" lineno="142">
+<interface name="mount_run_unconfined" lineno="144">
<summary>
Execute mount in the unconfined mount domain, and
allow the specified role the unconfined mount domain,
@@ -117665,7 +118311,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="mount_read_loopback_files" lineno="161">
+<interface name="mount_read_loopback_files" lineno="163">
<summary>
Read loopback filesystem image files.
</summary>
@@ -117675,7 +118321,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_rw_loopback_files" lineno="179">
+<interface name="mount_rw_loopback_files" lineno="181">
<summary>
Read and write loopback filesystem image files.
</summary>
@@ -117685,9 +118331,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_getattr_runtime_files" lineno="197">
+<interface name="mount_list_runtime" lineno="199">
<summary>
-Getattr on mount_var_run_t files
+List mount runtime files.
</summary>
<param name="domain">
<summary>
@@ -117695,7 +118341,27 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_rw_runtime_files" lineno="215">
+<interface name="mount_watch_runtime_dirs" lineno="217">
+<summary>
+Watch mount runtime dirs.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="mount_getattr_runtime_files" lineno="235">
+<summary>
+Getattr on mount_runtime_t files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="mount_rw_runtime_files" lineno="253">
<summary>
Read and write mount runtime files.
</summary>
@@ -117705,7 +118371,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="mount_rw_pipes" lineno="235">
+<interface name="mount_rw_pipes" lineno="273">
<summary>
Read and write mount unnamed pipes
</summary>
@@ -118355,7 +119021,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="seutil_manage_default_contexts" lineno="753">
+<interface name="seutil_manage_default_contexts" lineno="752">
<summary>
Create, read, write, and delete the default_contexts files.
</summary>
@@ -118365,7 +119031,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_read_file_contexts" lineno="774">
+<interface name="seutil_read_file_contexts" lineno="773">
<summary>
Read the file_contexts files.
</summary>
@@ -118376,7 +119042,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="seutil_dontaudit_read_file_contexts" lineno="796">
+<interface name="seutil_dontaudit_read_file_contexts" lineno="795">
<summary>
Do not audit attempts to read the file_contexts files.
</summary>
@@ -118387,7 +119053,7 @@ Domain to not audit.
</param>
<rolecap/>
</interface>
-<interface name="seutil_rw_file_contexts" lineno="816">
+<interface name="seutil_rw_file_contexts" lineno="815">
<summary>
Read and write the file_contexts files.
</summary>
@@ -118397,7 +119063,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_manage_file_contexts" lineno="838">
+<interface name="seutil_manage_file_contexts" lineno="837">
<summary>
Create, read, write, and delete the file_contexts files.
</summary>
@@ -118408,7 +119074,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="seutil_read_bin_policy" lineno="859">
+<interface name="seutil_read_bin_policy" lineno="858">
<summary>
Read the SELinux binary policy.
</summary>
@@ -118418,7 +119084,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_create_bin_policy" lineno="886">
+<interface name="seutil_create_bin_policy" lineno="885">
<summary>
Create the SELinux binary policy.
</summary>
@@ -118428,7 +119094,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_relabelto_bin_policy" lineno="909">
+<interface name="seutil_relabelto_bin_policy" lineno="908">
<summary>
Allow the caller to relabel a file to the binary policy type.
</summary>
@@ -118438,7 +119104,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_manage_bin_policy" lineno="930">
+<interface name="seutil_manage_bin_policy" lineno="929">
<summary>
Create, read, write, and delete the SELinux
binary policy.
@@ -118449,7 +119115,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_read_src_policy" lineno="952">
+<interface name="seutil_read_src_policy" lineno="951">
<summary>
Read SELinux policy source files.
</summary>
@@ -118459,7 +119125,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_manage_src_policy" lineno="974">
+<interface name="seutil_manage_src_policy" lineno="973">
<summary>
Create, read, write, and delete SELinux
policy source files.
@@ -118471,7 +119137,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="seutil_domtrans_semanage" lineno="995">
+<interface name="seutil_domtrans_semanage" lineno="994">
<summary>
Execute a domain transition to run semanage.
</summary>
@@ -118481,7 +119147,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="seutil_run_semanage" lineno="1023">
+<interface name="seutil_run_semanage" lineno="1022">
<summary>
Execute semanage in the semanage domain, and
allow the specified role the semanage domain,
@@ -118499,7 +119165,7 @@ Role allowed access.
</param>
<rolecap/>
</interface>
-<interface name="seutil_read_module_store" lineno="1042">
+<interface name="seutil_read_module_store" lineno="1041">
<summary>
Read the semanage module store.
</summary>
@@ -118509,7 +119175,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_manage_module_store" lineno="1067">
+<interface name="seutil_manage_module_store" lineno="1066">
<summary>
Full management of the semanage
module store.
@@ -118520,7 +119186,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_get_semanage_read_lock" lineno="1091">
+<interface name="seutil_get_semanage_read_lock" lineno="1090">
<summary>
Get read lock on module store
</summary>
@@ -118530,7 +119196,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_get_semanage_trans_lock" lineno="1110">
+<interface name="seutil_get_semanage_trans_lock" lineno="1109">
<summary>
Get trans lock on module store
</summary>
@@ -118540,7 +119206,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_libselinux_linked" lineno="1138">
+<interface name="seutil_libselinux_linked" lineno="1137">
<summary>
SELinux-enabled program access for
libselinux-linked programs.
@@ -118559,7 +119225,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="seutil_dontaudit_libselinux_linked" lineno="1168">
+<interface name="seutil_dontaudit_libselinux_linked" lineno="1167">
<summary>
Do not audit SELinux-enabled program access for
libselinux-linked programs.
@@ -119043,7 +119709,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="sysnet_use_ldap" lineno="785">
+<interface name="sysnet_use_ldap" lineno="780">
<summary>
Connect and use a LDAP server.
</summary>
@@ -119053,7 +119719,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_use_portmap" lineno="817">
+<interface name="sysnet_use_portmap" lineno="808">
<summary>
Connect and use remote port mappers.
</summary>
@@ -119063,7 +119729,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="sysnet_dhcpc_script_entry" lineno="857">
+<interface name="sysnet_dhcpc_script_entry" lineno="843">
<summary>
Make the specified program domain
accessable from the DHCP hooks/scripts.
@@ -119082,7 +119748,27 @@ The type of the file used as an entrypoint to this domain.
</module>
<module name="systemd" filename="policy/modules/system/systemd.if">
<summary>Systemd components (not PID 1)</summary>
-<interface name="systemd_log_parse_environment" lineno="14">
+<template name="systemd_role_template" lineno="23">
+<summary>
+Template for systemd --user per-role domains.
+</summary>
+<param name="prefix">
+<summary>
+Prefix for generated types
+</summary>
+</param>
+<param name="role">
+<summary>
+The user role.
