Gentoo Archives: gentoo-commits

From: Jason Zaman <perfinion@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/, policy/modules/kernel/, doc/
Date: Mon, 31 Jan 2022 19:31:26
Message-Id: 1643657276.b293bd6062b6007870720a7a8ed255cf2f667280.perfinion@gentoo
1 commit: b293bd6062b6007870720a7a8ed255cf2f667280
2 Author: Jason Zaman <perfinion <AT> gentoo <DOT> org>
3 AuthorDate: Mon Jan 31 19:27:56 2022 +0000
4 Commit: Jason Zaman <perfinion <AT> gentoo <DOT> org>
5 CommitDate: Mon Jan 31 19:27:56 2022 +0000
6 URL: https://gitweb.gentoo.org/proj/hardened-refpolicy.git/commit/?id=b293bd60
7
8 Update generated policy and doc files
9
10 Signed-off-by: Jason Zaman <perfinion <AT> gentoo.org>
11
12 doc/policy.xml | 11907 ++++++++++++++++++++-------------
13 policy/booleans.conf | 64 +-
14 policy/modules.conf | 35 +
15 policy/modules/kernel/corenetwork.if | 421 ++
16 policy/modules/kernel/corenetwork.te | 15 +-
17 5 files changed, 7744 insertions(+), 4698 deletions(-)
18
19 diff --git a/doc/policy.xml b/doc/policy.xml
20 index 12758be9..35687d71 100644
21 --- a/doc/policy.xml
22 +++ b/doc/policy.xml
23 @@ -3472,22 +3472,33 @@ Role allowed access.
24 </module>
25 <module name="shutdown" filename="policy/modules/admin/shutdown.if">
26 <summary>System shutdown command.</summary>
27 -<interface name="shutdown_role" lineno="18">
28 +<template name="shutdown_role" lineno="29">
29 <summary>
30 Role access for shutdown.
31 </summary>
32 -<param name="role">
33 +<param name="role_prefix">
34 <summary>
35 -Role allowed access.
36 +The prefix of the user role (e.g., user
37 +is the prefix for user_r).
38 </summary>
39 </param>
40 -<param name="domain">
41 +<param name="user_domain">
42 <summary>
43 User domain for the role.
44 </summary>
45 </param>
46 -</interface>
47 -<interface name="shutdown_domtrans" lineno="39">
48 +<param name="user_exec_domain">
49 +<summary>
50 +User exec domain for execute and transition access.
51 +</summary>
52 +</param>
53 +<param name="role">
54 +<summary>
55 +Role allowed access
56 +</summary>
57 +</param>
58 +</template>
59 +<interface name="shutdown_domtrans" lineno="64">
60 <summary>
61 Execute a domain transition to run shutdown.
62 </summary>
63 @@ -3497,7 +3508,7 @@ Domain allowed to transition.
64 </summary>
65 </param>
66 </interface>
67 -<interface name="shutdown_run" lineno="65">
68 +<interface name="shutdown_run" lineno="90">
69 <summary>
70 Execute shutdown in the shutdown
71 domain, and allow the specified role
72 @@ -3514,7 +3525,7 @@ Role allowed access.
73 </summary>
74 </param>
75 </interface>
76 -<interface name="shutdown_signal" lineno="84">
77 +<interface name="shutdown_signal" lineno="109">
78 <summary>
79 Send generic signals to shutdown.
80 </summary>
81 @@ -3524,7 +3535,7 @@ Domain allowed access.
82 </summary>
83 </param>
84 </interface>
85 -<interface name="shutdown_sigchld" lineno="102">
86 +<interface name="shutdown_sigchld" lineno="127">
87 <summary>
88 Send SIGCHLD signals to shutdown.
89 </summary>
90 @@ -3534,7 +3545,7 @@ Domain allowed access.
91 </summary>
92 </param>
93 </interface>
94 -<interface name="shutdown_getattr_exec_files" lineno="120">
95 +<interface name="shutdown_getattr_exec_files" lineno="145">
96 <summary>
97 Get attributes of shutdown executable files.
98 </summary>
99 @@ -3544,6 +3555,16 @@ Domain allowed access.
100 </summary>
101 </param>
102 </interface>
103 +<tunable name="shutdown_allow_user_exec_domains" dftval="false">
104 +<desc>
105 +<p>
106 +Determine whether the user application exec
107 +domain attribute should be respected for
108 +shutdown access. If not enabled, only user
109 +domains themselves may use shutdown.
110 +</p>
111 +</desc>
112 +</tunable>
113 </module>
114 <module name="sosreport" filename="policy/modules/admin/sosreport.if">
115 <summary>Generate debugging information for system.</summary>
116 @@ -3650,7 +3671,7 @@ The role associated with the user domain.
117 </summary>
118 </param>
119 </template>
120 -<template name="su_role_template" lineno="144">
121 +<template name="su_role_template" lineno="149">
122 <summary>
123 The role template for the su module.
124 </summary>
125 @@ -3660,18 +3681,23 @@ The prefix of the user role (e.g., user
126 is the prefix for user_r).
127 </summary>
128 </param>
129 -<param name="user_role">
130 +<param name="user_domain">
131 <summary>
132 -The role associated with the user domain.
133 +User domain for the role.
134 </summary>
135 </param>
136 -<param name="user_domain">
137 +<param name="user_exec_domain">
138 <summary>
139 -The type of the user domain.
140 +User exec domain for execute and transition access.
141 +</summary>
142 +</param>
143 +<param name="role">
144 +<summary>
145 +Role allowed access
146 </summary>
147 </param>
148 </template>
149 -<interface name="su_exec" lineno="280">
150 +<interface name="su_exec" lineno="303">
151 <summary>
152 Execute su in the caller domain.
153 </summary>
154 @@ -3681,10 +3707,20 @@ Domain allowed access.
155 </summary>
156 </param>
157 </interface>
158 +<tunable name="su_allow_user_exec_domains" dftval="false">
159 +<desc>
160 +<p>
161 +Determine whether the user application
162 +exec domain attribute should be respected
163 +for su access. If not enabled, only user
164 +domains themselves may use su.
165 +</p>
166 +</desc>
167 +</tunable>
168 </module>
169 <module name="sudo" filename="policy/modules/admin/sudo.if">
170 <summary>Execute a command with a substitute user</summary>
171 -<template name="sudo_role_template" lineno="31">
172 +<template name="sudo_role_template" lineno="36">
173 <summary>
174 The role template for the sudo module.
175 </summary>
176 @@ -3701,18 +3737,23 @@ The prefix of the user role (e.g., user
177 is the prefix for user_r).
178 </summary>
179 </param>
180 -<param name="user_role">
181 +<param name="user_domain">
182 <summary>
183 -The user role.
184 +User domain for the role.
185 </summary>
186 </param>
187 -<param name="user_domain">
188 +<param name="user_exec_domain">
189 <summary>
190 -The user domain associated with the role.
191 +User exec domain for execute and transition access.
192 +</summary>
193 +</param>
194 +<param name="role">
195 +<summary>
196 +Role allowed access
197 </summary>
198 </param>
199 </template>
200 -<interface name="sudo_sigchld" lineno="195">
201 +<interface name="sudo_sigchld" lineno="215">
202 <summary>
203 Send a SIGCHLD signal to the sudo domain.
204 </summary>
205 @@ -3733,6 +3774,16 @@ required for users to use sudo.
206 </p>
207 </desc>
208 </tunable>
209 +<tunable name="sudo_allow_user_exec_domains" dftval="false">
210 +<desc>
211 +<p>
212 +Determine whether the user application exec
213 +domain attribute should be respected for sudo
214 +access. If not enabled, only user domains
215 +themselves may use sudo.
216 +</p>
217 +</desc>
218 +</tunable>
219 </module>
220 <module name="sxid" filename="policy/modules/admin/sxid.if">
221 <summary>SUID/SGID program monitoring.</summary>
222 @@ -4409,22 +4460,33 @@ Role allowed access.
223 </module>
224 <module name="cdrecord" filename="policy/modules/apps/cdrecord.if">
225 <summary>Record audio or data Compact Discs from a master.</summary>
226 -<interface name="cdrecord_role" lineno="18">
227 +<template name="cdrecord_role" lineno="29">
228 <summary>
229 Role access for cdrecord.
230 </summary>
231 -<param name="role">
232 +<param name="role_prefix">
233 <summary>
234 -Role allowed access.
235 +The prefix of the user role (e.g., user
236 +is the prefix for user_r).
237 </summary>
238 </param>
239 -<param name="domain">
240 +<param name="user_domain">
241 <summary>
242 User domain for the role.
243 </summary>
244 </param>
245 -</interface>
246 -<interface name="cdrecord_exec" lineno="44">
247 +<param name="user_exec_domain">
248 +<summary>
249 +User exec domain for execute and transition access.
250 +</summary>
251 +</param>
252 +<param name="role">
253 +<summary>
254 +Role allowed access
255 +</summary>
256 +</param>
257 +</template>
258 +<interface name="cdrecord_exec" lineno="59">
259 <summary>
260 Execute cdrecord in the caller domain.
261 </summary>
262 @@ -4447,22 +4509,33 @@ content files
263 </module>
264 <module name="chromium" filename="policy/modules/apps/chromium.if">
265 <summary>Chromium browser</summary>
266 -<interface name="chromium_role" lineno="18">
267 +<template name="chromium_role" lineno="29">
268 <summary>
269 Role access for chromium
270 </summary>
271 -<param name="role">
272 +<param name="role_prefix">
273 <summary>
274 -Role allowed access
275 +The prefix of the user role (e.g., user
276 +is the prefix for user_r).
277 </summary>
278 </param>
279 -<param name="domain">
280 +<param name="user_domain">
281 <summary>
282 -User domain for the role
283 +User domain for the role.
284 </summary>
285 </param>
286 -</interface>
287 -<interface name="chromium_rw_tmp_pipes" lineno="67">
288 +<param name="user_exec_domain">
289 +<summary>
290 +User exec domain for execute and transition access.
291 +</summary>
292 +</param>
293 +<param name="role">
294 +<summary>
295 +Role allowed access
296 +</summary>
297 +</param>
298 +</template>
299 +<interface name="chromium_rw_tmp_pipes" lineno="82">
300 <summary>
301 Read-write access to Chromiums' temporary fifo files
302 </summary>
303 @@ -4472,7 +4545,7 @@ Domain allowed access
304 </summary>
305 </param>
306 </interface>
307 -<interface name="chromium_tmp_filetrans" lineno="101">
308 +<interface name="chromium_tmp_filetrans" lineno="116">
309 <summary>
310 Automatically use the specified type for resources created in chromium's
311 temporary locations
312 @@ -4498,7 +4571,7 @@ The name of the resource being created
313 </summary>
314 </param>
315 </interface>
316 -<interface name="chromium_domtrans" lineno="120">
317 +<interface name="chromium_domtrans" lineno="135">
318 <summary>
319 Execute a domain transition to the chromium domain (chromium_t)
320 </summary>
321 @@ -4508,7 +4581,7 @@ Domain allowed access
322 </summary>
323 </param>
324 </interface>
325 -<interface name="chromium_run" lineno="146">
326 +<interface name="chromium_run" lineno="161">
327 <summary>
328 Execute chromium in the chromium domain and allow the specified role to access the chromium domain
329 </summary>
330 @@ -4612,21 +4685,32 @@ Domain allowed access.
331 </module>
332 <module name="cryfs" filename="policy/modules/apps/cryfs.if">
333 <summary>CryFS and similar other tools which mount encrypted directories using FUSE.</summary>
334 -<interface name="cryfs_role" lineno="18">
335 +<template name="cryfs_role" lineno="29">
336 <summary>
337 Role access for CryFS.
338 </summary>
339 -<param name="role">
340 +<param name="role_prefix">
341 <summary>
342 -Role allowed access.
343 +The prefix of the user role (e.g., user
344 +is the prefix for user_r).
345 </summary>
346 </param>
347 -<param name="domain">
348 +<param name="user_domain">
349 <summary>
350 User domain for the role.
351 </summary>
352 </param>
353 -</interface>
354 +<param name="user_exec_domain">
355 +<summary>
356 +User exec domain for execute and transition access.
357 +</summary>
358 +</param>
359 +<param name="role">
360 +<summary>
361 +Role allowed access
362 +</summary>
363 +</param>
364 +</template>
365 <tunable name="cryfs_read_generic_user_content" dftval="true">
366 <desc>
367 <p>
368 @@ -4658,22 +4742,33 @@ Grant the cryfs domains manage rights on all user content
369 </module>
370 <module name="evolution" filename="policy/modules/apps/evolution.if">
371 <summary>Evolution email client.</summary>
372 -<interface name="evolution_role" lineno="18">
373 +<template name="evolution_role" lineno="29">
374 <summary>
375 Role access for evolution.
376 </summary>
377 -<param name="role">
378 +<param name="role_prefix">
379 <summary>
380 -Role allowed access.
381 +The prefix of the user role (e.g., user
382 +is the prefix for user_r).
383 </summary>
384 </param>
385 -<param name="domain">
386 +<param name="user_domain">
387 <summary>
388 User domain for the role.
389 </summary>
390 </param>
391 -</interface>
392 -<interface name="evolution_home_filetrans" lineno="99">
393 +<param name="user_exec_domain">
394 +<summary>
395 +User exec domain for execute and transition access.
396 +</summary>
397 +</param>
398 +<param name="role">
399 +<summary>
400 +Role allowed access
401 +</summary>
402 +</param>
403 +</template>
404 +<interface name="evolution_home_filetrans" lineno="118">
405 <summary>
406 Create objects in the evolution home
407 directories with a private type.
408 @@ -4699,7 +4794,7 @@ The name of the object being created.
409 </summary>
410 </param>
411 </interface>
412 -<interface name="evolution_read_home_files" lineno="118">
413 +<interface name="evolution_read_home_files" lineno="137">
414 <summary>
415 Read evolution home files.
416 </summary>
417 @@ -4709,7 +4804,7 @@ Domain allowed access.
418 </summary>
419 </param>
420 </interface>
421 -<interface name="evolution_stream_connect" lineno="137">
422 +<interface name="evolution_stream_connect" lineno="156">
423 <summary>
424 Connect to evolution using a unix
425 domain stream socket.
426 @@ -4720,7 +4815,7 @@ Domain allowed access.
427 </summary>
428 </param>
429 </interface>
430 -<interface name="evolution_read_orbit_tmp_files" lineno="158">
431 +<interface name="evolution_read_orbit_tmp_files" lineno="177">
432 <summary>
433 Read evolution orbit temporary
434 files.
435 @@ -4731,7 +4826,7 @@ Domain allowed access.
436 </summary>
437 </param>
438 </interface>
439 -<interface name="evolution_dbus_chat" lineno="179">
440 +<interface name="evolution_dbus_chat" lineno="198">
441 <summary>
442 Send and receive messages from
443 evolution over dbus.
444 @@ -4742,7 +4837,7 @@ Domain allowed access.
445 </summary>
446 </param>
447 </interface>
448 -<interface name="evolution_alarm_dbus_chat" lineno="200">
449 +<interface name="evolution_alarm_dbus_chat" lineno="219">
450 <summary>
451 Send and receive messages from
452 evolution_alarm over dbus.
453 @@ -4753,7 +4848,7 @@ Domain allowed access.
454 </summary>
455 </param>
456 </interface>
457 -<interface name="evolution_domtrans" lineno="221">
458 +<interface name="evolution_domtrans" lineno="240">
459 <summary>
460 Make a domain transition to the
461 evolution target domain.