+</summary>
+</param>
+<param name="userdomain">
+<summary>
+The user domain for the role.
+</summary>
+</param>
+</template>
+<interface name="systemd_log_parse_environment" lineno="74">
<summary>
Make the specified type usable as an
log parse environment type.
@@ -119093,7 +119779,30 @@ Type to be used as a log parse environment type.
</summary>
</param>
</interface>
-<interface name="systemd_read_hwdb" lineno="32">
+<interface name="systemd_use_nss" lineno="94">
+<summary>
+Allow domain to use systemd's Name Service Switch (NSS) module.
+This module provides UNIX user and group name resolution for dynamic users
+and groups allocated through the DynamicUser= option in systemd unit files
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access
+</summary>
+</param>
+</interface>
+<interface name="systemd_PrivateDevices" lineno="121">
+<summary>
+Allow domain to be used as a systemd service with a unit
+that uses PrivateDevices=yes in section [Service].
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access
+</summary>
+</param>
+</interface>
+<interface name="systemd_read_hwdb" lineno="138">
<summary>
Allow domain to read udev hwdb file
</summary>
@@ -119103,7 +119812,7 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_map_hwdb" lineno="50">
+<interface name="systemd_map_hwdb" lineno="156">
<summary>
Allow domain to map udev hwdb file
</summary>
@@ -119113,7 +119822,7 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_read_logind_pids" lineno="68">
+<interface name="systemd_read_logind_pids" lineno="174">
<summary>
Read systemd_login PID files.
</summary>
@@ -119123,7 +119832,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_logind_pid_pipes" lineno="88">
+<interface name="systemd_manage_logind_pid_pipes" lineno="194">
<summary>
Manage systemd_login PID pipes.
</summary>
@@ -119133,7 +119842,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_logind_pid_pipes" lineno="107">
+<interface name="systemd_write_logind_pid_pipes" lineno="213">
<summary>
Write systemd_login named pipe.
</summary>
@@ -119143,7 +119852,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_use_logind_fds" lineno="128">
+<interface name="systemd_use_logind_fds" lineno="234">
<summary>
Use inherited systemd
logind file descriptors.
@@ -119154,7 +119863,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_logind_sessions_files" lineno="146">
+<interface name="systemd_read_logind_sessions_files" lineno="252">
<summary>
Read logind sessions files.
</summary>
@@ -119164,7 +119873,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="167">
+<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="273">
<summary>
Write inherited logind sessions pipes.
</summary>
@@ -119174,7 +119883,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="187">
+<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="293">
<summary>
Write inherited logind inhibit pipes.
</summary>
@@ -119184,7 +119893,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_dbus_chat_logind" lineno="208">
+<interface name="systemd_dbus_chat_logind" lineno="314">
<summary>
Send and receive messages from
systemd logind over dbus.
@@ -119195,7 +119904,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_write_kmod_files" lineno="229">
+<interface name="systemd_write_kmod_files" lineno="335">
<summary>
Allow process to write to systemd_kmod_conf_t.
</summary>
@@ -119206,7 +119915,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="systemd_status_logind" lineno="243">
+<interface name="systemd_status_logind" lineno="349">
<summary>
Get the system status information from systemd_login
</summary>
@@ -119216,7 +119925,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_signull_logind" lineno="262">
+<interface name="systemd_signull_logind" lineno="368">
<summary>
Send systemd_login a null signal.
</summary>
@@ -119226,7 +119935,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_machines" lineno="280">
+<interface name="systemd_read_machines" lineno="386">
<summary>
Allow reading /run/systemd/machines
</summary>
@@ -119236,7 +119945,7 @@ Domain that can access the machines files
</summary>
</param>
</interface>
-<interface name="systemd_dbus_chat_hostnamed" lineno="300">
+<interface name="systemd_dbus_chat_hostnamed" lineno="406">
<summary>
Send and receive messages from
systemd hostnamed over dbus.
@@ -119247,7 +119956,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_use_passwd_agent_fds" lineno="320">
+<interface name="systemd_use_passwd_agent_fds" lineno="426">
<summary>
allow systemd_passwd_agent to inherit fds
</summary>
@@ -119257,7 +119966,7 @@ Domain that owns the fds
</summary>
</param>
</interface>
-<interface name="systemd_use_passwd_agent" lineno="339">
+<interface name="systemd_use_passwd_agent" lineno="445">
<summary>
Allow a systemd_passwd_agent_t process to interact with a daemon
that needs a password from the sysadmin.
@@ -119268,9 +119977,9 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="363">
+<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="469">
<summary>
-Transition to systemd_passwd_var_run_t when creating dirs
+Transition to systemd_passwd_runtime_t when creating dirs
</summary>
<param name="domain">
<summary>
@@ -119278,7 +119987,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_passwd_runtime_symlinks" lineno="382">
+<interface name="systemd_manage_passwd_runtime_symlinks" lineno="488">
<summary>
Allow to domain to create systemd-passwd symlink
</summary>
@@ -119288,7 +119997,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_all_units" lineno="400">
+<interface name="systemd_manage_all_units" lineno="506">
<summary>
manage systemd unit dirs and the files in them
</summary>
@@ -119298,7 +120007,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_journal_files" lineno="420">
+<interface name="systemd_read_journal_files" lineno="526">
<summary>
Allow domain to read systemd_journal_t files
</summary>
@@ -119308,7 +120017,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_journal_files" lineno="439">
+<interface name="systemd_manage_journal_files" lineno="545">
<summary>
Allow domain to create/manage systemd_journal_t files
</summary>
@@ -119318,7 +120027,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelto_journal_dirs" lineno="459">
+<interface name="systemd_relabelto_journal_dirs" lineno="565">
<summary>
Relabel to systemd-journald directory type.
</summary>
@@ -119328,7 +120037,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelto_journal_files" lineno="478">
+<interface name="systemd_relabelto_journal_files" lineno="584">
<summary>
Relabel to systemd-journald file type.
</summary>
@@ -119338,7 +120047,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_networkd_units" lineno="498">
+<interface name="systemd_read_networkd_units" lineno="604">
<summary>
Allow domain to read systemd_networkd_t unit files
</summary>
@@ -119348,7 +120057,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_manage_networkd_units" lineno="518">
+<interface name="systemd_manage_networkd_units" lineno="624">
<summary>
Allow domain to create/manage systemd_networkd_t unit files
</summary>
@@ -119358,7 +120067,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_enabledisable_networkd" lineno="538">
+<interface name="systemd_enabledisable_networkd" lineno="644">
<summary>
Allow specified domain to enable systemd-networkd units
</summary>
@@ -119368,7 +120077,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_startstop_networkd" lineno="557">
+<interface name="systemd_startstop_networkd" lineno="663">
<summary>
Allow specified domain to start systemd-networkd units
</summary>
@@ -119378,7 +120087,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_status_networkd" lineno="576">
+<interface name="systemd_status_networkd" lineno="682">
<summary>
Allow specified domain to get status of systemd-networkd
</summary>
@@ -119388,7 +120097,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="595">
+<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="701">
<summary>
Relabel systemd_networkd tun socket.
</summary>
@@ -119398,7 +120107,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="613">
+<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="719">
<summary>
Read/Write from systemd_networkd netlink route socket.
</summary>
@@ -119408,7 +120117,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_list_networkd_runtime" lineno="631">
+<interface name="systemd_list_networkd_runtime" lineno="737">
<summary>
Allow domain to list dirs under /run/systemd/netif
</summary>
@@ -119418,7 +120127,17 @@ domain permitted the access
</summary>
</param>
</interface>
-<interface name="systemd_read_networkd_runtime" lineno="651">
+<interface name="systemd_watch_networkd_runtime_dirs" lineno="756">
+<summary>
+Watch directories under /run/systemd/netif
+</summary>
+<param name="domain">
+<summary>
+Domain permitted the access
+</summary>
+</param>
+</interface>
+<interface name="systemd_read_networkd_runtime" lineno="775">
<summary>
Allow domain to read files generated by systemd_networkd
</summary>
@@ -119428,7 +120147,7 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_read_logind_state" lineno="670">
+<interface name="systemd_read_logind_state" lineno="794">
<summary>
Allow systemd_logind_t to read process state for cgroup file
</summary>
@@ -119438,7 +120157,7 @@ Domain systemd_logind_t may access.
</summary>
</param>
</interface>
-<interface name="systemd_start_power_units" lineno="689">
+<interface name="systemd_start_power_units" lineno="813">
<summary>
Allow specified domain to start power units
</summary>
@@ -119448,7 +120167,17 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="systemd_tmpfiles_conf_file" lineno="709">
+<interface name="systemd_status_power_units" lineno="832">
+<summary>
+Get the system status information about power units
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_tmpfiles_conf_file" lineno="852">
<summary>
Make the specified type usable for
systemd tmpfiles config files.
@@ -119459,7 +120188,7 @@ Type to be used for systemd tmpfiles config files.
</summary>
</param>
</interface>
-<interface name="systemd_tmpfiles_creator" lineno="730">
+<interface name="systemd_tmpfiles_creator" lineno="873">
<summary>
Allow the specified domain to create
the tmpfiles config directory with
@@ -119471,7 +120200,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_tmpfiles_conf_filetrans" lineno="766">
+<interface name="systemd_tmpfiles_conf_filetrans" lineno="909">
<summary>
Create an object in the systemd tmpfiles config
directory, with a private type
@@ -119498,7 +120227,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="systemd_list_tmpfiles_conf" lineno="785">
+<interface name="systemd_list_tmpfiles_conf" lineno="928">
<summary>
Allow domain to list systemd tmpfiles config directory
</summary>
@@ -119508,7 +120237,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="803">
+<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="946">
<summary>
Allow domain to relabel to systemd tmpfiles config directory
</summary>
@@ -119518,7 +120247,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="821">
+<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="964">
<summary>
Allow domain to relabel to systemd tmpfiles config files
</summary>
@@ -119528,7 +120257,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_tmpfilesd_managed" lineno="844">
+<interface name="systemd_tmpfilesd_managed" lineno="987">
<summary>
Allow systemd_tmpfiles_t to manage filesystem objects
</summary>
@@ -119543,7 +120272,7 @@ object class to manage
</summary>
</param>
</interface>
-<interface name="systemd_dbus_chat_resolved" lineno="863">
+<interface name="systemd_dbus_chat_resolved" lineno="1006">
<summary>
Send and receive messages from
systemd resolved over dbus.
@@ -119554,7 +120283,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="systemd_read_resolved_runtime" lineno="883">
+<interface name="systemd_read_resolved_runtime" lineno="1026">
<summary>
Allow domain to read resolv.conf file generated by systemd_resolved
</summary>
@@ -119564,7 +120293,7 @@ domain allowed access
</summary>
</param>
</interface>
-<interface name="systemd_getattr_updated_runtime" lineno="901">
+<interface name="systemd_getattr_updated_runtime" lineno="1044">
<summary>
Allow domain to getattr on .updated file (generated by systemd-update-done
</summary>
@@ -119574,6 +120303,36 @@ domain allowed access
</summary>
</param>
</interface>
+<interface name="systemd_search_all_user_keys" lineno="1062">
+<summary>
+Search keys for the all systemd --user domains.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_create_all_user_keys" lineno="1080">
+<summary>
+Create keys for the all systemd --user domains.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="systemd_write_all_user_keys" lineno="1098">
+<summary>
+Write keys for the all systemd --user domains.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
<tunable name="systemd_tmpfiles_manage_all" dftval="false">
<desc>
<p>
@@ -119589,10 +120348,19 @@ as parent environment
</p>
</desc>
</tunable>
+<tunable name="systemd_logind_get_bootloader" dftval="false">
+<desc>
+<p>
+Allow systemd-logind to interact with the bootloader (read which one is
+installed on fixed disks, enumerate entries for dbus property
+BootLoaderEntries, etc.)
+</p>
+</desc>
+</tunable>
</module>
<module name="tmpfiles" filename="policy/modules/system/tmpfiles.if">
<summary>Policy for tmpfiles, a boot-time temporary file handler</summary>
-<interface name="tmpfiles_read_var_run" lineno="13">
+<interface name="tmpfiles_read_runtime" lineno="13">
<summary>
Read resources in /run/tmpfiles.d/.
</summary>
@@ -119602,7 +120370,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="tmpfiles_create_var_run_files" lineno="33">
+<interface name="tmpfiles_create_runtime_files" lineno="33">
<summary>
Create files in /run/tmpfiles.d/.
</summary>
@@ -119612,7 +120380,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="tmpfiles_write_var_run_files" lineno="53">
+<interface name="tmpfiles_write_runtime_files" lineno="53">
<summary>
Write to files in /run/tmpfiles.d/.
</summary>
@@ -119622,7 +120390,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="tmpfiles_manage_var_run_files" lineno="73">
+<interface name="tmpfiles_manage_runtime_files" lineno="73">
<summary>
Manage files in /run/tmpfiles.d/.
</summary>
@@ -119960,7 +120728,7 @@ Domain allowed access.
</interface>
<interface name="udev_generic_pid_filetrans_run_dirs" lineno="517">
<summary>
-Write dirs in /var/run with the udev_var_run file type.
+Write dirs in /var/run with the udev_runtime file type.
This method is deprecated in favor of the init_daemon_run_dir call.
</summary>
<param name="domain">
@@ -120297,7 +121065,17 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="unconfined_create_keys" lineno="501">
+<interface name="unconfined_search_keys" lineno="501">
+<summary>
+Search keys for the unconfined domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="unconfined_create_keys" lineno="519">
<summary>
Create keys for the unconfined domain.