462 @@ -4804,22 +4899,33 @@ Grant the evolution domains manage rights on all user content
463 </module>
464 <module name="games" filename="policy/modules/apps/games.if">
465 <summary>Various games.</summary>
466 -<interface name="games_role" lineno="18">
467 +<template name="games_role" lineno="29">
468 <summary>
469 Role access for games.
470 </summary>
471 -<param name="role">
472 +<param name="role_prefix">
473 <summary>
474 -Role allowed access.
475 +The prefix of the user role (e.g., user
476 +is the prefix for user_r).
477 </summary>
478 </param>
479 -<param name="domain">
480 +<param name="user_domain">
481 <summary>
482 User domain for the role.
483 </summary>
484 </param>
485 -</interface>
486 -<interface name="games_rw_data" lineno="52">
487 +<param name="user_exec_domain">
488 +<summary>
489 +User exec domain for execute and transition access.
490 +</summary>
491 +</param>
492 +<param name="role">
493 +<summary>
494 +Role allowed access
495 +</summary>
496 +</param>
497 +</template>
498 +<interface name="games_rw_data" lineno="67">
499 <summary>
500 Read and write games data files.
501 </summary>
502 @@ -4829,7 +4935,7 @@ Domain allowed access.
503 </summary>
504 </param>
505 </interface>
506 -<interface name="games_domtrans" lineno="71">
507 +<interface name="games_domtrans" lineno="86">
508 <summary>
509 Run a game in the game domain.
510 </summary>
511 @@ -4839,7 +4945,7 @@ Domain allowed to transition.
512 </summary>
513 </param>
514 </interface>
515 -<interface name="games_dbus_chat" lineno="91">
516 +<interface name="games_dbus_chat" lineno="106">
517 <summary>
518 Send and receive messages from
519 games over dbus.
520 @@ -4911,28 +5017,33 @@ Determine whether Gitosis can send mail.
521 </module>
522 <module name="gnome" filename="policy/modules/apps/gnome.if">
523 <summary>GNU network object model environment.</summary>
524 -<template name="gnome_role_template" lineno="24">
525 +<template name="gnome_role_template" lineno="29">
526 <summary>
527 The role template for gnome.
528 </summary>
529 <param name="role_prefix">
530 <summary>
531 -The prefix of the user domain (e.g., user
532 -is the prefix for user_t).
533 +The prefix of the user role (e.g., user
534 +is the prefix for user_r).
535 </summary>
536 </param>
537 -<param name="user_role">
538 +<param name="user_domain">
539 <summary>
540 -The role associated with the user domain.
541 +User domain for the role.
542 </summary>
543 </param>
544 -<param name="user_domain">
545 +<param name="user_exec_domain">
546 <summary>
547 -The type of the user domain.
548 +User exec domain for execute and transition access.
549 +</summary>
550 +</param>
551 +<param name="role">
552 +<summary>
553 +Role allowed access
554 </summary>
555 </param>
556 </template>
557 -<interface name="gnome_exec_gconf" lineno="121">
558 +<interface name="gnome_exec_gconf" lineno="134">
559 <summary>
560 Execute gconf in the caller domain.
561 </summary>
562 @@ -4942,7 +5053,7 @@ Domain allowed access.
563 </summary>
564 </param>
565 </interface>
566 -<interface name="gnome_read_gconf_config" lineno="140">
567 +<interface name="gnome_read_gconf_config" lineno="153">
568 <summary>
569 Read gconf configuration content.
570 </summary>
571 @@ -4952,7 +5063,7 @@ Domain allowed access.
572 </summary>
573 </param>
574 </interface>
575 -<interface name="gnome_dontaudit_read_inherited_gconf_config_files" lineno="162">
576 +<interface name="gnome_dontaudit_read_inherited_gconf_config_files" lineno="175">
577 <summary>
578 Do not audit attempts to read
579 inherited gconf configuration files.
580 @@ -4963,7 +5074,7 @@ Domain to not audit.
581 </summary>
582 </param>
583 </interface>
584 -<interface name="gnome_manage_gconf_config" lineno="181">
585 +<interface name="gnome_manage_gconf_config" lineno="194">
586 <summary>
587 Create, read, write, and delete
588 gconf configuration content.
589 @@ -4974,7 +5085,7 @@ Domain allowed access.
590 </summary>
591 </param>
592 </interface>
593 -<interface name="gnome_stream_connect_gconf" lineno="203">
594 +<interface name="gnome_stream_connect_gconf" lineno="216">
595 <summary>
596 Connect to gconf using a unix
597 domain stream socket.
598 @@ -4985,7 +5096,7 @@ Domain allowed access.
599 </summary>
600 </param>
601 </interface>
602 -<interface name="gnome_domtrans_gconfd" lineno="222">
603 +<interface name="gnome_domtrans_gconfd" lineno="235">
604 <summary>
605 Run gconfd in gconfd domain.
606 </summary>
607 @@ -4995,7 +5106,7 @@ Domain allowed to transition.
608 </summary>
609 </param>
610 </interface>
611 -<interface name="gnome_create_generic_home_dirs" lineno="241">
612 +<interface name="gnome_create_generic_home_dirs" lineno="254">
613 <summary>
614 Create generic gnome home directories.
615 </summary>
616 @@ -5005,7 +5116,7 @@ Domain allowed access.
617 </summary>
618 </param>
619 </interface>
620 -<interface name="gnome_setattr_generic_home_dirs" lineno="260">
621 +<interface name="gnome_setattr_generic_home_dirs" lineno="273">
622 <summary>
623 Set attributes of generic gnome
624 user home directories.
625 @@ -5016,7 +5127,7 @@ Domain allowed access.
626 </summary>
627 </param>
628 </interface>
629 -<interface name="gnome_read_generic_home_content" lineno="279">
630 +<interface name="gnome_read_generic_home_content" lineno="292">
631 <summary>
632 Read generic gnome home content.
633 </summary>
634 @@ -5026,7 +5137,7 @@ Domain allowed access.
635 </summary>
636 </param>
637 </interface>
638 -<interface name="gnome_manage_generic_home_content" lineno="303">
639 +<interface name="gnome_manage_generic_home_content" lineno="316">
640 <summary>
641 Create, read, write, and delete
642 generic gnome home content.
643 @@ -5037,7 +5148,7 @@ Domain allowed access.
644 </summary>
645 </param>
646 </interface>
647 -<interface name="gnome_search_generic_home" lineno="326">
648 +<interface name="gnome_search_generic_home" lineno="339">
649 <summary>
650 Search generic gnome home directories.
651 </summary>
652 @@ -5047,7 +5158,7 @@ Domain allowed access.
653 </summary>
654 </param>
655 </interface>
656 -<interface name="gnome_home_filetrans" lineno="361">
657 +<interface name="gnome_home_filetrans" lineno="374">
658 <summary>
659 Create objects in gnome user home
660 directories with a private type.
661 @@ -5073,7 +5184,7 @@ The name of the object being created.
662 </summary>
663 </param>
664 </interface>
665 -<interface name="gnome_create_generic_gconf_home_dirs" lineno="380">
666 +<interface name="gnome_create_generic_gconf_home_dirs" lineno="393">
667 <summary>
668 Create generic gconf home directories.
669 </summary>
670 @@ -5083,7 +5194,7 @@ Domain allowed access.
671 </summary>
672 </param>
673 </interface>
674 -<interface name="gnome_read_generic_gconf_home_content" lineno="398">
675 +<interface name="gnome_read_generic_gconf_home_content" lineno="411">
676 <summary>
677 Read generic gconf home content.
678 </summary>
679 @@ -5093,7 +5204,7 @@ Domain allowed access.
680 </summary>
681 </param>
682 </interface>
683 -<interface name="gnome_manage_generic_gconf_home_content" lineno="422">
684 +<interface name="gnome_manage_generic_gconf_home_content" lineno="435">
685 <summary>
686 Create, read, write, and delete
687 generic gconf home content.
688 @@ -5104,7 +5215,7 @@ Domain allowed access.
689 </summary>
690 </param>
691 </interface>
692 -<interface name="gnome_search_generic_gconf_home" lineno="445">
693 +<interface name="gnome_search_generic_gconf_home" lineno="458">
694 <summary>
695 Search generic gconf home directories.
696 </summary>
697 @@ -5114,7 +5225,7 @@ Domain allowed access.
698 </summary>
699 </param>
700 </interface>
701 -<interface name="gnome_home_filetrans_gconf_home" lineno="476">
702 +<interface name="gnome_home_filetrans_gconf_home" lineno="489">
703 <summary>
704 Create objects in user home
705 directories with the generic gconf
706 @@ -5136,7 +5247,7 @@ The name of the object being created.
707 </summary>
708 </param>
709 </interface>
710 -<interface name="gnome_home_filetrans_gnome_home" lineno="506">
711 +<interface name="gnome_home_filetrans_gnome_home" lineno="519">
712 <summary>
713 Create objects in user home
714 directories with the generic gnome
715 @@ -5158,7 +5269,7 @@ The name of the object being created.
716 </summary>
717 </param>
718 </interface>
719 -<interface name="gnome_gconf_home_filetrans" lineno="540">
720 +<interface name="gnome_gconf_home_filetrans" lineno="553">
721 <summary>
722 Create objects in gnome gconf home
723 directories with a private type.
724 @@ -5184,7 +5295,7 @@ The name of the object being created.
725 </summary>
726 </param>
727 </interface>
728 -<interface name="gnome_user_home_dir_filetrans_gstreamer_orcexec" lineno="571">
729 +<interface name="gnome_user_home_dir_filetrans_gstreamer_orcexec" lineno="584">
730 <summary>
731 Create objects in user home
732 directories with the gstreamer
733 @@ -5206,7 +5317,7 @@ The name of the object being created.
734 </summary>
735 </param>
736 </interface>
737 -<interface name="gnome_user_runtime_filetrans_gstreamer_orcexec" lineno="601">
738 +<interface name="gnome_user_runtime_filetrans_gstreamer_orcexec" lineno="614">
739 <summary>
740 Create objects in the user
741 runtime directories with the
742 @@ -5228,7 +5339,7 @@ The name of the object being created.
743 </summary>
744 </param>
745 </interface>
746 -<interface name="gnome_read_keyring_home_files" lineno="619">
747 +<interface name="gnome_read_keyring_home_files" lineno="632">
748 <summary>
749 Read generic gnome keyring home files.
750 </summary>
751 @@ -5238,7 +5349,7 @@ Domain allowed access.
752 </summary>
753 </param>
754 </interface>
755 -<interface name="gnome_dbus_chat_gconfd" lineno="640">
756 +<interface name="gnome_dbus_chat_gconfd" lineno="653">
757 <summary>
758 Send and receive messages from
759 gnome configuration daemon over
760 @@ -5250,7 +5361,7 @@ Domain allowed access.
761 </summary>
762 </param>
763 </interface>
764 -<template name="gnome_dbus_chat_gkeyringd" lineno="667">
765 +<template name="gnome_dbus_chat_gkeyringd" lineno="680">
766 <summary>
767 Send and receive messages from
768 gnome keyring daemon over dbus.
769 @@ -5267,7 +5378,7 @@ Domain allowed access.
770 </summary>
771 </param>
772 </template>
773 -<interface name="gnome_dbus_chat_all_gkeyringd" lineno="688">
774 +<interface name="gnome_dbus_chat_all_gkeyringd" lineno="701">
775 <summary>
776 Send and receive messages from all
777 gnome keyring daemon over dbus.
778 @@ -5278,7 +5389,7 @@ Domain allowed access.
779 </summary>
780 </param>
781 </interface>
782 -<interface name="gnome_spec_domtrans_all_gkeyringd" lineno="708">
783 +<interface name="gnome_spec_domtrans_all_gkeyringd" lineno="721">
784 <summary>
785 Run all gkeyringd in gkeyringd domain.
786 </summary>
787 @@ -5288,7 +5399,7 @@ Domain allowed to transition.
788 </summary>
789 </param>
790 </interface>
791 -<template name="gnome_stream_connect_gkeyringd" lineno="735">
792 +<template name="gnome_stream_connect_gkeyringd" lineno="748">
793 <summary>
794 Connect to gnome keyring daemon
795 with a unix stream socket.
796 @@ -5305,7 +5416,7 @@ Domain allowed access.
797 </summary>
798 </param>
799 </template>
800 -<interface name="gnome_stream_connect_all_gkeyringd" lineno="756">
801 +<interface name="gnome_stream_connect_all_gkeyringd" lineno="769">
802 <summary>
803 Connect to all gnome keyring daemon
804 with a unix stream socket.
805 @@ -5316,7 +5427,7 @@ Domain allowed access.
806 </summary>
807 </param>
808 </interface>
809 -<interface name="gnome_manage_gstreamer_orcexec" lineno="778">
810 +<interface name="gnome_manage_gstreamer_orcexec" lineno="791">
811 <summary>
812 Manage gstreamer ORC optimized
813 code.
814 @@ -5327,7 +5438,7 @@ Domain allowed access.
815 </summary>
816 </param>
817 </interface>
818 -<interface name="gnome_mmap_gstreamer_orcexec" lineno="797">
819 +<interface name="gnome_mmap_gstreamer_orcexec" lineno="810">
820 <summary>
821 Mmap gstreamer ORC optimized
822 code.
823 @@ -5341,22 +5452,33 @@ Domain allowed access.
824 </module>
825 <module name="gpg" filename="policy/modules/apps/gpg.if">
826 <summary>Policy for GNU Privacy Guard and related programs.</summary>
827 -<interface name="gpg_role" lineno="18">
828 +<template name="gpg_role" lineno="29">
829 <summary>
830 Role access for gpg.
831 </summary>
832 -<param name="role">
833 +<param name="role_prefix">
834 <summary>
835 -Role allowed access.
836 +The prefix of the user role (e.g., user
837 +is the prefix for user_r).
838 </summary>
839 </param>
840 -<param name="domain">
841 +<param name="user_domain">
842 <summary>
843 User domain for the role.
844 </summary>
845 </param>
846 -</interface>
847 -<interface name="gpg_domtrans" lineno="64">
848 +<param name="user_exec_domain">
849 +<summary>
850 +User exec domain for execute and transition access.
851 +</summary>
852 +</param>
853 +<param name="role">
854 +<summary>
855 +Role allowed access
856 +</summary>
857 +</param>
858 +</template>
859 +<interface name="gpg_domtrans" lineno="80">
860 <summary>
861 Execute the gpg in the gpg domain.
862 </summary>
863 @@ -5366,7 +5488,7 @@ Domain allowed to transition.
864 </summary>
865 </param>
866 </interface>
867 -<interface name="gpg_exec" lineno="83">
868 +<interface name="gpg_exec" lineno="99">
869 <summary>
870 Execute the gpg in the caller domain.
871 </summary>
872 @@ -5376,7 +5498,7 @@ Domain allowed access.
873 </summary>
874 </param>
875 </interface>
876 -<interface name="gpg_spec_domtrans" lineno="117">
877 +<interface name="gpg_spec_domtrans" lineno="133">
878 <summary>
879 Execute gpg in a specified domain.
880 </summary>
881 @@ -5401,7 +5523,7 @@ Domain to transition to.
882 </summary>
883 </param>
884 </interface>
885 -<interface name="gpg_exec_agent" lineno="136">
886 +<interface name="gpg_exec_agent" lineno="152">
887 <summary>
888 Execute the gpg-agent in the caller domain.
889 </summary>
890 @@ -5411,7 +5533,17 @@ Domain allowed access.
891 </summary>
892 </param>
893 </interface>
894 -<interface name="gpg_entry_type" lineno="156">
895 +<interface name="gpg_dontaudit_exec_agent" lineno="171">
896 +<summary>
897 +Do not audit attempts to execute the gpg-agent.