</summary>
@@ -120307,7 +121085,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="unconfined_dbus_send" lineno="519">
+<interface name="unconfined_write_keys" lineno="537">
+<summary>
+Write keys for the unconfined domain.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="unconfined_dbus_send" lineno="555">
<summary>
Send messages to the unconfined domain over dbus.
</summary>
@@ -120317,7 +121105,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="unconfined_dbus_chat" lineno="539">
+<interface name="unconfined_dbus_chat" lineno="575">
<summary>
Send and receive messages from
unconfined_t over dbus.
@@ -120328,7 +121116,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="unconfined_dbus_connect" lineno="560">
+<interface name="unconfined_dbus_connect" lineno="596">
<summary>
Connect to the the unconfined DBUS
for service (acquire_svc).
@@ -120510,7 +121298,7 @@ is the prefix for user_t).
</param>
<rolebase/>
</template>
-<template name="userdom_change_password_template" lineno="549">
+<template name="userdom_change_password_template" lineno="547">
<summary>
The template for allowing the user to change passwords.
</summary>
@@ -120522,7 +121310,7 @@ is the prefix for user_t).
</param>
<rolebase/>
</template>
-<template name="userdom_common_user_template" lineno="579">
+<template name="userdom_common_user_template" lineno="577">
<summary>
The template containing rules common to unprivileged
users and administrative users.
@@ -120540,7 +121328,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="userdom_login_user_template" lineno="903">
+<template name="userdom_login_user_template" lineno="906">
<summary>
The template for creating a login user.
</summary>
@@ -120558,7 +121346,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="userdom_restricted_user_template" lineno="1026">
+<template name="userdom_restricted_user_template" lineno="1029">
<summary>
The template for creating a unprivileged login user.
</summary>
@@ -120576,7 +121364,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="userdom_restricted_xwindows_user_template" lineno="1067">
+<template name="userdom_restricted_xwindows_user_template" lineno="1070">
<summary>
The template for creating a unprivileged xwindows login user.
</summary>
@@ -120597,7 +121385,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="userdom_unpriv_user_template" lineno="1154">
+<template name="userdom_unpriv_user_template" lineno="1157">
<summary>
The template for creating a unprivileged user roughly
equivalent to a regular linux user.
@@ -120620,7 +121408,7 @@ is the prefix for user_t).
</summary>
</param>
</template>
-<template name="userdom_admin_user_template" lineno="1252">
+<template name="userdom_admin_user_template" lineno="1255">
<summary>
The template for creating an administrative user.
</summary>
@@ -120649,7 +121437,7 @@ is the prefix for sysadm_t).
</summary>
</param>
</template>
-<template name="userdom_security_admin_template" lineno="1426">
+<template name="userdom_security_admin_template" lineno="1429">
<summary>
Allow user to run as a secadm
</summary>
@@ -120675,7 +121463,7 @@ The role of the object to create.
</summary>
</param>
</template>
-<interface name="userdom_user_application_type" lineno="1506">
+<interface name="userdom_user_application_type" lineno="1509">
<summary>
Make the specified type usable as
a user application domain type.
@@ -120686,7 +121474,7 @@ Type to be used as a user application domain.
</summary>
</param>
</interface>
-<interface name="userdom_user_application_domain" lineno="1527">
+<interface name="userdom_user_application_domain" lineno="1530">
<summary>
Make the specified type usable as
a user application domain.
@@ -120702,7 +121490,7 @@ Type to be used as the domain entry point.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_content" lineno="1544">
+<interface name="userdom_user_home_content" lineno="1547">
<summary>
Make the specified type usable in a
user home directory.
@@ -120714,7 +121502,7 @@ user home directory.
</summary>
</param>
</interface>
-<interface name="userdom_user_tmp_file" lineno="1570">
+<interface name="userdom_user_tmp_file" lineno="1573">
<summary>
Make the specified type usable as a
user temporary file.
@@ -120726,7 +121514,7 @@ temporary directories.
</summary>
</param>
</interface>
-<interface name="userdom_user_tmpfs_file" lineno="1587">
+<interface name="userdom_user_tmpfs_file" lineno="1590">
<summary>
Make the specified type usable as a
user tmpfs file.
@@ -120738,7 +121526,7 @@ tmpfs directories.
</summary>
</param>
</interface>
-<interface name="userdom_attach_admin_tun_iface" lineno="1602">
+<interface name="userdom_attach_admin_tun_iface" lineno="1605">
<summary>
Allow domain to attach to TUN devices created by administrative users.
</summary>
@@ -120748,7 +121536,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_setattr_user_ptys" lineno="1621">
+<interface name="userdom_setattr_user_ptys" lineno="1624">
<summary>
Set the attributes of a user pty.
</summary>
@@ -120758,7 +121546,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_create_user_pty" lineno="1639">
+<interface name="userdom_create_user_pty" lineno="1642">
<summary>
Create a user pty.
</summary>
@@ -120768,7 +121556,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_getattr_user_home_dirs" lineno="1657">
+<interface name="userdom_getattr_user_home_dirs" lineno="1660">
<summary>
Get the attributes of user home directories.
</summary>
@@ -120778,7 +121566,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1676">
+<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1679">
<summary>
Do not audit attempts to get the attributes of user home directories.
</summary>
@@ -120788,7 +121576,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_search_user_home_dirs" lineno="1694">
+<interface name="userdom_search_user_home_dirs" lineno="1697">
<summary>
Search user home directories.
</summary>
@@ -120798,7 +121586,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1721">
+<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1724">
<summary>
Do not audit attempts to search user home directories.
</summary>
@@ -120816,7 +121604,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="userdom_list_user_home_dirs" lineno="1739">
+<interface name="userdom_list_user_home_dirs" lineno="1742">
<summary>
List user home directories.
</summary>
@@ -120826,7 +121614,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1758">
+<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1761">
<summary>
Do not audit attempts to list user home subdirectories.
</summary>
@@ -120836,7 +121624,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_create_user_home_dirs" lineno="1776">
+<interface name="userdom_create_user_home_dirs" lineno="1779">
<summary>
Create user home directories.
</summary>
@@ -120846,7 +121634,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_dirs" lineno="1794">
+<interface name="userdom_manage_user_home_dirs" lineno="1797">
<summary>
Manage user home directories.
</summary>
@@ -120856,7 +121644,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabelto_user_home_dirs" lineno="1812">
+<interface name="userdom_relabelto_user_home_dirs" lineno="1815">
<summary>
Relabel to user home directories.
</summary>
@@ -120866,7 +121654,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_home_filetrans_user_home_dir" lineno="1836">
+<interface name="userdom_home_filetrans_user_home_dir" lineno="1839">
<summary>
Create directories in the home dir root with
the user home directory type.