898 +</summary>
899 +<param name="domain">
900 +<summary>
901 +Domain to not audit.
902 +</summary>
903 +</param>
904 +</interface>
905 +<interface name="gpg_entry_type" lineno="190">
906 <summary>
907 Make gpg executable files an
908 entrypoint for the specified domain.
909 @@ -5422,7 +5554,7 @@ The domain for which gpg_exec_t is an entrypoint.
910 </summary>
911 </param>
912 </interface>
913 -<interface name="gpg_signal" lineno="174">
914 +<interface name="gpg_signal" lineno="208">
915 <summary>
916 Send generic signals to gpg.
917 </summary>
918 @@ -5432,7 +5564,7 @@ Domain allowed access.
919 </summary>
920 </param>
921 </interface>
922 -<interface name="gpg_rw_agent_pipes" lineno="192">
923 +<interface name="gpg_rw_agent_pipes" lineno="226">
924 <summary>
925 Read and write gpg agent pipes.
926 </summary>
927 @@ -5442,7 +5574,7 @@ Domain allowed access.
928 </summary>
929 </param>
930 </interface>
931 -<interface name="gpg_stream_connect_agent" lineno="210">
932 +<interface name="gpg_stream_connect_agent" lineno="244">
933 <summary>
934 Connect to gpg agent socket
935 </summary>
936 @@ -5452,7 +5584,7 @@ Domain allowed access.
937 </summary>
938 </param>
939 </interface>
940 -<interface name="gpg_search_agent_tmp_dirs" lineno="232">
941 +<interface name="gpg_search_agent_tmp_dirs" lineno="266">
942 <summary>
943 Search gpg agent dirs.
944 </summary>
945 @@ -5462,7 +5594,7 @@ Domain allowed access.
946 </summary>
947 </param>
948 </interface>
949 -<interface name="gpg_agent_tmp_filetrans" lineno="266">
950 +<interface name="gpg_agent_tmp_filetrans" lineno="300">
951 <summary>
952 filetrans in gpg_agent_tmp_t dirs
953 </summary>
954 @@ -5488,7 +5620,7 @@ The name of the object being created.
955 </summary>
956 </param>
957 </interface>
958 -<interface name="gpg_runtime_filetrans" lineno="301">
959 +<interface name="gpg_runtime_filetrans" lineno="335">
960 <summary>
961 filetrans in gpg_runtime_t dirs
962 </summary>
963 @@ -5514,7 +5646,7 @@ The name of the object being created.
964 </summary>
965 </param>
966 </interface>
967 -<interface name="gpg_secret_filetrans" lineno="336">
968 +<interface name="gpg_secret_filetrans" lineno="370">
969 <summary>
970 filetrans in gpg_secret_t dirs
971 </summary>
972 @@ -5540,7 +5672,7 @@ The name of the object being created.
973 </summary>
974 </param>
975 </interface>
976 -<interface name="gpg_pinentry_dbus_chat" lineno="357">
977 +<interface name="gpg_pinentry_dbus_chat" lineno="391">
978 <summary>
979 Send messages to and from gpg
980 pinentry over DBUS.
981 @@ -5551,7 +5683,18 @@ Domain allowed access.
982 </summary>
983 </param>
984 </interface>
985 -<interface name="gpg_list_user_secrets" lineno="377">
986 +<interface name="gpg_dontaudit_search_user_secrets" lineno="412">
987 +<summary>
988 +Do not audit attempts to search gpg
989 +user secrets.
990 +</summary>
991 +<param name="domain">
992 +<summary>
993 +Domain to not audit.
994 +</summary>
995 +</param>
996 +</interface>
997 +<interface name="gpg_list_user_secrets" lineno="430">
998 <summary>
999 List gpg user secrets.
1000 </summary>
1001 @@ -5609,21 +5752,32 @@ Grant the gpg domains manage rights on all user content
1002 </module>
1003 <module name="irc" filename="policy/modules/apps/irc.if">
1004 <summary>IRC client policy.</summary>
1005 -<interface name="irc_role" lineno="18">
1006 +<template name="irc_role" lineno="29">
1007 <summary>
1008 Role access for IRC.
1009 </summary>
1010 -<param name="role">
1011 +<param name="role_prefix">
1012 <summary>
1013 -Role allowed access.
1014 +The prefix of the user role (e.g., user
1015 +is the prefix for user_r).
1016 </summary>
1017 </param>
1018 -<param name="domain">
1019 +<param name="user_domain">
1020 <summary>
1021 User domain for the role.
1022 </summary>
1023 </param>
1024 -</interface>
1025 +<param name="user_exec_domain">
1026 +<summary>
1027 +User exec domain for execute and transition access.
1028 +</summary>
1029 +</param>
1030 +<param name="role">
1031 +<summary>
1032 +Role allowed access
1033 +</summary>
1034 +</param>
1035 +</template>
1036 <tunable name="irc_use_any_tcp_ports" dftval="false">
1037 <desc>
1038 <p>
1039 @@ -5664,22 +5818,33 @@ Grant the irc domains manage rights on all user content
1040 </module>
1041 <module name="java" filename="policy/modules/apps/java.if">
1042 <summary>Java virtual machine</summary>
1043 -<interface name="java_role" lineno="18">
1044 +<template name="java_role" lineno="29">
1045 <summary>
1046 Role access for java.
1047 </summary>
1048 -<param name="role">
1049 +<param name="role_prefix">
1050 <summary>
1051 -Role allowed access.
1052 +The prefix of the user role (e.g., user
1053 +is the prefix for user_r).
1054 </summary>
1055 </param>
1056 -<param name="domain">
1057 +<param name="user_domain">
1058 <summary>
1059 User domain for the role.
1060 </summary>
1061 </param>
1062 -</interface>
1063 -<template name="java_role_template" lineno="90">
1064 +<param name="user_exec_domain">
1065 +<summary>
1066 +User exec domain for execute and transition access.
1067 +</summary>
1068 +</param>
1069 +<param name="role">
1070 +<summary>
1071 +Role allowed access
1072 +</summary>
1073 +</param>
1074 +</template>
1075 +<template name="java_role_template" lineno="110">
1076 <summary>
1077 The role template for the java module.
1078 </summary>
1079 @@ -5691,22 +5856,27 @@ for java applications.
1080 </desc>
1081 <param name="role_prefix">
1082 <summary>
1083 -The prefix of the user domain (e.g., user
1084 -is the prefix for user_t).
1085 +The prefix of the user role (e.g., user
1086 +is the prefix for user_r).
1087 </summary>
1088 </param>
1089 -<param name="user_role">
1090 +<param name="user_domain">
1091 <summary>
1092 -The role associated with the user domain.
1093 +User domain for the role.
1094 </summary>
1095 </param>
1096 -<param name="user_domain">
1097 +<param name="user_exec_domain">
1098 <summary>
1099 -The type of the user domain.
1100 +User exec domain for execute and transition access.
1101 +</summary>
1102 +</param>
1103 +<param name="role">
1104 +<summary>
1105 +Role allowed access
1106 </summary>
1107 </param>
1108 </template>
1109 -<interface name="java_domtrans" lineno="148">
1110 +<interface name="java_domtrans" lineno="168">
1111 <summary>
1112 Execute the java program in the java domain.
1113 </summary>
1114 @@ -5716,7 +5886,7 @@ Domain allowed to transition.
1115 </summary>
1116 </param>
1117 </interface>
1118 -<interface name="java_run" lineno="178">
1119 +<interface name="java_run" lineno="198">
1120 <summary>
1121 Execute java in the java domain, and
1122 allow the specified role the java domain.
1123 @@ -5732,7 +5902,7 @@ Role allowed access.
1124 </summary>
1125 </param>
1126 </interface>
1127 -<interface name="java_domtrans_unconfined" lineno="198">
1128 +<interface name="java_domtrans_unconfined" lineno="218">
1129 <summary>
1130 Execute the java program in the
1131 unconfined java domain.
1132 @@ -5743,7 +5913,7 @@ Domain allowed to transition.
1133 </summary>
1134 </param>
1135 </interface>
1136 -<interface name="java_run_unconfined" lineno="224">
1137 +<interface name="java_run_unconfined" lineno="244">
1138 <summary>
1139 Execute the java program in the
1140 unconfined java domain and allow the
1141 @@ -5760,7 +5930,7 @@ Role allowed access.
1142 </summary>
1143 </param>
1144 </interface>
1145 -<interface name="java_exec" lineno="244">
1146 +<interface name="java_exec" lineno="264">
1147 <summary>
1148 Execute the java program in
1149 the callers domain.
1150 @@ -5771,7 +5941,7 @@ Domain allowed access.
1151 </summary>
1152 </param>
1153 </interface>
1154 -<interface name="java_manage_generic_home_content" lineno="264">
1155 +<interface name="java_manage_generic_home_content" lineno="284">
1156 <summary>
1157 Create, read, write, and delete
1158 generic java home content.
1159 @@ -5782,7 +5952,7 @@ Domain allowed access.
1160 </summary>
1161 </param>
1162 </interface>
1163 -<interface name="java_manage_java_tmp" lineno="285">
1164 +<interface name="java_manage_java_tmp" lineno="305">
1165 <summary>
1166 Create, read, write, and delete
1167 temporary java content.
1168 @@ -5793,7 +5963,7 @@ Domain allowed access.
1169 </summary>
1170 </param>
1171 </interface>
1172 -<interface name="java_home_filetrans_java_home" lineno="316">
1173 +<interface name="java_home_filetrans_java_home" lineno="336">
1174 <summary>
1175 Create specified objects in user home
1176 directories with the generic java
1177 @@ -5815,7 +5985,7 @@ The name of the object being created.
1178 </summary>
1179 </param>
1180 </interface>
1181 -<template name="java_noatsecure_domtrans" lineno="341">
1182 +<template name="java_noatsecure_domtrans" lineno="361">
1183 <summary>
1184 Run java in javaplugin domain and
1185 do not clean the environment (atsecure)
1186 @@ -5832,7 +6002,7 @@ Domain allowed to transition.
1187 </summary>
1188 </param>
1189 </template>
1190 -<template name="java_domain_type" lineno="369">
1191 +<template name="java_domain_type" lineno="389">
1192 <summary>
1193 The template for using java in a domain.
1194 </summary>
1195 @@ -5887,21 +6057,32 @@ Grant the java domains manage rights on all user content
1196 </module>
1197 <module name="libmtp" filename="policy/modules/apps/libmtp.if">
1198 <summary>libmtp: An Initiatior implementation of the Media Transfer Protocol (MTP).</summary>
1199 -<interface name="libmtp_role" lineno="18">
1200 +<template name="libmtp_role" lineno="29">
1201 <summary>
1202 Role access for libmtp.
1203 </summary>
1204 -<param name="role">
1205 +<param name="role_prefix">
1206 <summary>
1207 -Role allowed access.
1208 +The prefix of the user role (e.g., user
1209 +is the prefix for user_r).
1210 </summary>
1211 </param>
1212 -<param name="domain">
1213 +<param name="user_domain">
1214 <summary>
1215 User domain for the role.
1216 </summary>
1217 </param>
1218 -</interface>
1219 +<param name="user_exec_domain">
1220 +<summary>
1221 +User exec domain for execute and transition access.
1222 +</summary>
1223 +</param>
1224 +<param name="role">
1225 +<summary>
1226 +Role allowed access
1227 +</summary>
1228 +</param>
1229 +</template>
1230 <tunable name="libmtp_enable_home_dirs" dftval="false">
1231 <desc>
1232 <p>
1233 @@ -6135,7 +6316,7 @@ Role allowed access.
1234 </module>
1235 <module name="mono" filename="policy/modules/apps/mono.if">
1236 <summary>Run .NET server and client applications on Linux.</summary>
1237 -<template name="mono_role_template" lineno="30">
1238 +<template name="mono_role_template" lineno="35">
1239 <summary>
1240 The role template for the mono module.
1241 </summary>
1242 @@ -6147,22 +6328,27 @@ for mono applications.
1243 </desc>
1244 <param name="role_prefix">
1245 <summary>
1246 -The prefix of the user domain (e.g., user
1247 -is the prefix for user_t).
1248 +The prefix of the user role (e.g., user
1249 +is the prefix for user_r).
1250 </summary>
1251 </param>
1252 -<param name="user_role">
1253 +<param name="user_domain">
1254 <summary>
1255 -The role associated with the user domain.
1256 +User domain for the role.
1257 </summary>
1258 </param>
1259 -<param name="user_domain">
1260 +<param name="user_exec_domain">
1261 <summary>
1262 -The type of the user domain.
1263 +User exec domain for execute and transition access.
1264 +</summary>
1265 +</param>
1266 +<param name="role">
1267 +<summary>
1268 +Role allowed access
1269 </summary>
1270 </param>
1271 </template>
1272 -<interface name="mono_domtrans" lineno="80">
1273 +<interface name="mono_domtrans" lineno="85">
1274 <summary>
1275 Execute mono in the mono domain.
1276 </summary>
1277 @@ -6172,7 +6358,7 @@ Domain allowed to transition.
1278 </summary>
1279 </param>
1280 </interface>
1281 -<interface name="mono_run" lineno="105">
1282 +<interface name="mono_run" lineno="110">
1283 <summary>
1284 Execute mono in the mono domain, and
1285 allow the specified role the mono domain.
1286 @@ -6188,7 +6374,7 @@ Role allowed access.
1287 </summary>
1288 </param>
1289 </interface>
1290 -<interface name="mono_exec" lineno="124">
1291 +<interface name="mono_exec" lineno="129">
1292 <summary>
1293 Execute mono in the caller domain.
1294 </summary>
1295 @@ -6198,7 +6384,7 @@ Domain allowed access.
1296 </summary>
1297 </param>
1298 </interface>
1299 -<interface name="mono_rw_shm" lineno="143">
1300 +<interface name="mono_rw_shm" lineno="148">
1301 <summary>
1302 Read and write mono shared memory.
1303 </summary>
1304 @@ -6211,22 +6397,33 @@ Domain allowed access.
1305 </module>
1306 <module name="mozilla" filename="policy/modules/apps/mozilla.if">
1307 <summary>Policy for Mozilla and related web browsers.</summary>
1308 -<interface name="mozilla_role" lineno="18">
1309 +<template name="mozilla_role" lineno="29">
1310 <summary>
1311 Role access for mozilla.
1312 </summary>
1313 -<param name="role">
1314 +<param name="role_prefix">
1315 <summary>
1316 -Role allowed access.
1317 +The prefix of the user role (e.g., user
1318 +is the prefix for user_r).
1319 </summary>
1320 </param>
1321 -<param name="domain">
1322 +<param name="user_domain">
1323 <summary>
1324 User domain for the role.
1325 </summary>
1326 </param>
1327 -</interface>
1328 -<interface name="mozilla_role_plugin" lineno="90">
1329 +<param name="user_exec_domain">
1330 +<summary>
1331 +User exec domain for execute and transition access.
1332 +</summary>
1333 +</param>
1334 +<param name="role">
1335 +<summary>
1336 +Role allowed access
1337 +</summary>
1338 +</param>
1339 +</template>
1340 +<interface name="mozilla_role_plugin" lineno="105">
1341 <summary>
1342 Role access for mozilla plugin.
1343 </summary>
1344 @@ -6241,7 +6438,7 @@ User domain for the role.
1345 </summary>
1346 </param>
1347 </interface>
1348 -<interface name="mozilla_read_user_home" lineno="151">
1349 +<interface name="mozilla_read_user_home" lineno="166">
1350 <summary>
1351 Read mozilla home directory content.
1352 </summary>
1353 @@ -6251,7 +6448,7 @@ Domain allowed access.