@@ -120882,7 +121670,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_domtrans" lineno="1873">
+<interface name="userdom_user_home_domtrans" lineno="1876">
<summary>
Do a domain transition to the specified
domain when executing a program in the
@@ -120911,7 +121699,7 @@ Domain to transition to.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_search_user_home_content" lineno="1893">
+<interface name="userdom_dontaudit_search_user_home_content" lineno="1896">
<summary>
Do not audit attempts to search user home content directories.
</summary>
@@ -120921,7 +121709,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_list_all_user_home_content" lineno="1911">
+<interface name="userdom_list_all_user_home_content" lineno="1914">
<summary>
List all users home content directories.
</summary>
@@ -120931,7 +121719,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_list_user_home_content" lineno="1930">
+<interface name="userdom_list_user_home_content" lineno="1933">
<summary>
List contents of users home directory.
</summary>
@@ -120941,7 +121729,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_dirs" lineno="1949">
+<interface name="userdom_manage_user_home_content_dirs" lineno="1952">
<summary>
Create, read, write, and delete directories
in a user home subdirectory.
@@ -120952,7 +121740,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_home_content_dirs" lineno="1968">
+<interface name="userdom_delete_all_user_home_content_dirs" lineno="1971">
<summary>
Delete all user home content directories.
</summary>
@@ -120962,7 +121750,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_home_content_dirs" lineno="1988">
+<interface name="userdom_delete_user_home_content_dirs" lineno="1991">
<summary>
Delete directories in a user home subdirectory.
</summary>
@@ -120972,7 +121760,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2006">
+<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2009">
<summary>
Set attributes of all user home content directories.
</summary>
@@ -120982,7 +121770,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2026">
+<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2029">
<summary>
Do not audit attempts to set the
attributes of user home files.
@@ -120993,7 +121781,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_map_user_home_content_files" lineno="2044">
+<interface name="userdom_map_user_home_content_files" lineno="2047">
<summary>
Map user home files.
</summary>
@@ -121003,7 +121791,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_mmap_user_home_content_files" lineno="2062">
+<interface name="userdom_mmap_user_home_content_files" lineno="2065">
<summary>
Mmap user home files.
</summary>
@@ -121013,7 +121801,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_home_content_files" lineno="2081">
+<interface name="userdom_read_user_home_content_files" lineno="2084">
<summary>
Read user home files.
</summary>
@@ -121023,7 +121811,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2100">
+<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2103">
<summary>
Do not audit attempts to read user home files.
</summary>
@@ -121033,7 +121821,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_all_user_home_content" lineno="2119">
+<interface name="userdom_read_all_user_home_content" lineno="2122">
<summary>
Read all user home content, including application-specific resources.
</summary>
@@ -121043,7 +121831,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="userdom_manage_all_user_home_content" lineno="2141">
+<interface name="userdom_manage_all_user_home_content" lineno="2144">
<summary>
Manage all user home content, including application-specific resources.
</summary>
@@ -121053,7 +121841,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2163">
+<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2166">
<summary>
Do not audit attempts to append user home files.
</summary>
@@ -121063,7 +121851,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2181">
+<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2184">
<summary>
Do not audit attempts to write user home files.
</summary>
@@ -121073,7 +121861,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_home_content_files" lineno="2199">
+<interface name="userdom_delete_all_user_home_content_files" lineno="2202">
<summary>
Delete all user home content files.
</summary>
@@ -121083,7 +121871,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_home_content_files" lineno="2219">
+<interface name="userdom_delete_user_home_content_files" lineno="2222">
<summary>
Delete files in a user home subdirectory.
</summary>
@@ -121093,7 +121881,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2237">
+<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2240">
<summary>
Do not audit attempts to relabel user home files.
</summary>
@@ -121103,7 +121891,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_home_content_symlinks" lineno="2255">
+<interface name="userdom_read_user_home_content_symlinks" lineno="2258">
<summary>
Read user home subdirectory symbolic links.
</summary>
@@ -121113,7 +121901,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_exec_user_home_content_files" lineno="2275">
+<interface name="userdom_exec_user_home_content_files" lineno="2278">
<summary>
Execute user home files.
</summary>
@@ -121124,7 +121912,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2302">
+<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2305">
<summary>
Do not audit attempts to execute user home files.
</summary>
@@ -121134,7 +121922,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_files" lineno="2321">
+<interface name="userdom_manage_user_home_content_files" lineno="2324">
<summary>
Create, read, write, and delete files
in a user home subdirectory.
@@ -121145,7 +121933,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2342">
+<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2345">
<summary>
Do not audit attempts to create, read, write, and delete directories
in a user home subdirectory.
@@ -121156,7 +121944,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_symlinks" lineno="2361">
+<interface name="userdom_manage_user_home_content_symlinks" lineno="2364">
<summary>
Create, read, write, and delete symbolic links
in a user home subdirectory.
@@ -121167,7 +121955,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2381">
+<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2384">
<summary>
Delete all user home content symbolic links.
</summary>
@@ -121177,7 +121965,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_home_content_symlinks" lineno="2401">
+<interface name="userdom_delete_user_home_content_symlinks" lineno="2404">
<summary>
Delete symbolic links in a user home directory.
</summary>
@@ -121187,7 +121975,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_pipes" lineno="2420">
+<interface name="userdom_manage_user_home_content_pipes" lineno="2423">
<summary>
Create, read, write, and delete named pipes
in a user home subdirectory.
@@ -121198,7 +121986,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_home_content_sockets" lineno="2441">
+<interface name="userdom_manage_user_home_content_sockets" lineno="2444">
<summary>
Create, read, write, and delete named sockets
in a user home subdirectory.
@@ -121209,7 +121997,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_dir_filetrans" lineno="2478">
+<interface name="userdom_user_home_dir_filetrans" lineno="2481">
<summary>
Create objects in a user home directory
with an automatic type transition to
@@ -121236,7 +122024,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_content_filetrans" lineno="2515">
+<interface name="userdom_user_home_content_filetrans" lineno="2518">
<summary>
Create objects in a directory located
in a user home directory with an
@@ -121264,7 +122052,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2546">
+<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2549">
<summary>
Automatically use the user_cert_t label for selected resources
created in a users home directory
@@ -121285,7 +122073,7 @@ Name of the resource that is being created
</summary>
</param>
</interface>
-<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2576">
+<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2579">
<summary>
Create objects in a user home directory
with an automatic type transition to
@@ -121307,7 +122095,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_certs" lineno="2596">
+<interface name="userdom_read_user_certs" lineno="2599">
<summary>
Read user SSL certificates.
</summary>
@@ -121318,7 +122106,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="userdom_dontaudit_manage_user_certs" lineno="2619">
+<interface name="userdom_dontaudit_manage_user_certs" lineno="2622">
<summary>
Do not audit attempts to manage
the user SSL certificates.