1354 </summary>
1355 </param>
1356 </interface>
1357 -<interface name="mozilla_read_user_home_files" lineno="172">
1358 +<interface name="mozilla_read_user_home_files" lineno="187">
1359 <summary>
1360 Read mozilla home directory files
1361 </summary>
1362 @@ -6261,7 +6458,7 @@ Domain allowed access.
1363 </summary>
1364 </param>
1365 </interface>
1366 -<interface name="mozilla_write_user_home_files" lineno="193">
1367 +<interface name="mozilla_write_user_home_files" lineno="208">
1368 <summary>
1369 Write mozilla home directory files.
1370 </summary>
1371 @@ -6271,7 +6468,7 @@ Domain allowed access.
1372 </summary>
1373 </param>
1374 </interface>
1375 -<interface name="mozilla_dontaudit_rw_user_home_files" lineno="213">
1376 +<interface name="mozilla_dontaudit_rw_user_home_files" lineno="228">
1377 <summary>
1378 Do not audit attempts to read and
1379 write mozilla home directory files.
1380 @@ -6282,7 +6479,7 @@ Domain to not audit.
1381 </summary>
1382 </param>
1383 </interface>
1384 -<interface name="mozilla_dontaudit_manage_user_home_files" lineno="233">
1385 +<interface name="mozilla_dontaudit_manage_user_home_files" lineno="248">
1386 <summary>
1387 Do not audit attempt to Create,
1388 read, write, and delete mozilla
1389 @@ -6294,7 +6491,7 @@ Domain to not audit.
1390 </summary>
1391 </param>
1392 </interface>
1393 -<interface name="mozilla_exec_user_plugin_home_files" lineno="253">
1394 +<interface name="mozilla_exec_user_plugin_home_files" lineno="268">
1395 <summary>
1396 Execute mozilla plugin home directory files.
1397 </summary>
1398 @@ -6304,7 +6501,7 @@ Domain allowed access.
1399 </summary>
1400 </param>
1401 </interface>
1402 -<interface name="mozilla_execmod_user_plugin_home_files" lineno="273">
1403 +<interface name="mozilla_execmod_user_plugin_home_files" lineno="288">
1404 <summary>
1405 Mozilla plugin home directory file
1406 text relocation.
1407 @@ -6315,7 +6512,7 @@ Domain allowed access.
1408 </summary>
1409 </param>
1410 </interface>
1411 -<interface name="mozilla_read_tmp_files" lineno="291">
1412 +<interface name="mozilla_read_tmp_files" lineno="306">
1413 <summary>
1414 Read temporary mozilla files.
1415 </summary>
1416 @@ -6325,7 +6522,7 @@ Domain allowed access.
1417 </summary>
1418 </param>
1419 </interface>
1420 -<interface name="mozilla_domtrans" lineno="309">
1421 +<interface name="mozilla_domtrans" lineno="324">
1422 <summary>
1423 Run mozilla in the mozilla domain.
1424 </summary>
1425 @@ -6335,7 +6532,7 @@ Domain allowed to transition.
1426 </summary>
1427 </param>
1428 </interface>
1429 -<interface name="mozilla_domtrans_plugin" lineno="329">
1430 +<interface name="mozilla_domtrans_plugin" lineno="344">
1431 <summary>
1432 Execute a domain transition to
1433 run mozilla plugin.
1434 @@ -6346,7 +6543,7 @@ Domain allowed to transition.
1435 </summary>
1436 </param>
1437 </interface>
1438 -<interface name="mozilla_run_plugin" lineno="356">
1439 +<interface name="mozilla_run_plugin" lineno="371">
1440 <summary>
1441 Execute mozilla plugin in the
1442 mozilla plugin domain, and allow
1443 @@ -6364,7 +6561,7 @@ Role allowed access.
1444 </summary>
1445 </param>
1446 </interface>
1447 -<interface name="mozilla_domtrans_plugin_config" lineno="376">
1448 +<interface name="mozilla_domtrans_plugin_config" lineno="391">
1449 <summary>
1450 Execute a domain transition to
1451 run mozilla plugin config.
1452 @@ -6375,7 +6572,7 @@ Domain allowed to transition.
1453 </summary>
1454 </param>
1455 </interface>
1456 -<interface name="mozilla_run_plugin_config" lineno="403">
1457 +<interface name="mozilla_run_plugin_config" lineno="418">
1458 <summary>
1459 Execute mozilla plugin config in
1460 the mozilla plugin config domain,
1461 @@ -6393,7 +6590,7 @@ Role allowed access.
1462 </summary>
1463 </param>
1464 </interface>
1465 -<interface name="mozilla_dbus_chat" lineno="423">
1466 +<interface name="mozilla_dbus_chat" lineno="438">
1467 <summary>
1468 Send and receive messages from
1469 mozilla over dbus.
1470 @@ -6404,7 +6601,7 @@ Domain allowed access.
1471 </summary>
1472 </param>
1473 </interface>
1474 -<interface name="mozilla_dbus_chat_plugin" lineno="444">
1475 +<interface name="mozilla_dbus_chat_plugin" lineno="459">
1476 <summary>
1477 Send and receive messages from
1478 mozilla plugin over dbus.
1479 @@ -6415,7 +6612,7 @@ Domain allowed access.
1480 </summary>
1481 </param>
1482 </interface>
1483 -<interface name="mozilla_rw_tcp_sockets" lineno="464">
1484 +<interface name="mozilla_rw_tcp_sockets" lineno="479">
1485 <summary>
1486 Read and write mozilla TCP sockets.
1487 </summary>
1488 @@ -6425,7 +6622,7 @@ Domain allowed access.
1489 </summary>
1490 </param>
1491 </interface>
1492 -<interface name="mozilla_manage_plugin_rw_files" lineno="483">
1493 +<interface name="mozilla_manage_plugin_rw_files" lineno="498">
1494 <summary>
1495 Create, read, write, and delete
1496 mozilla plugin rw files.
1497 @@ -6436,7 +6633,7 @@ Domain allowed access.
1498 </summary>
1499 </param>
1500 </interface>
1501 -<interface name="mozilla_plugin_read_tmpfs_files" lineno="502">
1502 +<interface name="mozilla_plugin_read_tmpfs_files" lineno="517">
1503 <summary>
1504 Read mozilla_plugin tmpfs files.
1505 </summary>
1506 @@ -6446,7 +6643,7 @@ Domain allowed access.
1507 </summary>
1508 </param>
1509 </interface>
1510 -<interface name="mozilla_plugin_delete_tmpfs_files" lineno="521">
1511 +<interface name="mozilla_plugin_delete_tmpfs_files" lineno="536">
1512 <summary>
1513 Delete mozilla_plugin tmpfs files.
1514 </summary>
1515 @@ -6456,7 +6653,7 @@ Domain allowed access.
1516 </summary>
1517 </param>
1518 </interface>
1519 -<interface name="mozilla_rw_tmp_pipes" lineno="540">
1520 +<interface name="mozilla_rw_tmp_pipes" lineno="555">
1521 <summary>
1522 Read/write to mozilla's tmp fifo files
1523 </summary>
1524 @@ -6466,7 +6663,7 @@ Domain allowed access
1525 </summary>
1526 </param>
1527 </interface>
1528 -<interface name="mozilla_manage_generic_plugin_home_content" lineno="559">
1529 +<interface name="mozilla_manage_generic_plugin_home_content" lineno="574">
1530 <summary>
1531 Create, read, write, and delete
1532 generic mozilla plugin home content.
1533 @@ -6477,7 +6674,7 @@ Domain allowed access.
1534 </summary>
1535 </param>
1536 </interface>
1537 -<interface name="mozilla_home_filetrans_plugin_home" lineno="594">
1538 +<interface name="mozilla_home_filetrans_plugin_home" lineno="609">
1539 <summary>
1540 Create objects in user home
1541 directories with the generic mozilla
1542 @@ -6499,7 +6696,7 @@ The name of the object being created.
1543 </summary>
1544 </param>
1545 </interface>
1546 -<interface name="mozilla_dontaudit_use_fds" lineno="614">
1547 +<interface name="mozilla_dontaudit_use_fds" lineno="629">
1548 <summary>
1549 Do not audit use of mozilla file descriptors
1550 </summary>
1551 @@ -6509,7 +6706,7 @@ Domain to dont audit access from
1552 </summary>
1553 </param>
1554 </interface>
1555 -<interface name="mozilla_send_dgram_plugin" lineno="632">
1556 +<interface name="mozilla_send_dgram_plugin" lineno="647">
1557 <summary>
1558 Send messages to mozilla plugin unix datagram sockets
1559 </summary>
1560 @@ -6575,22 +6772,33 @@ unreserved ports (for instance when dealing with Google Talk)
1561 </module>
1562 <module name="mplayer" filename="policy/modules/apps/mplayer.if">
1563 <summary>Mplayer media player and encoder.</summary>
1564 -<interface name="mplayer_role" lineno="18">
1565 +<template name="mplayer_role" lineno="29">
1566 <summary>
1567 Role access for mplayer
1568 </summary>
1569 -<param name="role">
1570 +<param name="role_prefix">
1571 <summary>
1572 -Role allowed access
1573 +The prefix of the user role (e.g., user
1574 +is the prefix for user_r).
1575 </summary>
1576 </param>
1577 -<param name="domain">
1578 +<param name="user_domain">
1579 <summary>
1580 -User domain for the role
1581 +User domain for the role.
1582 </summary>
1583 </param>
1584 -</interface>
1585 -<interface name="mplayer_domtrans" lineno="65">
1586 +<param name="user_exec_domain">
1587 +<summary>
1588 +User exec domain for execute and transition access.
1589 +</summary>
1590 +</param>
1591 +<param name="role">
1592 +<summary>
1593 +Role allowed access
1594 +</summary>
1595 +</param>
1596 +</template>
1597 +<interface name="mplayer_domtrans" lineno="81">
1598 <summary>
1599 Run mplayer in mplayer domain.
1600 </summary>
1601 @@ -6600,7 +6808,7 @@ Domain allowed to transition.
1602 </summary>
1603 </param>
1604 </interface>
1605 -<interface name="mplayer_exec" lineno="85">
1606 +<interface name="mplayer_exec" lineno="101">
1607 <summary>
1608 Execute mplayer in the caller domain.
1609 </summary>
1610 @@ -6610,7 +6818,7 @@ Domain allowed access.
1611 </summary>
1612 </param>
1613 </interface>
1614 -<interface name="mplayer_read_user_home_files" lineno="104">
1615 +<interface name="mplayer_read_user_home_files" lineno="120">
1616 <summary>
1617 Read mplayer user home content files.
1618 </summary>
1619 @@ -6620,7 +6828,7 @@ Domain allowed access.
1620 </summary>
1621 </param>
1622 </interface>
1623 -<interface name="mplayer_manage_generic_home_content" lineno="124">
1624 +<interface name="mplayer_manage_generic_home_content" lineno="140">
1625 <summary>
1626 Create, read, write, and delete
1627 generic mplayer home content.
1628 @@ -6631,7 +6839,7 @@ Domain allowed access.
1629 </summary>
1630 </param>
1631 </interface>
1632 -<interface name="mplayer_home_filetrans_mplayer_home" lineno="157">
1633 +<interface name="mplayer_home_filetrans_mplayer_home" lineno="173">
1634 <summary>
1635 Create specified objects in user home
1636 directories with the generic mplayer
1637 @@ -6720,22 +6928,33 @@ Grant the mplayer domains manage rights on all user content
1638 </module>
1639 <module name="openoffice" filename="policy/modules/apps/openoffice.if">
1640 <summary>Openoffice suite.</summary>
1641 -<interface name="ooffice_role" lineno="18">
1642 +<template name="ooffice_role" lineno="29">
1643 <summary>
1644 Role access for openoffice.
1645 </summary>
1646 -<param name="role">
1647 +<param name="role_prefix">
1648 <summary>
1649 -Role allowed access.
1650 +The prefix of the user role (e.g., user
1651 +is the prefix for user_r).
1652 </summary>
1653 </param>
1654 -<param name="domain">
1655 +<param name="user_domain">
1656 <summary>
1657 User domain for the role.
1658 </summary>
1659 </param>
1660 -</interface>
1661 -<interface name="ooffice_domtrans" lineno="48">
1662 +<param name="user_exec_domain">
1663 +<summary>
1664 +User exec domain for execute and transition access.
1665 +</summary>
1666 +</param>
1667 +<param name="role">
1668 +<summary>
1669 +Role allowed access
1670 +</summary>
1671 +</param>
1672 +</template>
1673 +<interface name="ooffice_domtrans" lineno="63">
1674 <summary>
1675 Run openoffice in its own domain.
1676 </summary>
1677 @@ -6745,7 +6964,7 @@ Domain allowed to transition.
1678 </summary>
1679 </param>
1680 </interface>
1681 -<interface name="ooffice_dontaudit_exec_tmp_files" lineno="67">
1682 +<interface name="ooffice_dontaudit_exec_tmp_files" lineno="82">
1683 <summary>
1684 Do not audit attempts to execute
1685 files in temporary directories.
1686 @@ -6756,7 +6975,7 @@ Domain to not audit.
1687 </summary>
1688 </param>
1689 </interface>
1690 -<interface name="ooffice_rw_tmp_files" lineno="86">
1691 +<interface name="ooffice_rw_tmp_files" lineno="101">
1692 <summary>
1693 Read and write temporary
1694 openoffice files.
1695 @@ -6767,7 +6986,7 @@ Domain allowed access.
1696 </summary>
1697 </param>
1698 </interface>
1699 -<interface name="ooffice_dbus_chat" lineno="106">
1700 +<interface name="ooffice_dbus_chat" lineno="121">
1701 <summary>
1702 Send and receive dbus messages
1703 from and to the openoffice
1704 @@ -6779,7 +6998,7 @@ Domain allowed access.
1705 </summary>
1706 </param>
1707 </interface>
1708 -<interface name="ooffice_stream_connect" lineno="127">
1709 +<interface name="ooffice_stream_connect" lineno="142">
1710 <summary>
1711 Connect to openoffice using a
1712 unix domain stream socket.
1713 @@ -6843,22 +7062,44 @@ Grant the openoffice domains manage rights on all user content
1714 </module>
1715 <module name="pulseaudio" filename="policy/modules/apps/pulseaudio.if">
1716 <summary>Pulseaudio network sound server.</summary>
1717 -<interface name="pulseaudio_role" lineno="18">
1718 +<template name="pulseaudio_role" lineno="29">
1719 <summary>
1720 Role access for pulseaudio.
1721 </summary>
1722 +<param name="role_prefix">
1723 +<summary>
1724 +The prefix of the user role (e.g., user
1725 +is the prefix for user_r).
1726 +</summary>
1727 +</param>
1728 +<param name="user_domain">
1729 +<summary>
1730 +User domain for the role.
1731 +</summary>
1732 +</param>
1733 +<param name="user_exec_domain">
1734 +<summary>
1735 +User exec domain for execute and transition access.
1736 +</summary>
1737 +</param>
1738 <param name="role">
1739 <summary>
1740 -Role allowed access.
1741 +Role allowed access
1742 </summary>
1743 </param>
1744 +</template>
1745 +<interface name="pulseaudio_client_domain" lineno="73">
1746 +<summary>
1747 +Connect to pulseaudio and manage
1748 +pulseaudio config data.
1749 +</summary>
1750 <param name="domain">
1751 <summary>
1752 -User domain for the role.
1753 +Domain allowed access.
1754 </summary>
1755 </param>
1756 </interface>
1757 -<interface name="pulseaudio_domtrans" lineno="56">
1758 +<interface name="pulseaudio_domtrans" lineno="91">
1759 <summary>
1760 Execute a domain transition to run pulseaudio.
1761 </summary>
1762 @@ -6868,7 +7109,7 @@ Domain allowed to transition.
1763 </summary>
1764 </param>
1765 </interface>
1766 -<interface name="pulseaudio_run" lineno="85">
1767 +<interface name="pulseaudio_run" lineno="117">
1768 <summary>
1769 Execute pulseaudio in the pulseaudio
1770 domain, and allow the specified role
1771 @@ -6885,7 +7126,7 @@ Role allowed access.
1772 </summary>
1773 </param>
1774 </interface>
1775 -<interface name="pulseaudio_exec" lineno="104">
1776 +<interface name="pulseaudio_exec" lineno="137">
1777 <summary>
1778 Execute pulseaudio in the caller domain.
1779 </summary>
1780 @@ -6895,7 +7136,7 @@ Domain allowed access.
1781 </summary>
1782 </param>
1783 </interface>
1784 -<interface name="pulseaudio_dontaudit_exec" lineno="123">
1785 +<interface name="pulseaudio_dontaudit_exec" lineno="156">
1786 <summary>
1787 Do not audit attempts to execute pulseaudio.
1788 </summary>
1789 @@ -6905,7 +7146,7 @@ Domain to not audit.
1790 </summary>
1791 </param>
1792 </interface>
1793 -<interface name="pulseaudio_signull" lineno="142">
1794 +<interface name="pulseaudio_signull" lineno="175">
1795 <summary>
1796 Send null signals to pulseaudio.
1797 processes.
1798 @@ -6916,7 +7157,7 @@ Domain allowed access.
1799 </summary>
1800 </param>
1801 </interface>
1802 -<interface name="pulseaudio_use_fds" lineno="161">
1803 +<interface name="pulseaudio_use_fds" lineno="194">
1804 <summary>
1805 Use file descriptors for
1806 pulseaudio.
1807 @@ -6927,7 +7168,7 @@ Domain allowed access.
1808 </summary>
1809 </param>
1810 </interface>
1811 -<interface name="pulseaudio_dontaudit_use_fds" lineno="180">
1812 +<interface name="pulseaudio_dontaudit_use_fds" lineno="213">
1813 <summary>
1814 Do not audit attempts to use the
1815 file descriptors for pulseaudio.
1816 @@ -6938,7 +7179,7 @@ Domain allowed access.
1817 </summary>
1818 </param>
1819 </interface>
1820 -<interface name="pulseaudio_stream_connect" lineno="199">
1821 +<interface name="pulseaudio_stream_connect" lineno="232">
1822 <summary>
1823 Connect to pulseaudio with a unix
1824 domain stream socket.
1825 @@ -6949,7 +7190,7 @@ Domain allowed access.
1826 </summary>
1827 </param>
1828 </interface>
1829 -<interface name="pulseaudio_dbus_chat" lineno="219">
1830 +<interface name="pulseaudio_dbus_chat" lineno="252">
1831 <summary>
1832 Send and receive messages from
1833 pulseaudio over dbus.
1834 @@ -6960,7 +7201,7 @@ Domain allowed access.
1835 </summary>
1836 </param>
1837 </interface>
1838 -<interface name="pulseaudio_setattr_home_dir" lineno="239">
1839 +<interface name="pulseaudio_setattr_home_dir" lineno="272">
1840 <summary>
1841 Set attributes of pulseaudio home directories.
1842 </summary>
1843 @@ -6970,7 +7211,7 @@ Domain allowed access.
1844 </summary>
1845 </param>
1846 </interface>
1847 -<interface name="pulseaudio_read_home" lineno="257">
1848 +<interface name="pulseaudio_read_home" lineno="290">
1849 <summary>
1850 Read pulseaudio home content.
1851 </summary>
1852 @@ -6980,7 +7221,7 @@ Domain allowed access.
1853 </summary>
1854 </param>
1855 </interface>
1856 -<interface name="pulseaudio_rw_home_files" lineno="278">
1857 +<interface name="pulseaudio_rw_home_files" lineno="311">
1858 <summary>
1859 Read and write Pulse Audio files.
1860 </summary>
1861 @@ -6990,7 +7231,7 @@ Domain allowed access.
1862 </summary>
1863 </param>
1864 </interface>
1865 -<interface name="pulseaudio_manage_home" lineno="299">
1866 +<interface name="pulseaudio_manage_home" lineno="332">
1867 <summary>
1868 Create, read, write, and delete
1869 pulseaudio home content.
1870 @@ -7001,7 +7242,7 @@ Domain allowed access.
1871 </summary>
1872 </param>
1873 </interface>
1874 -<interface name="pulseaudio_home_filetrans_pulseaudio_home" lineno="332">
1875 +<interface name="pulseaudio_home_filetrans_pulseaudio_home" lineno="365">
1876 <summary>
1877 Create objects in user home
1878 directories with the pulseaudio
1879 @@ -7023,7 +7264,7 @@ The name of the object being created.
1880 </summary>
1881 </param>
1882 </interface>
1883 -<interface name="pulseaudio_tmpfs_content" lineno="351">
1884 +<interface name="pulseaudio_tmpfs_content" lineno="384">
1885 <summary>
1886 Make the specified tmpfs file type
1887 pulseaudio tmpfs content.
1888 @@ -7034,7 +7275,7 @@ File type to make pulseaudio tmpfs content.
1889 </summary>
1890 </param>
1891 </interface>
1892 -<interface name="pulseaudio_read_tmpfs_files" lineno="369">
1893 +<interface name="pulseaudio_read_tmpfs_files" lineno="402">
1894 <summary>
1895 Read pulseaudio tmpfs files.
1896 </summary>
1897 @@ -7044,7 +7285,7 @@ Domain allowed access.
1898 </summary>
1899 </param>
1900 </interface>
1901 -<interface name="pulseaudio_rw_tmpfs_files" lineno="389">
1902 +<interface name="pulseaudio_rw_tmpfs_files" lineno="422">
1903 <summary>
1904 Read and write pulseaudio tmpfs
1905 files.
1906 @@ -7055,23 +7296,6 @@ Domain allowed access.
1907 </summary>
1908 </param>
1909 </interface>
1910 -<interface name="pulseaudio_client_domain" lineno="417">
1911 -<summary>
1912 -Mark the specified domain as a PulseAudio client domain
1913 -and the related tmpfs file type as a (shared) PulseAudio tmpfs
1914 -file type used for the shared memory access
1915 -</summary>
1916 -<param name="domain">
1917 -<summary>
1918 -Domain to become a PulseAudio client domain
1919 -</summary>
1920 -</param>
1921 -<param name="tmpfstype">
1922 -<summary>
1923 -Tmpfs type used for shared memory of the given domain
1924 -</summary>
1925 -</param>
1926 -</interface>
1927 <tunable name="pulseaudio_execmem" dftval="false">
1928 <desc>
1929 <p>
1930 @@ -7307,22 +7531,33 @@ access to the network.
1931 </module>
1932 <module name="rssh" filename="policy/modules/apps/rssh.if">
1933 <summary>Restricted (scp/sftp) only shell.</summary>
1934 -<interface name="rssh_role" lineno="18">
1935 +<template name="rssh_role" lineno="29">
1936 <summary>
1937 Role access for rssh.
1938 </summary>
1939 -<param name="role">
1940 +<param name="role_prefix">
1941 <summary>
1942 -Role allowed access.
1943 +The prefix of the user role (e.g., user
1944 +is the prefix for user_r).
1945 </summary>
1946 </param>
1947 -<param name="domain">
1948 +<param name="user_domain">
1949 <summary>
1950 User domain for the role.
1951 </summary>
1952 </param>
1953 -</interface>
1954 -<interface name="rssh_spec_domtrans" lineno="46">
1955 +<param name="user_exec_domain">
1956 +<summary>
1957 +User exec domain for execute and transition access.
1958 +</summary>
1959 +</param>
1960 +<param name="role">
1961 +<summary>
1962 +Role allowed access
1963 +</summary>
1964 +</param>
1965 +</template>
1966 +<interface name="rssh_spec_domtrans" lineno="57">
1967 <summary>
1968 Execute rssh in the rssh domain.
1969 </summary>
1970 @@ -7332,7 +7567,7 @@ Domain allowed to transition.
1971 </summary>
1972 </param>
1973 </interface>
1974 -<interface name="rssh_exec" lineno="66">
1975 +<interface name="rssh_exec" lineno="77">
1976 <summary>
1977 Execute the rssh program
1978 in the caller domain.
1979 @@ -7343,7 +7578,7 @@ Domain allowed access.
1980 </summary>
1981 </param>
1982 </interface>
1983 -<interface name="rssh_domtrans_chroot_helper" lineno="86">
1984 +<interface name="rssh_domtrans_chroot_helper" lineno="97">
1985 <summary>
1986 Execute a domain transition to
1987 run rssh chroot helper.
1988 @@ -7354,7 +7589,7 @@ Domain allowed to transition.
1989 </summary>
1990 </param>
1991 </interface>
1992 -<interface name="rssh_read_ro_content" lineno="105">
1993 +<interface name="rssh_read_ro_content" lineno="116">
1994 <summary>
1995 Read users rssh read-only content.
1996 </summary>
1997 @@ -7367,7 +7602,7 @@ Domain allowed access.
1998 </module>
1999 <module name="screen" filename="policy/modules/apps/screen.if">
2000 <summary>GNU terminal multiplexer.</summary>
2001 -<template name="screen_role_template" lineno="24">
2002 +<template name="screen_role_template" lineno="29">
2003 <summary>
2004 The role template for the screen module.
2005 </summary>
2006 @@ -7377,18 +7612,23 @@ The prefix of the user role (e.g., user
2007 is the prefix for user_r).
2008 </summary>
2009 </param>
2010 -<param name="user_role">
2011 +<param name="user_domain">
2012 <summary>
2013 -The role associated with the user domain.
2014 +The type of the user domain.
2015 </summary>
2016 </param>
2017 -<param name="user_domain">
2018 +<param name="user_exec_domain">
2019 <summary>
2020 -The type of the user domain.
2021 +User exec domain for execute and transition access.
2022 +</summary>
2023 +</param>
2024 +<param name="user_role">
2025 +<summary>
2026 +The role associated with the user domain.
2027 </summary>
2028 </param>
2029 </template>
2030 -<interface name="screen_execute_sock_file" lineno="103">
2031 +<interface name="screen_execute_sock_file" lineno="114">
2032 <summary>
2033 Execute the screen runtime sock file.
2034 </summary>
2035 @@ -7476,21 +7716,32 @@ Domain allowed access.
2036 </module>
2037 <module name="syncthing" filename="policy/modules/apps/syncthing.if">
2038 <summary>Application that lets you synchronize your files across multiple devices.</summary>
2039 -<interface name="syncthing_role" lineno="18">
2040 +<template name="syncthing_role" lineno="29">
2041 <summary>
2042 Role access for Syncthing
2043 </summary>
2044 -<param name="role">
2045 +<param name="role_prefix">
2046 <summary>
2047 -Role allowed access
2048 +The prefix of the user role (e.g., user
2049 +is the prefix for user_r).
2050 </summary>
2051 </param>
2052 -<param name="domain">
2053 +<param name="user_domain">
2054 <summary>
2055 -User domain for the role
2056 +User domain for the role.
2057 </summary>
2058 </param>
2059 -</interface>
2060 +<param name="user_exec_domain">
2061 +<summary>
2062 +User exec domain for execute and transition access.
2063 +</summary>
2064 +</param>
2065 +<param name="role">
2066 +<summary>
2067 +Role allowed access
2068 +</summary>
2069 +</param>
2070 +</template>
2071 <tunable name="syncthing_read_generic_user_content" dftval="true">
2072 <desc>
2073 <p>
2074 @@ -7532,7 +7783,7 @@ Domain prefix to be used.
2075 </summary>
2076 </param>
2077 </template>
2078 -<template name="telepathy_role_template" lineno="59">
2079 +<template name="telepathy_role_template" lineno="64">
2080 <summary>
2081 The role template for the telepathy module.
2082 </summary>
2083 @@ -7544,22 +7795,27 @@ for window manager applications.
2084 </desc>
2085 <param name="role_prefix">
2086 <summary>
2087 -The prefix of the user domain (e.g., user
2088 -is the prefix for user_t).
2089 +The prefix of the user role (e.g., user
2090 +is the prefix for user_r).
2091 </summary>
2092 </param>
2093 -<param name="user_role">
2094 +<param name="user_domain">
2095 <summary>
2096 -The role associated with the user domain.
2097 +User domain for the role.
2098 </summary>
2099 </param>
2100 -<param name="user_domain">
2101 +<param name="user_exec_domain">
2102 <summary>
2103 -The type of the user domain.
2104 +User exec domain for execute and transition access.
2105 +</summary>
2106 +</param>
2107 +<param name="role">
2108 +<summary>
2109 +Role allowed access
2110 </summary>
2111 </param>
2112 </template>
2113 -<interface name="telepathy_gabble_stream_connect" lineno="137">
2114 +<interface name="telepathy_gabble_stream_connect" lineno="146">
2115 <summary>
2116 Connect to gabble with a unix
2117 domain stream socket.
2118 @@ -7570,7 +7826,7 @@ Domain allowed access.
2119 </summary>
2120 </param>
2121 </interface>
2122 -<interface name="telepathy_gabble_dbus_chat" lineno="157">
2123 +<interface name="telepathy_gabble_dbus_chat" lineno="166">
2124 <summary>
2125 Send dbus messages to and from
2126 gabble.
2127 @@ -7581,7 +7837,7 @@ Domain allowed access.
2128 </summary>
2129 </param>
2130 </interface>
2131 -<interface name="telepathy_mission_control_dbus_chat" lineno="178">
2132 +<interface name="telepathy_mission_control_dbus_chat" lineno="187">
2133 <summary>
2134 Send dbus messages to and from
2135 mission control.
2136 @@ -7592,7 +7848,7 @@ Domain allowed access.
2137 </summary>
2138 </param>
2139 </interface>
2140 -<interface name="telepathy_mission_control_read_state" lineno="198">
2141 +<interface name="telepathy_mission_control_read_state" lineno="207">
2142 <summary>
2143 Read mission control process state files.
2144 </summary>
2145 @@ -7602,7 +7858,7 @@ Domain allowed access.
2146 </summary>
2147 </param>
2148 </interface>
2149 -<interface name="telepathy_msn_stream_connect" lineno="220">
2150 +<interface name="telepathy_msn_stream_connect" lineno="229">
2151 <summary>
2152 Connect to msn with a unix
2153 domain stream socket.
2154 @@ -7613,7 +7869,7 @@ Domain allowed access.
2155 </summary>
2156 </param>
2157 </interface>
2158 -<interface name="telepathy_salut_stream_connect" lineno="240">
2159 +<interface name="telepathy_salut_stream_connect" lineno="249">
2160 <summary>
2161 Connect to salut with a unix
2162 domain stream socket.
2163 @@ -7643,22 +7899,33 @@ managers can connect to any port.
2164 </module>
2165 <module name="thunderbird" filename="policy/modules/apps/thunderbird.if">
2166 <summary>Thunderbird email client.</summary>
2167 -<interface name="thunderbird_role" lineno="18">
2168 +<template name="thunderbird_role" lineno="29">
2169 <summary>
2170 Role access for thunderbird.
2171 </summary>
2172 -<param name="role">
2173 +<param name="role_prefix">
2174 <summary>
2175 -Role allowed access.
2176 +The prefix of the user role (e.g., user
2177 +is the prefix for user_r).