@@ -121330,7 +122118,7 @@ Domain allowed access.
</param>
<rolecap/>
</interface>
-<interface name="userdom_manage_user_certs" lineno="2639">
+<interface name="userdom_manage_user_certs" lineno="2642">
<summary>
Manage user SSL certificates.
</summary>
@@ -121340,7 +122128,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_write_user_tmp_sockets" lineno="2660">
+<interface name="userdom_write_user_tmp_sockets" lineno="2663">
<summary>
Write to user temporary named sockets.
</summary>
@@ -121350,7 +122138,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_list_user_tmp" lineno="2680">
+<interface name="userdom_list_user_tmp" lineno="2683">
<summary>
List user temporary directories.
</summary>
@@ -121360,7 +122148,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_list_user_tmp" lineno="2702">
+<interface name="userdom_dontaudit_list_user_tmp" lineno="2705">
<summary>
Do not audit attempts to list user
temporary directories.
@@ -121371,7 +122159,17 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2721">
+<interface name="userdom_delete_user_tmp_dirs" lineno="2723">
+<summary>
+Delete users temporary directories.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2742">
<summary>
Do not audit attempts to manage users
temporary directories.
@@ -121382,7 +122180,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_tmp_files" lineno="2739">
+<interface name="userdom_read_user_tmp_files" lineno="2760">
<summary>
Read user temporary files.
</summary>
@@ -121392,7 +122190,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_map_user_tmp_files" lineno="2760">
+<interface name="userdom_map_user_tmp_files" lineno="2781">
<summary>
Map user temporary files.
</summary>
@@ -121402,7 +122200,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_read_user_tmp_files" lineno="2779">
+<interface name="userdom_dontaudit_read_user_tmp_files" lineno="2800">
<summary>
Do not audit attempts to read users
temporary files.
@@ -121413,7 +122211,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_append_user_tmp_files" lineno="2798">
+<interface name="userdom_dontaudit_append_user_tmp_files" lineno="2819">
<summary>
Do not audit attempts to append users
temporary files.
@@ -121424,7 +122222,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_rw_user_tmp_files" lineno="2816">
+<interface name="userdom_rw_user_tmp_files" lineno="2837">
<summary>
Read and write user temporary files.
</summary>
@@ -121434,7 +122232,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="2838">
+<interface name="userdom_delete_user_tmp_files" lineno="2858">
+<summary>
+Delete users temporary files.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="2877">
<summary>
Do not audit attempts to manage users
temporary files.
@@ -121445,7 +122253,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_tmp_symlinks" lineno="2856">
+<interface name="userdom_read_user_tmp_symlinks" lineno="2895">
<summary>
Read user temporary symbolic links.
</summary>
@@ -121455,7 +122263,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_dirs" lineno="2878">
+<interface name="userdom_delete_user_tmp_symlinks" lineno="2916">
+<summary>
+Delete users temporary symbolic links.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="userdom_manage_user_tmp_dirs" lineno="2935">
<summary>
Create, read, write, and delete user
temporary directories.
@@ -121466,7 +122284,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_files" lineno="2899">
+<interface name="userdom_delete_user_tmp_named_pipes" lineno="2955">
+<summary>
+Delete users temporary named pipes.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="userdom_manage_user_tmp_files" lineno="2974">
<summary>
Create, read, write, and delete user
temporary files.
@@ -121477,7 +122305,17 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_symlinks" lineno="2920">
+<interface name="userdom_delete_user_tmp_named_sockets" lineno="2994">
+<summary>
+Delete users temporary named sockets.
+</summary>
+<param name="domain">
+<summary>
+Domain allowed access.
+</summary>
+</param>
+</interface>
+<interface name="userdom_manage_user_tmp_symlinks" lineno="3013">
<summary>
Create, read, write, and delete user
temporary symbolic links.
@@ -121488,7 +122326,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_pipes" lineno="2941">
+<interface name="userdom_manage_user_tmp_pipes" lineno="3034">
<summary>
Create, read, write, and delete user
temporary named pipes.
@@ -121499,7 +122337,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_sockets" lineno="2962">
+<interface name="userdom_manage_user_tmp_sockets" lineno="3055">
<summary>
Create, read, write, and delete user
temporary named sockets.
@@ -121510,7 +122348,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_user_tmp_filetrans" lineno="2999">
+<interface name="userdom_user_tmp_filetrans" lineno="3092">
<summary>
Create objects in a user temporary directory
with an automatic type transition to
@@ -121537,7 +122375,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_tmp_filetrans_user_tmp" lineno="3031">
+<interface name="userdom_tmp_filetrans_user_tmp" lineno="3124">
<summary>
Create objects in the temporary directory
with an automatic type transition to
@@ -121559,7 +122397,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_map_user_tmpfs_files" lineno="3049">
+<interface name="userdom_map_user_tmpfs_files" lineno="3142">
<summary>
Map user tmpfs files.
</summary>
@@ -121569,7 +122407,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_read_user_tmpfs_files" lineno="3067">
+<interface name="userdom_read_user_tmpfs_files" lineno="3160">
<summary>
Read user tmpfs files.
</summary>
@@ -121579,7 +122417,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3087">
+<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3180">
<summary>
dontaudit Read attempts of user tmpfs files.
</summary>
@@ -121589,7 +122427,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3106">
+<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3199">
<summary>
relabel to/from user tmpfs dirs
</summary>
@@ -121599,7 +122437,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_user_tmpfs_files" lineno="3125">
+<interface name="userdom_relabel_user_tmpfs_files" lineno="3218">
<summary>
relabel to/from user tmpfs files
</summary>
@@ -121609,7 +122447,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_user_runtime_content" lineno="3147">
+<interface name="userdom_user_runtime_content" lineno="3240">
<summary>
Make the specified type usable in
the directory /run/user/%{USERID}/.
@@ -121621,7 +122459,7 @@ user_runtime_content_dir_t.
</summary>
</param>
</interface>
-<interface name="userdom_search_user_runtime" lineno="3167">
+<interface name="userdom_search_user_runtime" lineno="3260">
<summary>
Search users runtime directories.
</summary>
@@ -121631,7 +122469,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_search_user_runtime_root" lineno="3186">
+<interface name="userdom_search_user_runtime_root" lineno="3279">
<summary>
Search user runtime root directories.
</summary>
@@ -121641,7 +122479,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_runtime_root_dirs" lineno="3206">
+<interface name="userdom_manage_user_runtime_root_dirs" lineno="3299">
<summary>
Create, read, write, and delete user
runtime root dirs.
@@ -121652,7 +122490,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3225">
+<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3318">
<summary>
Relabel to and from user runtime root dirs.