2178 </summary>
2179 </param>
2180 -<param name="domain">
2181 +<param name="user_domain">
2182 <summary>
2183 User domain for the role.
2184 </summary>
2185 </param>
2186 -</interface>
2187 -<interface name="thunderbird_domtrans" lineno="52">
2188 +<param name="user_exec_domain">
2189 +<summary>
2190 +User exec domain for execute and transition access.
2191 +</summary>
2192 +</param>
2193 +<param name="role">
2194 +<summary>
2195 +Role allowed access
2196 +</summary>
2197 +</param>
2198 +</template>
2199 +<interface name="thunderbird_domtrans" lineno="67">
2200 <summary>
2201 Execute thunderbird in the thunderbird domain.
2202 </summary>
2203 @@ -7699,40 +7966,62 @@ Grant the thunderbird domains manage rights on all user content
2204 </module>
2205 <module name="tvtime" filename="policy/modules/apps/tvtime.if">
2206 <summary>High quality television application.</summary>
2207 -<interface name="tvtime_role" lineno="18">
2208 +<template name="tvtime_role" lineno="29">
2209 <summary>
2210 Role access for tvtime
2211 </summary>
2212 -<param name="role">
2213 +<param name="role_prefix">
2214 <summary>
2215 -Role allowed access
2216 +The prefix of the user role (e.g., user
2217 +is the prefix for user_r).
2218 </summary>
2219 </param>
2220 -<param name="domain">
2221 +<param name="user_domain">
2222 <summary>
2223 -User domain for the role
2224 +User domain for the role.
2225 </summary>
2226 </param>
2227 -</interface>
2228 +<param name="user_exec_domain">
2229 +<summary>
2230 +User exec domain for execute and transition access.
2231 +</summary>
2232 +</param>
2233 +<param name="role">
2234 +<summary>
2235 +Role allowed access
2236 +</summary>
2237 +</param>
2238 +</template>
2239 </module>
2240 <module name="uml" filename="policy/modules/apps/uml.if">
2241 <summary>User mode linux tools and services.</summary>
2242 -<interface name="uml_role" lineno="18">
2243 +<template name="uml_role" lineno="29">
2244 <summary>
2245 Role access for uml.
2246 </summary>
2247 -<param name="role">
2248 +<param name="role_prefix">
2249 <summary>
2250 -Role allowed access.
2251 +The prefix of the user role (e.g., user
2252 +is the prefix for user_r).
2253 </summary>
2254 </param>
2255 -<param name="domain">
2256 +<param name="user_domain">
2257 <summary>
2258 User domain for the role.
2259 </summary>
2260 </param>
2261 -</interface>
2262 -<interface name="uml_setattr_util_sockets" lineno="55">
2263 +<param name="user_exec_domain">
2264 +<summary>
2265 +User exec domain for execute and transition access.
2266 +</summary>
2267 +</param>
2268 +<param name="role">
2269 +<summary>
2270 +Role allowed access
2271 +</summary>
2272 +</param>
2273 +</template>
2274 +<interface name="uml_setattr_util_sockets" lineno="70">
2275 <summary>
2276 Set attributes of uml pid sock files.
2277 </summary>
2278 @@ -7742,7 +8031,7 @@ Domain allowed access.
2279 </summary>
2280 </param>
2281 </interface>
2282 -<interface name="uml_manage_util_files" lineno="74">
2283 +<interface name="uml_manage_util_files" lineno="89">
2284 <summary>
2285 Create, read, write, and delete
2286 uml pid files.
2287 @@ -7756,28 +8045,33 @@ Domain allowed access.
2288 </module>
2289 <module name="userhelper" filename="policy/modules/apps/userhelper.if">
2290 <summary>A wrapper that helps users run system programs.</summary>
2291 -<template name="userhelper_role_template" lineno="24">
2292 +<template name="userhelper_role_template" lineno="29">
2293 <summary>
2294 The role template for the userhelper module.
2295 </summary>
2296 -<param name="userrole_prefix">
2297 +<param name="role_prefix">
2298 <summary>
2299 The prefix of the user role (e.g., user
2300 is the prefix for user_r).
2301 </summary>
2302 </param>
2303 -<param name="user_role">
2304 +<param name="user_domain">
2305 <summary>
2306 -The user role.
2307 +User domain for the role.
2308 </summary>
2309 </param>
2310 -<param name="user_domain">
2311 +<param name="user_exec_domain">
2312 +<summary>
2313 +User exec domain for execute and transition access.
2314 +</summary>
2315 +</param>
2316 +<param name="role">
2317 <summary>
2318 -The user domain associated with the role.
2319 +Role allowed access
2320 </summary>
2321 </param>
2322 </template>
2323 -<interface name="userhelper_search_config" lineno="110">
2324 +<interface name="userhelper_search_config" lineno="123">
2325 <summary>
2326 Search userhelper configuration directories.
2327 </summary>
2328 @@ -7787,7 +8081,7 @@ Domain allowed access.
2329 </summary>
2330 </param>
2331 </interface>
2332 -<interface name="userhelper_dontaudit_search_config" lineno="129">
2333 +<interface name="userhelper_dontaudit_search_config" lineno="142">
2334 <summary>
2335 Do not audit attempts to search
2336 userhelper configuration directories.
2337 @@ -7798,7 +8092,7 @@ Domain to not audit.
2338 </summary>
2339 </param>
2340 </interface>
2341 -<interface name="userhelper_dbus_chat_all_consolehelper" lineno="148">
2342 +<interface name="userhelper_dbus_chat_all_consolehelper" lineno="161">
2343 <summary>
2344 Send and receive messages from
2345 consolehelper over dbus.
2346 @@ -7809,7 +8103,7 @@ Domain allowed access.
2347 </summary>
2348 </param>
2349 </interface>
2350 -<interface name="userhelper_use_fd" lineno="168">
2351 +<interface name="userhelper_use_fd" lineno="181">
2352 <summary>
2353 Use userhelper all userhelper file descriptors.
2354 </summary>
2355 @@ -7819,7 +8113,7 @@ Domain allowed access.
2356 </summary>
2357 </param>
2358 </interface>
2359 -<interface name="userhelper_sigchld" lineno="186">
2360 +<interface name="userhelper_sigchld" lineno="199">
2361 <summary>
2362 Send child terminated signals to all userhelper.
2363 </summary>
2364 @@ -7829,7 +8123,7 @@ Domain allowed access.
2365 </summary>
2366 </param>
2367 </interface>
2368 -<interface name="userhelper_exec" lineno="204">
2369 +<interface name="userhelper_exec" lineno="217">
2370 <summary>
2371 Execute the userhelper program in the caller domain.
2372 </summary>
2373 @@ -7839,7 +8133,7 @@ Domain allowed access.
2374 </summary>
2375 </param>
2376 </interface>
2377 -<interface name="userhelper_exec_consolehelper" lineno="224">
2378 +<interface name="userhelper_exec_consolehelper" lineno="237">
2379 <summary>
2380 Execute the consolehelper program
2381 in the caller domain.
2382 @@ -7915,22 +8209,33 @@ Role allowed to access.
2383 </module>
2384 <module name="vmware" filename="policy/modules/apps/vmware.if">
2385 <summary>VMWare Workstation virtual machines.</summary>
2386 -<interface name="vmware_role" lineno="18">
2387 +<template name="vmware_role" lineno="29">
2388 <summary>
2389 Role access for vmware.
2390 </summary>
2391 -<param name="role">
2392 +<param name="role_prefix">
2393 <summary>
2394 -Role allowed access.
2395 +The prefix of the user role (e.g., user
2396 +is the prefix for user_r).
2397 </summary>
2398 </param>
2399 -<param name="domain">
2400 +<param name="user_domain">
2401 <summary>
2402 User domain for the role.
2403 </summary>
2404 </param>
2405 -</interface>
2406 -<interface name="vmware_exec_host" lineno="50">
2407 +<param name="user_exec_domain">
2408 +<summary>
2409 +User exec domain for execute and transition access.
2410 +</summary>
2411 +</param>
2412 +<param name="role">
2413 +<summary>
2414 +Role allowed access
2415 +</summary>
2416 +</param>
2417 +</template>
2418 +<interface name="vmware_exec_host" lineno="65">
2419 <summary>
2420 Execute vmware host executables
2421 </summary>
2422 @@ -7940,7 +8245,7 @@ Domain allowed access.
2423 </summary>
2424 </param>
2425 </interface>
2426 -<interface name="vmware_read_system_config" lineno="69">
2427 +<interface name="vmware_read_system_config" lineno="84">
2428 <summary>
2429 Read vmware system configuration files.
2430 </summary>
2431 @@ -7950,7 +8255,7 @@ Domain allowed access.
2432 </summary>
2433 </param>
2434 </interface>
2435 -<interface name="vmware_append_system_config" lineno="88">
2436 +<interface name="vmware_append_system_config" lineno="103">
2437 <summary>
2438 Append vmware system configuration files.
2439 </summary>
2440 @@ -7960,7 +8265,7 @@ Domain allowed access.
2441 </summary>
2442 </param>
2443 </interface>
2444 -<interface name="vmware_append_log" lineno="107">
2445 +<interface name="vmware_append_log" lineno="122">
2446 <summary>
2447 Append vmware log files.
2448 </summary>
2449 @@ -8025,22 +8330,33 @@ be labeled public_content_rw_t.
2450 </module>
2451 <module name="wine" filename="policy/modules/apps/wine.if">
2452 <summary>Run Windows programs in Linux.</summary>
2453 -<interface name="wine_role" lineno="18">
2454 +<template name="wine_role" lineno="29">
2455 <summary>
2456 Role access for wine.
2457 </summary>
2458 -<param name="role">
2459 +<param name="role_prefix">
2460 <summary>
2461 -Role allowed access.
2462 +The prefix of the user role (e.g., user
2463 +is the prefix for user_r).
2464 </summary>
2465 </param>
2466 -<param name="domain">
2467 +<param name="user_domain">
2468 <summary>
2469 User domain for the role.
2470 </summary>
2471 </param>
2472 -</interface>
2473 -<template name="wine_role_template" lineno="73">
2474 +<param name="user_exec_domain">
2475 +<summary>
2476 +User exec domain for execute and transition access.
2477 +</summary>
2478 +</param>
2479 +<param name="role">
2480 +<summary>
2481 +Role allowed access
2482 +</summary>
2483 +</param>
2484 +</template>
2485 +<template name="wine_role_template" lineno="89">
2486 <summary>
2487 The role template for the wine module.
2488 </summary>
2489 @@ -8052,22 +8368,27 @@ for wine applications.
2490 </desc>
2491 <param name="role_prefix">
2492 <summary>
2493 -The prefix of the user domain (e.g., user
2494 -is the prefix for user_t).
2495 +The prefix of the user role (e.g., user
2496 +is the prefix for user_r).
2497 </summary>
2498 </param>
2499 -<param name="user_role">
2500 +<param name="user_domain">
2501 <summary>
2502 -The role associated with the user domain.
2503 +User domain for the role.
2504 </summary>
2505 </param>
2506 -<param name="user_domain">
2507 +<param name="user_exec_domain">
2508 <summary>
2509 -The type of the user domain.
2510 +User exec domain for execute and transition access.
2511 +</summary>
2512 +</param>
2513 +<param name="role">
2514 +<summary>
2515 +Role allowed access
2516 </summary>
2517 </param>
2518 </template>
2519 -<interface name="wine_domtrans" lineno="114">
2520 +<interface name="wine_domtrans" lineno="130">
2521 <summary>
2522 Execute the wine program in the wine domain.
2523 </summary>
2524 @@ -8077,7 +8398,7 @@ Domain allowed to transition.
2525 </summary>
2526 </param>
2527 </interface>
2528 -<interface name="wine_run" lineno="140">
2529 +<interface name="wine_run" lineno="156">
2530 <summary>
2531 Execute wine in the wine domain,
2532 and allow the specified role
2533 @@ -8094,7 +8415,7 @@ Role allowed access.
2534 </summary>
2535 </param>
2536 </interface>
2537 -<interface name="wine_rw_shm" lineno="160">
2538 +<interface name="wine_rw_shm" lineno="176">
2539 <summary>
2540 Read and write wine Shared
2541 memory segments.
2542 @@ -8117,22 +8438,33 @@ be silently blocked.
2543 </module>
2544 <module name="wireshark" filename="policy/modules/apps/wireshark.if">
2545 <summary>Wireshark packet capture tool.</summary>
2546 -<interface name="wireshark_role" lineno="18">
2547 +<template name="wireshark_role" lineno="29">
2548 <summary>
2549 Role access for wireshark.
2550 </summary>
2551 -<param name="role">
2552 +<param name="role_prefix">
2553 <summary>
2554 -Role allowed access.
2555 +The prefix of the user role (e.g., user
2556 +is the prefix for user_r).
2557 </summary>
2558 </param>
2559 -<param name="domain">
2560 +<param name="user_domain">
2561 <summary>
2562 User domain for the role.
2563 </summary>
2564 </param>
2565 -</interface>
2566 -<interface name="wireshark_domtrans" lineno="50">
2567 +<param name="user_exec_domain">
2568 +<summary>
2569 +User exec domain for execute and transition access.
2570 +</summary>
2571 +</param>
2572 +<param name="role">
2573 +<summary>
2574 +Role allowed access
2575 +</summary>
2576 +</param>
2577 +</template>
2578 +<interface name="wireshark_domtrans" lineno="65">
2579 <summary>
2580 Execute wireshark in wireshark domain.
2581 </summary>
2582 @@ -8173,7 +8505,7 @@ Grant the wireshark domains manage rights on all user content
2583 </module>
2584 <module name="wm" filename="policy/modules/apps/wm.if">
2585 <summary>X Window Managers.</summary>
2586 -<template name="wm_role_template" lineno="30">
2587 +<template name="wm_role_template" lineno="35">
2588 <summary>
2589 The role template for the wm module.
2590 </summary>
2591 @@ -8185,22 +8517,27 @@ for window manager applications.
2592 </desc>
2593 <param name="role_prefix">
2594 <summary>
2595 -The prefix of the user domain (e.g., user
2596 -is the prefix for user_t).
2597 +The prefix of the user role (e.g., user
2598 +is the prefix for user_r).
2599 </summary>
2600 </param>
2601 -<param name="user_role">
2602 +<param name="user_domain">
2603 <summary>
2604 -The role associated with the user domain.
2605 +User domain for the role.
2606 </summary>
2607 </param>
2608 -<param name="user_domain">
2609 +<param name="user_exec_domain">
2610 <summary>
2611 -The type of the user domain.
2612 +User exec domain for execute and transition access.
2613 +</summary>
2614 +</param>
2615 +<param name="role">
2616 +<summary>
2617 +Role allowed access
2618 </summary>
2619 </param>
2620 </template>
2621 -<interface name="wm_exec" lineno="117">
2622 +<interface name="wm_exec" lineno="126">
2623 <summary>
2624 Execute wm in the caller domain.
2625 </summary>
2626 @@ -8210,7 +8547,7 @@ Domain allowed access.
2627 </summary>
2628 </param>
2629 </interface>
2630 -<template name="wm_dbus_chat" lineno="143">
2631 +<template name="wm_dbus_chat" lineno="152">
2632 <summary>
2633 Send and receive messages from
2634 specified wm over dbus.
2635 @@ -8227,7 +8564,7 @@ Domain allowed access.
2636 </summary>
2637 </param>
2638 </template>
2639 -<interface name="wm_dontaudit_exec_tmp_files" lineno="164">
2640 +<interface name="wm_dontaudit_exec_tmp_files" lineno="173">
2641 <summary>
2642 Do not audit attempts to execute
2643 files in temporary directories.