</summary>
@@ -121662,7 +122500,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_runtime_dirs" lineno="3244">
+<interface name="userdom_manage_user_runtime_dirs" lineno="3337">
<summary>
Create, read, write, and delete user
runtime dirs.
@@ -121673,7 +122511,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_mounton_user_runtime_dirs" lineno="3264">
+<interface name="userdom_mounton_user_runtime_dirs" lineno="3357">
<summary>
Mount a filesystem on user runtime dir
directories.
@@ -121684,7 +122522,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabelto_user_runtime_dirs" lineno="3282">
+<interface name="userdom_relabelto_user_runtime_dirs" lineno="3375">
<summary>
Relabel to user runtime directories.
</summary>
@@ -121694,7 +122532,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3300">
+<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3393">
<summary>
Relabel from user runtime directories.
</summary>
@@ -121704,7 +122542,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_runtime_files" lineno="3318">
+<interface name="userdom_delete_user_runtime_files" lineno="3411">
<summary>
delete user runtime files
</summary>
@@ -121714,7 +122552,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_search_all_user_runtime" lineno="3337">
+<interface name="userdom_search_all_user_runtime" lineno="3430">
<summary>
Search users runtime directories.
</summary>
@@ -121724,7 +122562,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_list_all_user_runtime" lineno="3356">
+<interface name="userdom_list_all_user_runtime" lineno="3449">
<summary>
List user runtime directories.
</summary>
@@ -121734,7 +122572,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_dirs" lineno="3375">
+<interface name="userdom_delete_all_user_runtime_dirs" lineno="3468">
<summary>
delete user runtime directories
</summary>
@@ -121744,7 +122582,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_files" lineno="3393">
+<interface name="userdom_delete_all_user_runtime_files" lineno="3486">
<summary>
delete user runtime files
</summary>
@@ -121754,7 +122592,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3412">
+<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3505">
<summary>
delete user runtime symlink files
</summary>
@@ -121764,7 +122602,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3431">
+<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3524">
<summary>
delete user runtime fifo files
</summary>
@@ -121774,7 +122612,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3450">
+<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3543">
<summary>
delete user runtime socket files
</summary>
@@ -121784,7 +122622,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3481">
+<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3574">
<summary>
Create objects in the pid directory
with an automatic type transition to
@@ -121806,7 +122644,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_runtime_filetrans" lineno="3517">
+<interface name="userdom_user_runtime_filetrans" lineno="3610">
<summary>
Create objects in a user runtime
directory with an automatic type
@@ -121834,7 +122672,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3548">
+<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3641">
<summary>
Create objects in the user runtime directory
with an automatic type transition to
@@ -121856,7 +122694,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="3578">
+<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="3671">
<summary>
Create objects in the user runtime root
directory with an automatic type transition
@@ -121878,7 +122716,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_user_run_filetrans_user_runtime" lineno="3609">
+<interface name="userdom_user_run_filetrans_user_runtime" lineno="3702">
<summary>
Create objects in the user runtime root
directory with an automatic type transition
@@ -121900,7 +122738,7 @@ The name of the object being created.
</summary>
</param>
</interface>
-<interface name="userdom_rw_user_tmpfs_files" lineno="3627">
+<interface name="userdom_rw_user_tmpfs_files" lineno="3720">
<summary>
Read and write user tmpfs files.
</summary>
@@ -121910,7 +122748,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_delete_user_tmpfs_files" lineno="3648">
+<interface name="userdom_delete_user_tmpfs_files" lineno="3741">
<summary>
Delete user tmpfs files.
</summary>
@@ -121920,7 +122758,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmpfs_files" lineno="3667">
+<interface name="userdom_manage_user_tmpfs_files" lineno="3760">
<summary>
Create, read, write, and delete user tmpfs files.
</summary>
@@ -121930,7 +122768,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_getattr_user_ttys" lineno="3687">
+<interface name="userdom_getattr_user_ttys" lineno="3780">
<summary>
Get the attributes of a user domain tty.
</summary>
@@ -121940,7 +122778,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_getattr_user_ttys" lineno="3705">
+<interface name="userdom_dontaudit_getattr_user_ttys" lineno="3798">
<summary>
Do not audit attempts to get the attributes of a user domain tty.
</summary>
@@ -121950,7 +122788,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_setattr_user_ttys" lineno="3723">
+<interface name="userdom_setattr_user_ttys" lineno="3816">
<summary>
Set the attributes of a user domain tty.
</summary>
@@ -121960,7 +122798,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_setattr_user_ttys" lineno="3741">
+<interface name="userdom_dontaudit_setattr_user_ttys" lineno="3834">
<summary>
Do not audit attempts to set the attributes of a user domain tty.
</summary>
@@ -121970,7 +122808,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_use_user_ttys" lineno="3759">
+<interface name="userdom_use_user_ttys" lineno="3852">
<summary>
Read and write a user domain tty.
</summary>
@@ -121980,7 +122818,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_use_user_ptys" lineno="3777">
+<interface name="userdom_use_user_ptys" lineno="3870">
<summary>
Read and write a user domain pty.
</summary>
@@ -121990,7 +122828,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_use_inherited_user_terminals" lineno="3812">
+<interface name="userdom_use_inherited_user_terminals" lineno="3905">
<summary>
Read and write a user TTYs and PTYs.
</summary>
@@ -122016,7 +122854,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="userdom_use_user_terminals" lineno="3853">
+<interface name="userdom_use_user_terminals" lineno="3946">
<summary>
Read, write and open a user TTYs and PTYs.
</summary>
@@ -122048,7 +122886,7 @@ Domain allowed access.
</param>
<infoflow type="both" weight="10"/>
</interface>
-<interface name="userdom_dontaudit_use_user_terminals" lineno="3869">
+<interface name="userdom_dontaudit_use_user_terminals" lineno="3962">
<summary>
Do not audit attempts to read and write
a user domain tty and pty.
@@ -122059,7 +122897,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_spec_domtrans_all_users" lineno="3890">
+<interface name="userdom_spec_domtrans_all_users" lineno="3983">
<summary>
Execute a shell in all user domains. This
is an explicit transition, requiring the
@@ -122071,7 +122909,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_xsession_spec_domtrans_all_users" lineno="3913">
+<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4006">
<summary>
Execute an Xserver session in all user domains. This
is an explicit transition, requiring the
@@ -122083,7 +122921,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_spec_domtrans_unpriv_users" lineno="3936">
+<interface name="userdom_spec_domtrans_unpriv_users" lineno="4029">
<summary>
Execute a shell in all unprivileged user domains. This
is an explicit transition, requiring the
@@ -122095,7 +122933,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="3959">
+<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4052">
<summary>
Execute an Xserver session in all unprivileged user domains. This
is an explicit transition, requiring the
@@ -122107,7 +122945,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_rw_unpriv_user_semaphores" lineno="3980">
+<interface name="userdom_rw_unpriv_user_semaphores" lineno="4073">
<summary>
Read and write unpriviledged user SysV sempaphores.
</summary>
@@ -122117,7 +122955,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_unpriv_user_semaphores" lineno="3998">
+<interface name="userdom_manage_unpriv_user_semaphores" lineno="4091">
<summary>
Manage unpriviledged user SysV sempaphores.
</summary>
@@ -122127,7 +122965,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4017">
+<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4110">
<summary>
Read and write unpriviledged user SysV shared
memory segments.
@@ -122138,7 +122976,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4036">
+<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4129">
<summary>
Manage unpriviledged user SysV shared
memory segments.
@@ -122149,7 +122987,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4056">
+<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4149">
<summary>
Execute bin_t in the unprivileged user domains. This
is an explicit transition, requiring the
@@ -122161,7 +122999,7 @@ Domain allowed to transition.
</summary>
</param>
</interface>
-<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4079">
+<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4172">
<summary>
Execute all entrypoint files in unprivileged user
domains. This is an explicit transition, requiring the
@@ -122173,7 +123011,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_search_user_home_content" lineno="4100">
+<interface name="userdom_search_user_home_content" lineno="4193">
<summary>
Search users home directories.
</summary>
@@ -122183,7 +123021,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_signull_unpriv_users" lineno="4119">
+<interface name="userdom_signull_unpriv_users" lineno="4212">
<summary>
Send signull to unprivileged user domains.
</summary>
@@ -122193,7 +123031,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_signal_unpriv_users" lineno="4137">
+<interface name="userdom_signal_unpriv_users" lineno="4230">
<summary>
Send general signals to unprivileged user domains.
</summary>
@@ -122203,7 +123041,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_use_unpriv_users_fds" lineno="4155">
+<interface name="userdom_use_unpriv_users_fds" lineno="4248">
<summary>
Inherit the file descriptors from unprivileged user domains.
</summary>
@@ -122213,7 +123051,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4183">
+<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4276">
<summary>
Do not audit attempts to inherit the file descriptors
from unprivileged user domains.
@@ -122233,7 +123071,7 @@ Domain to not audit.
</param>
<infoflow type="none"/>
</interface>
-<interface name="userdom_dontaudit_use_user_ptys" lineno="4201">
+<interface name="userdom_dontaudit_use_user_ptys" lineno="4294">
<summary>
Do not audit attempts to use user ptys.
</summary>
@@ -122243,7 +123081,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_relabelto_user_ptys" lineno="4219">
+<interface name="userdom_relabelto_user_ptys" lineno="4312">
<summary>
Relabel files to unprivileged user pty types.
</summary>
@@ -122253,7 +123091,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4238">
+<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4331">
<summary>
Do not audit attempts to relabel files from
user pty types.
@@ -122264,7 +123102,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_write_user_tmp_files" lineno="4256">
+<interface name="userdom_write_user_tmp_files" lineno="4349">
<summary>
Write all users files in /tmp
</summary>
@@ -122274,7 +123112,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4275">
+<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4368">
<summary>
Do not audit attempts to write users
temporary files.
@@ -122285,7 +123123,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_use_user_ttys" lineno="4293">
+<interface name="userdom_dontaudit_use_user_ttys" lineno="4386">
<summary>
Do not audit attempts to use user ttys.
</summary>
@@ -122295,7 +123133,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_read_all_users_state" lineno="4311">
+<interface name="userdom_read_all_users_state" lineno="4404">
<summary>
Read the process state of all user domains.
</summary>
@@ -122305,7 +123143,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_getattr_all_users" lineno="4330">
+<interface name="userdom_getattr_all_users" lineno="4423">
<summary>
Get the attributes of all user domains.
</summary>
@@ -122315,7 +123153,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_use_all_users_fds" lineno="4348">
+<interface name="userdom_use_all_users_fds" lineno="4441">
<summary>
Inherit the file descriptors from all user domains
</summary>
@@ -122325,7 +123163,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_use_all_users_fds" lineno="4367">
+<interface name="userdom_dontaudit_use_all_users_fds" lineno="4460">
<summary>
Do not audit attempts to inherit the file
descriptors from any user domains.
@@ -122336,7 +123174,7 @@ Domain to not audit.
</summary>
</param>
</interface>
-<interface name="userdom_signal_all_users" lineno="4385">
+<interface name="userdom_signal_all_users" lineno="4478">
<summary>
Send general signals to all user domains.
</summary>
@@ -122346,7 +123184,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_sigchld_all_users" lineno="4403">
+<interface name="userdom_sigchld_all_users" lineno="4496">
<summary>
Send a SIGCHLD signal to all user domains.
</summary>
@@ -122356,7 +123194,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_read_all_users_keys" lineno="4421">
+<interface name="userdom_read_all_users_keys" lineno="4514">
<summary>
Read keys for all user domains.
</summary>
@@ -122366,7 +123204,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_write_all_users_keys" lineno="4439">
+<interface name="userdom_write_all_users_keys" lineno="4532">
<summary>
Write keys for all user domains.
</summary>
@@ -122376,7 +123214,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_rw_all_users_keys" lineno="4457">
+<interface name="userdom_rw_all_users_keys" lineno="4550">
<summary>
Read and write keys for all user domains.
</summary>
@@ -122386,7 +123224,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_create_all_users_keys" lineno="4475">
+<interface name="userdom_create_all_users_keys" lineno="4568">
<summary>
Create keys for all user domains.
</summary>
@@ -122396,7 +123234,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_all_users_keys" lineno="4493">
+<interface name="userdom_manage_all_users_keys" lineno="4586">
<summary>
Manage keys for all user domains.
</summary>
@@ -122406,7 +123244,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_dbus_send_all_users" lineno="4511">
+<interface name="userdom_dbus_send_all_users" lineno="4604">
<summary>
Send a dbus message to all user domains.
</summary>
@@ -122416,7 +123254,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_manage_user_tmp_chr_files" lineno="4533">
+<interface name="userdom_manage_user_tmp_chr_files" lineno="4626">
<summary>
Create, read, write, and delete user
temporary character files.
@@ -122427,7 +123265,7 @@ Domain allowed access.
</summary>
</param>
</interface>
-<interface name="userdom_relabel_user_certs" lineno="4554">
+<interface name="userdom_relabel_user_certs" lineno="4647">
<summary>
Allow relabeling resources to user_cert_t
</summary>
@@ -122437,7 +123275,7 @@ Domain allowed access
</summary>
</param>
</interface>
-<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="4577">
+<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="4670">
<summary>
Do not audit attempts to read and write
unserdomain stream.
@@ -123827,7 +124665,7 @@ Domain allowed access.
</interface>
<interface name="xen_pid_filetrans" lineno="280">
<summary>
-Create in a xend_var_run_t directory
+Create in a xend_runtime_t directory
</summary>
<param name="domain">
<summary>