2644 @@ -8238,7 +8575,7 @@ Domain to not audit.
2645 </summary>
2646 </param>
2647 </interface>
2648 -<interface name="wm_dontaudit_exec_tmpfs_files" lineno="183">
2649 +<interface name="wm_dontaudit_exec_tmpfs_files" lineno="192">
2650 <summary>
2651 Do not audit attempts to execute
2652 files in temporary filesystems.
2653 @@ -8249,7 +8586,7 @@ Domain to not audit.
2654 </summary>
2655 </param>
2656 </interface>
2657 -<interface name="wm_application_domain" lineno="226">
2658 +<interface name="wm_application_domain" lineno="235">
2659 <summary>
2660 Create a domain for applications
2661 that are launched by the window
2662 @@ -8284,7 +8621,7 @@ Type to be used as the source window manager domain.
2663 </param>
2664 <infoflow type="none"/>
2665 </interface>
2666 -<template name="wm_write_pipes" lineno="251">
2667 +<template name="wm_write_pipes" lineno="260">
2668 <summary>
2669 Write wm unnamed pipes.
2670 </summary>
2671 @@ -8303,21 +8640,32 @@ Domain allowed access.
2672 </module>
2673 <module name="xscreensaver" filename="policy/modules/apps/xscreensaver.if">
2674 <summary>Modular screen saver and locker for X11.</summary>
2675 -<interface name="xscreensaver_role" lineno="18">
2676 +<template name="xscreensaver_role" lineno="29">
2677 <summary>
2678 Role access for xscreensaver.
2679 </summary>
2680 -<param name="role">
2681 +<param name="role_prefix">
2682 <summary>
2683 -Role allowed access.
2684 +The prefix of the user role (e.g., user
2685 +is the prefix for user_r).
2686 </summary>
2687 </param>
2688 -<param name="domain">
2689 +<param name="user_domain">
2690 <summary>
2691 User domain for the role.
2692 </summary>
2693 </param>
2694 -</interface>
2695 +<param name="user_exec_domain">
2696 +<summary>
2697 +User exec domain for execute and transition access.
2698 +</summary>
2699 +</param>
2700 +<param name="role">
2701 +<summary>
2702 +Role allowed access
2703 +</summary>
2704 +</param>
2705 +</template>
2706 <tunable name="xscreensaver_read_generic_user_content" dftval="true">
2707 <desc>
2708 <p>
2709 @@ -9631,7 +9979,17 @@ Domain allowed access.
2710 </summary>
2711 </param>
2712 </interface>
2713 -<interface name="corecmd_relabel_bin_files" lineno="346">
2714 +<interface name="corecmd_manage_bin_symlinks" lineno="346">
2715 +<summary>
2716 +Manage symlinks for bin files.
2717 +</summary>
2718 +<param name="domain">
2719 +<summary>
2720 +Domain allowed access.
2721 +</summary>
2722 +</param>
2723 +</interface>
2724 +<interface name="corecmd_relabel_bin_files" lineno="365">
2725 <summary>
2726 Relabel to and from the bin type.
2727 </summary>
2728 @@ -9641,7 +9999,7 @@ Domain allowed access.
2729 </summary>
2730 </param>
2731 </interface>
2732 -<interface name="corecmd_mmap_bin_files" lineno="365">
2733 +<interface name="corecmd_mmap_bin_files" lineno="384">
2734 <summary>
2735 Mmap a bin file as executable.
2736 </summary>
2737 @@ -9651,7 +10009,7 @@ Domain allowed access.
2738 </summary>
2739 </param>
2740 </interface>
2741 -<interface name="corecmd_bin_spec_domtrans" lineno="410">
2742 +<interface name="corecmd_bin_spec_domtrans" lineno="429">
2743 <summary>
2744 Execute a file in a bin directory
2745 in the specified domain but do not
2746 @@ -9687,7 +10045,7 @@ The type of the new process.
2747 </summary>
2748 </param>
2749 </interface>
2750 -<interface name="corecmd_bin_domtrans" lineno="453">
2751 +<interface name="corecmd_bin_domtrans" lineno="472">
2752 <summary>
2753 Execute a file in a bin directory
2754 in the specified domain.
2755 @@ -9721,7 +10079,7 @@ The type of the new process.
2756 </summary>
2757 </param>
2758 </interface>
2759 -<interface name="corecmd_check_exec_shell" lineno="472">
2760 +<interface name="corecmd_check_exec_shell" lineno="491">
2761 <summary>
2762 Check if a shell is executable (DAC-wise).
2763 </summary>
2764 @@ -9731,7 +10089,7 @@ Domain allowed access.
2765 </summary>
2766 </param>
2767 </interface>
2768 -<interface name="corecmd_exec_shell" lineno="509">
2769 +<interface name="corecmd_exec_shell" lineno="528">
2770 <summary>
2771 Execute shells in the caller domain.
2772 </summary>
2773 @@ -9759,7 +10117,7 @@ Domain allowed access.
2774 </summary>
2775 </param>
2776 </interface>
2777 -<interface name="corecmd_shell_spec_domtrans" lineno="547">
2778 +<interface name="corecmd_shell_spec_domtrans" lineno="566">
2779 <summary>
2780 Execute a shell in the target domain. This
2781 is an explicit transition, requiring the
2782 @@ -9788,7 +10146,7 @@ The type of the shell process.
2783 </summary>
2784 </param>
2785 </interface>
2786 -<interface name="corecmd_shell_domtrans" lineno="581">
2787 +<interface name="corecmd_shell_domtrans" lineno="600">
2788 <summary>
2789 Execute a shell in the specified domain.
2790 </summary>
2791 @@ -9813,7 +10171,7 @@ The type of the shell process.
2792 </summary>
2793 </param>
2794 </interface>
2795 -<interface name="corecmd_exec_chroot" lineno="600">
2796 +<interface name="corecmd_exec_chroot" lineno="619">
2797 <summary>
2798 Execute chroot in the caller domain.
2799 </summary>
2800 @@ -9823,7 +10181,7 @@ Domain allowed access.
2801 </summary>
2802 </param>
2803 </interface>
2804 -<interface name="corecmd_getattr_all_executables" lineno="621">
2805 +<interface name="corecmd_getattr_all_executables" lineno="640">
2806 <summary>
2807 Get the attributes of all executable files.
2808 </summary>
2809 @@ -9834,7 +10192,7 @@ Domain allowed access.
2810 </param>
2811 <rolecap/>
2812 </interface>
2813 -<interface name="corecmd_read_all_executables" lineno="642">
2814 +<interface name="corecmd_read_all_executables" lineno="661">
2815 <summary>
2816 Read all executable files.
2817 </summary>
2818 @@ -9845,7 +10203,7 @@ Domain allowed access.
2819 </param>
2820 <rolecap/>
2821 </interface>
2822 -<interface name="corecmd_exec_all_executables" lineno="662">
2823 +<interface name="corecmd_exec_all_executables" lineno="681">
2824 <summary>
2825 Execute all executable files.
2826 </summary>
2827 @@ -9856,7 +10214,7 @@ Domain allowed access.
2828 </param>
2829 <rolecap/>
2830 </interface>
2831 -<interface name="corecmd_dontaudit_exec_all_executables" lineno="683">
2832 +<interface name="corecmd_dontaudit_exec_all_executables" lineno="702">
2833 <summary>
2834 Do not audit attempts to execute all executables.
2835 </summary>
2836 @@ -9866,7 +10224,7 @@ Domain to not audit.
2837 </summary>
2838 </param>
2839 </interface>
2840 -<interface name="corecmd_manage_all_executables" lineno="702">
2841 +<interface name="corecmd_manage_all_executables" lineno="721">
2842 <summary>
2843 Create, read, write, and all executable files.
2844 </summary>
2845 @@ -9877,7 +10235,7 @@ Domain allowed access.
2846 </param>
2847 <rolecap/>
2848 </interface>
2849 -<interface name="corecmd_relabel_all_executables" lineno="724">
2850 +<interface name="corecmd_relabel_all_executables" lineno="743">
2851 <summary>
2852 Relabel to and from the bin type.
2853 </summary>
2854 @@ -9888,7 +10246,7 @@ Domain allowed access.
2855 </param>
2856 <rolecap/>
2857 </interface>
2858 -<interface name="corecmd_mmap_all_executables" lineno="744">
2859 +<interface name="corecmd_mmap_all_executables" lineno="763">
2860 <summary>
2861 Mmap all executables as executable.
2862 </summary>
2863 @@ -9898,7 +10256,7 @@ Domain allowed access.
2864 </summary>
2865 </param>
2866 </interface>
2867 -<interface name="corecmd_relabel_bin_dirs" lineno="766">
2868 +<interface name="corecmd_relabel_bin_dirs" lineno="785">
2869 <summary>
2870 Relabel to and from the bin type.
2871 </summary>
2872 @@ -9908,7 +10266,7 @@ Domain allowed access.
2873 </summary>
2874 </param>
2875 </interface>
2876 -<interface name="corecmd_relabel_bin_lnk_files" lineno="784">
2877 +<interface name="corecmd_relabel_bin_lnk_files" lineno="803">
2878 <summary>
2879 Relabel to and from the bin type.
2880 </summary>
2881 @@ -45704,7 +46062,269 @@ Domain allowed access.
2882 </summary>
2883 </param>
2884 </interface>
2885 -<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="57554">
2886 +<interface name="corenet_tcp_sendrecv_ntske_port" lineno="57554">
2887 +<summary>
2888 +Send and receive TCP traffic on the ntske port.
2889 +</summary>
2890 +<param name="domain">
2891 +<summary>
2892 +Domain allowed access.
2893 +</summary>
2894 +</param>
2895 +<infoflow type="both" weight="10"/>
2896 +</interface>
2897 +<interface name="corenet_udp_send_ntske_port" lineno="57569">
2898 +<summary>
2899 +Send UDP traffic on the ntske port.
2900 +</summary>
2901 +<param name="domain">
2902 +<summary>
2903 +Domain allowed access.
2904 +</summary>
2905 +</param>
2906 +<infoflow type="write" weight="10"/>
2907 +</interface>
2908 +<interface name="corenet_dontaudit_udp_send_ntske_port" lineno="57584">
2909 +<summary>
2910 +Do not audit attempts to send UDP traffic on the ntske port.
2911 +</summary>
2912 +<param name="domain">
2913 +<summary>
2914 +Domain to not audit.
2915 +</summary>
2916 +</param>
2917 +<infoflow type="none"/>
2918 +</interface>
2919 +<interface name="corenet_udp_receive_ntske_port" lineno="57599">
2920 +<summary>
2921 +Receive UDP traffic on the ntske port.
2922 +</summary>
2923 +<param name="domain">
2924 +<summary>
2925 +Domain allowed access.
2926 +</summary>
2927 +</param>
2928 +<infoflow type="read" weight="10"/>
2929 +</interface>
2930 +<interface name="corenet_dontaudit_udp_receive_ntske_port" lineno="57614">
2931 +<summary>
2932 +Do not audit attempts to receive UDP traffic on the ntske port.
2933 +</summary>
2934 +<param name="domain">
2935 +<summary>
2936 +Domain to not audit.
2937 +</summary>
2938 +</param>
2939 +<infoflow type="none"/>
2940 +</interface>
2941 +<interface name="corenet_udp_sendrecv_ntske_port" lineno="57629">
2942 +<summary>
2943 +Send and receive UDP traffic on the ntske port.
2944 +</summary>
2945 +<param name="domain">
2946 +<summary>
2947 +Domain allowed access.
2948 +</summary>
2949 +</param>
2950 +<infoflow type="both" weight="10"/>
2951 +</interface>
2952 +<interface name="corenet_dontaudit_udp_sendrecv_ntske_port" lineno="57645">
2953 +<summary>
2954 +Do not audit attempts to send and receive
2955 +UDP traffic on the ntske port.
2956 +</summary>
2957 +<param name="domain">
2958 +<summary>
2959 +Domain to not audit.
2960 +</summary>
2961 +</param>
2962 +<infoflow type="none"/>
2963 +</interface>
2964 +<interface name="corenet_tcp_bind_ntske_port" lineno="57660">
2965 +<summary>
2966 +Bind TCP sockets to the ntske port.
2967 +</summary>
2968 +<param name="domain">
2969 +<summary>
2970 +Domain allowed access.
2971 +</summary>
2972 +</param>
2973 +<infoflow type="none"/>
2974 +</interface>
2975 +<interface name="corenet_udp_bind_ntske_port" lineno="57680">
2976 +<summary>
2977 +Bind UDP sockets to the ntske port.
2978 +</summary>
2979 +<param name="domain">
2980 +<summary>
2981 +Domain allowed access.
2982 +</summary>
2983 +</param>
2984 +<infoflow type="none"/>
2985 +</interface>
2986 +<interface name="corenet_tcp_connect_ntske_port" lineno="57699">
2987 +<summary>
2988 +Make a TCP connection to the ntske port.
2989 +</summary>
2990 +<param name="domain">
2991 +<summary>
2992 +Domain allowed access.
2993 +</summary>
2994 +</param>
2995 +</interface>
2996 +<interface name="corenet_send_ntske_client_packets" lineno="57719">
2997 +<summary>
2998 +Send ntske_client packets.
2999 +</summary>
3000 +<param name="domain">
3001 +<summary>
3002 +Domain allowed access.
3003 +</summary>
3004 +</param>
3005 +<infoflow type="write" weight="10"/>
3006 +</interface>
3007 +<interface name="corenet_dontaudit_send_ntske_client_packets" lineno="57738">
3008 +<summary>
3009 +Do not audit attempts to send ntske_client packets.
3010 +</summary>
3011 +<param name="domain">
3012 +<summary>
3013 +Domain to not audit.
3014 +</summary>
3015 +</param>
3016 +<infoflow type="none"/>
3017 +</interface>
3018 +<interface name="corenet_receive_ntske_client_packets" lineno="57757">
3019 +<summary>
3020 +Receive ntske_client packets.
3021 +</summary>
3022 +<param name="domain">
3023 +<summary>
3024 +Domain allowed access.
3025 +</summary>
3026 +</param>
3027 +<infoflow type="read" weight="10"/>
3028 +</interface>
3029 +<interface name="corenet_dontaudit_receive_ntske_client_packets" lineno="57776">
3030 +<summary>
3031 +Do not audit attempts to receive ntske_client packets.
3032 +</summary>
3033 +<param name="domain">
3034 +<summary>
3035 +Domain allowed access.
3036 +</summary>
3037 +</param>
3038 +<infoflow type="none"/>
3039 +</interface>
3040 +<interface name="corenet_sendrecv_ntske_client_packets" lineno="57795">
3041 +<summary>
3042 +Send and receive ntske_client packets.
3043 +</summary>
3044 +<param name="domain">
3045 +<summary>
3046 +Domain allowed access.
3047 +</summary>
3048 +</param>
3049 +<infoflow type="both" weight="10"/>
3050 +</interface>
3051 +<interface name="corenet_dontaudit_sendrecv_ntske_client_packets" lineno="57811">
3052 +<summary>
3053 +Do not audit attempts to send and receive ntske_client packets.
3054 +</summary>
3055 +<param name="domain">
3056 +<summary>
3057 +Domain to not audit.
3058 +</summary>
3059 +</param>
3060 +<infoflow type="none"/>
3061 +</interface>
3062 +<interface name="corenet_relabelto_ntske_client_packets" lineno="57826">
3063 +<summary>
3064 +Relabel packets to ntske_client the packet type.
3065 +</summary>
3066 +<param name="domain">
3067 +<summary>
3068 +Domain allowed access.
3069 +</summary>
3070 +</param>
3071 +</interface>
3072 +<interface name="corenet_send_ntske_server_packets" lineno="57846">
3073 +<summary>
3074 +Send ntske_server packets.
3075 +</summary>
3076 +<param name="domain">
3077 +<summary>
3078 +Domain allowed access.
3079 +</summary>
3080 +</param>
3081 +<infoflow type="write" weight="10"/>
3082 +</interface>
3083 +<interface name="corenet_dontaudit_send_ntske_server_packets" lineno="57865">
3084 +<summary>
3085 +Do not audit attempts to send ntske_server packets.
3086 +</summary>
3087 +<param name="domain">
3088 +<summary>
3089 +Domain to not audit.
3090 +</summary>
3091 +</param>
3092 +<infoflow type="none"/>
3093 +</interface>
3094 +<interface name="corenet_receive_ntske_server_packets" lineno="57884">
3095 +<summary>
3096 +Receive ntske_server packets.
3097 +</summary>
3098 +<param name="domain">
3099 +<summary>
3100 +Domain allowed access.
3101 +</summary>
3102 +</param>
3103 +<infoflow type="read" weight="10"/>
3104 +</interface>
3105 +<interface name="corenet_dontaudit_receive_ntske_server_packets" lineno="57903">
3106 +<summary>
3107 +Do not audit attempts to receive ntske_server packets.
3108 +</summary>
3109 +<param name="domain">
3110 +<summary>
3111 +Domain allowed access.
3112 +</summary>
3113 +</param>
3114 +<infoflow type="none"/>
3115 +</interface>
3116 +<interface name="corenet_sendrecv_ntske_server_packets" lineno="57922">
3117 +<summary>
3118 +Send and receive ntske_server packets.
3119 +</summary>
3120 +<param name="domain">
3121 +<summary>
3122 +Domain allowed access.
3123 +</summary>
3124 +</param>
3125 +<infoflow type="both" weight="10"/>
3126 +</interface>
3127 +<interface name="corenet_dontaudit_sendrecv_ntske_server_packets" lineno="57938">
3128 +<summary>
3129 +Do not audit attempts to send and receive ntske_server packets.
3130 +</summary>
3131 +<param name="domain">
3132 +<summary>
3133 +Domain to not audit.
3134 +</summary>
3135 +</param>
3136 +<infoflow type="none"/>
3137 +</interface>
3138 +<interface name="corenet_relabelto_ntske_server_packets" lineno="57953">
3139 +<summary>
3140 +Relabel packets to ntske_server the packet type.
3141 +</summary>
3142 +<param name="domain">
3143 +<summary>
3144 +Domain allowed access.
3145 +</summary>
3146 +</param>
3147 +</interface>
3148 +<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="57975">
3149 <summary>
3150 Send and receive TCP traffic on the oa_system port.
3151 </summary>
3152 @@ -45715,7 +46335,7 @@ Domain allowed access.
3153 </param>
3154 <infoflow type="both" weight="10"/>
3155 </interface>
3156 -<interface name="corenet_udp_send_oa_system_port" lineno="57569">
3157 +<interface name="corenet_udp_send_oa_system_port" lineno="57990">
3158 <summary>
3159 Send UDP traffic on the oa_system port.
3160 </summary>
3161 @@ -45726,7 +46346,7 @@ Domain allowed access.
3162 </param>
3163 <infoflow type="write" weight="10"/>
3164 </interface>
3165 -<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="57584">
3166 +<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="58005">
3167 <summary>
3168 Do not audit attempts to send UDP traffic on the oa_system port.
3169 </summary>
3170 @@ -45737,7 +46357,7 @@ Domain to not audit.
3171 </param>
3172 <infoflow type="none"/>
3173 </interface>
3174 -<interface name="corenet_udp_receive_oa_system_port" lineno="57599">
3175 +<interface name="corenet_udp_receive_oa_system_port" lineno="58020">
3176 <summary>
3177 Receive UDP traffic on the oa_system port.
3178 </summary>
3179 @@ -45748,7 +46368,7 @@ Domain allowed access.
3180 </param>
3181 <infoflow type="read" weight="10"/>
3182 </interface>
3183 -<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="57614">
3184 +<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="58035">
3185 <summary>
3186 Do not audit attempts to receive UDP traffic on the oa_system port.
3187 </summary>
3188 @@ -45759,7 +46379,7 @@ Domain to not audit.
3189 </param>
3190 <infoflow type="none"/>
3191 </interface>
3192 -<interface name="corenet_udp_sendrecv_oa_system_port" lineno="57629">
3193 +<interface name="corenet_udp_sendrecv_oa_system_port" lineno="58050">
3194 <summary>
3195 Send and receive UDP traffic on the oa_system port.
3196 </summary>
3197 @@ -45770,7 +46390,7 @@ Domain allowed access.
3198 </param>
3199 <infoflow type="both" weight="10"/>
3200 </interface>
3201 -<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="57645">
3202 +<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="58066">
3203 <summary>
3204 Do not audit attempts to send and receive
3205 UDP traffic on the oa_system port.
3206 @@ -45782,7 +46402,7 @@ Domain to not audit.
3207 </param>
3208 <infoflow type="none"/>
3209 </interface>
3210 -<interface name="corenet_tcp_bind_oa_system_port" lineno="57660">
3211 +<interface name="corenet_tcp_bind_oa_system_port" lineno="58081">
3212 <summary>
3213 Bind TCP sockets to the oa_system port.
3214 </summary>
3215 @@ -45793,7 +46413,7 @@ Domain allowed access.
3216 </param>
3217 <infoflow type="none"/>
3218 </interface>
3219 -<interface name="corenet_udp_bind_oa_system_port" lineno="57680">
3220 +<interface name="corenet_udp_bind_oa_system_port" lineno="58101">
3221 <summary>
3222 Bind UDP sockets to the oa_system port.
3223 </summary>
3224 @@ -45804,7 +46424,7 @@ Domain allowed access.
3225 </param>
3226 <infoflow type="none"/>
3227 </interface>
3228 -<interface name="corenet_tcp_connect_oa_system_port" lineno="57699">
3229 +<interface name="corenet_tcp_connect_oa_system_port" lineno="58120">
3230 <summary>
3231 Make a TCP connection to the oa_system port.
3232 </summary>
3233 @@ -45814,7 +46434,7 @@ Domain allowed access.
3234 </summary>
3235 </param>
3236 </interface>
3237 -<interface name="corenet_send_oa_system_client_packets" lineno="57719">
3238 +<interface name="corenet_send_oa_system_client_packets" lineno="58140">
3239 <summary>
3240 Send oa_system_client packets.
3241 </summary>
3242 @@ -45825,7 +46445,7 @@ Domain allowed access.
3243 </param>
3244 <infoflow type="write" weight="10"/>
3245 </interface>
3246 -<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="57738">
3247 +<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="58159">
3248 <summary>
3249 Do not audit attempts to send oa_system_client packets.
3250 </summary>
3251 @@ -45836,7 +46456,7 @@ Domain to not audit.
3252 </param>
3253 <infoflow type="none"/>
3254 </interface>
3255 -<interface name="corenet_receive_oa_system_client_packets" lineno="57757">
3256 +<interface name="corenet_receive_oa_system_client_packets" lineno="58178">
3257 <summary>
3258 Receive oa_system_client packets.
3259 </summary>
3260 @@ -45847,7 +46467,7 @@ Domain allowed access.
3261 </param>
3262 <infoflow type="read" weight="10"/>
3263 </interface>
3264 -<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="57776">
3265 +<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="58197">
3266 <summary>
3267 Do not audit attempts to receive oa_system_client packets.
3268 </summary>
3269 @@ -45858,7 +46478,7 @@ Domain allowed access.
3270 </param>
3271 <infoflow type="none"/>
3272 </interface>
3273 -<interface name="corenet_sendrecv_oa_system_client_packets" lineno="57795">
3274 +<interface name="corenet_sendrecv_oa_system_client_packets" lineno="58216">
3275 <summary>
3276 Send and receive oa_system_client packets.
3277 </summary>
3278 @@ -45869,7 +46489,7 @@ Domain allowed access.
3279 </param>
3280 <infoflow type="both" weight="10"/>
3281 </interface>
3282 -<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="57811">
3283 +<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="58232">
3284 <summary>
3285 Do not audit attempts to send and receive oa_system_client packets.
3286 </summary>
3287 @@ -45880,7 +46500,7 @@ Domain to not audit.
3288 </param>
3289 <infoflow type="none"/>
3290 </interface>
3291 -<interface name="corenet_relabelto_oa_system_client_packets" lineno="57826">
3292 +<interface name="corenet_relabelto_oa_system_client_packets" lineno="58247">
3293 <summary>
3294 Relabel packets to oa_system_client the packet type.
3295 </summary>
3296 @@ -45890,7 +46510,7 @@ Domain allowed access.
3297 </summary>
3298 </param>
3299 </interface>
3300 -<interface name="corenet_send_oa_system_server_packets" lineno="57846">
3301 +<interface name="corenet_send_oa_system_server_packets" lineno="58267">
3302 <summary>
3303 Send oa_system_server packets.
3304 </summary>
3305 @@ -45901,7 +46521,7 @@ Domain allowed access.
3306 </param>
3307 <infoflow type="write" weight="10"/>
3308 </interface>
3309 -<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="57865">
3310 +<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="58286">
3311 <summary>
3312 Do not audit attempts to send oa_system_server packets.
3313 </summary>
3314 @@ -45912,7 +46532,7 @@ Domain to not audit.
3315 </param>
3316 <infoflow type="none"/>
3317 </interface>
3318 -<interface name="corenet_receive_oa_system_server_packets" lineno="57884">
3319 +<interface name="corenet_receive_oa_system_server_packets" lineno="58305">
3320 <summary>
3321 Receive oa_system_server packets.
3322 </summary>
3323 @@ -45923,7 +46543,7 @@ Domain allowed access.
3324 </param>
3325 <infoflow type="read" weight="10"/>
3326 </interface>
3327 -<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="57903">
3328 +<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="58324">
3329 <summary>
3330 Do not audit attempts to receive oa_system_server packets.
3331 </summary>
3332 @@ -45934,7 +46554,7 @@ Domain allowed access.
3333 </param>
3334 <infoflow type="none"/>
3335 </interface>
3336 -<interface name="corenet_sendrecv_oa_system_server_packets" lineno="57922">
3337 +<interface name="corenet_sendrecv_oa_system_server_packets" lineno="58343">
3338 <summary>
3339 Send and receive oa_system_server packets.
3340 </summary>
3341 @@ -45945,7 +46565,7 @@ Domain allowed access.
3342 </param>
3343 <infoflow type="both" weight="10"/>
3344 </interface>
3345 -<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="57938">
3346 +<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="58359">
3347 <summary>
3348 Do not audit attempts to send and receive oa_system_server packets.
3349 </summary>
3350 @@ -45956,7 +46576,7 @@ Domain to not audit.
3351 </param>
3352 <infoflow type="none"/>
3353 </interface>
3354 -<interface name="corenet_relabelto_oa_system_server_packets" lineno="57953">
3355 +<interface name="corenet_relabelto_oa_system_server_packets" lineno="58374">
3356 <summary>
3357 Relabel packets to oa_system_server the packet type.
3358 </summary>
3359 @@ -45966,7 +46586,7 @@ Domain allowed access.
3360 </summary>
3361 </param>
3362 </interface>
3363 -<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="57975">
3364 +<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="58396">
3365 <summary>
3366 Send and receive TCP traffic on the oracledb port.
3367 </summary>
3368 @@ -45977,7 +46597,7 @@ Domain allowed access.
3369 </param>
3370 <infoflow type="both" weight="10"/>
3371 </interface>
3372 -<interface name="corenet_udp_send_oracledb_port" lineno="57990">
3373 +<interface name="corenet_udp_send_oracledb_port" lineno="58411">
3374 <summary>
3375 Send UDP traffic on the oracledb port.
3376 </summary>
3377 @@ -45988,7 +46608,7 @@ Domain allowed access.
3378 </param>
3379 <infoflow type="write" weight="10"/>
3380 </interface>
3381 -<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="58005">
3382 +<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="58426">
3383 <summary>
3384 Do not audit attempts to send UDP traffic on the oracledb port.
3385 </summary>
3386 @@ -45999,7 +46619,7 @@ Domain to not audit.
3387 </param>
3388 <infoflow type="none"/>
3389 </interface>
3390 -<interface name="corenet_udp_receive_oracledb_port" lineno="58020">
3391 +<interface name="corenet_udp_receive_oracledb_port" lineno="58441">
3392 <summary>
3393 Receive UDP traffic on the oracledb port.
3394 </summary>
3395 @@ -46010,7 +46630,7 @@ Domain allowed access.
3396 </param>
3397 <infoflow type="read" weight="10"/>
3398 </interface>
3399 -<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="58035">
3400 +<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="58456">
3401 <summary>
3402 Do not audit attempts to receive UDP traffic on the oracledb port.
3403 </summary>
3404 @@ -46021,7 +46641,7 @@ Domain to not audit.
3405 </param>
3406 <infoflow type="none"/>
3407 </interface>
3408 -<interface name="corenet_udp_sendrecv_oracledb_port" lineno="58050">
3409 +<interface name="corenet_udp_sendrecv_oracledb_port" lineno="58471">
3410 <summary>
3411 Send and receive UDP traffic on the oracledb port.
3412 </summary>
3413 @@ -46032,7 +46652,7 @@ Domain allowed access.
3414 </param>
3415 <infoflow type="both" weight="10"/>
3416 </interface>
3417 -<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="58066">
3418 +<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="58487">
3419 <summary>
3420 Do not audit attempts to send and receive
3421 UDP traffic on the oracledb port.
3422 @@ -46044,7 +46664,7 @@ Domain to not audit.
3423 </param>
3424 <infoflow type="none"/>
3425 </interface>
3426 -<interface name="corenet_tcp_bind_oracledb_port" lineno="58081">
3427 +<interface name="corenet_tcp_bind_oracledb_port" lineno="58502">
3428 <summary>
3429 Bind TCP sockets to the oracledb port.
3430 </summary>
3431 @@ -46055,7 +46675,7 @@ Domain allowed access.
3432 </param>
3433 <infoflow type="none"/>
3434 </interface>
3435 -<interface name="corenet_udp_bind_oracledb_port" lineno="58101">
3436 +<interface name="corenet_udp_bind_oracledb_port" lineno="58522">
3437 <summary>
3438 Bind UDP sockets to the oracledb port.
3439 </summary>
3440 @@ -46066,7 +46686,7 @@ Domain allowed access.
3441 </param>
3442 <infoflow type="none"/>
3443 </interface>
3444 -<interface name="corenet_tcp_connect_oracledb_port" lineno="58120">
3445 +<interface name="corenet_tcp_connect_oracledb_port" lineno="58541">
3446 <summary>
3447 Make a TCP connection to the oracledb port.
3448 </summary>
3449 @@ -46076,7 +46696,7 @@ Domain allowed access.
3450 </summary>
3451 </param>
3452 </interface>
3453 -<interface name="corenet_send_oracledb_client_packets" lineno="58140">
3454 +<interface name="corenet_send_oracledb_client_packets" lineno="58561">
3455 <summary>
3456 Send oracledb_client packets.
3457 </summary>
3458 @@ -46087,7 +46707,7 @@ Domain allowed access.
3459 </param>
3460 <infoflow type="write" weight="10"/>
3461 </interface>
3462 -<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="58159">
3463 +<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="58580">
3464 <summary>
3465 Do not audit attempts to send oracledb_client packets.
3466 </summary>
3467 @@ -46098,7 +46718,7 @@ Domain to not audit.
3468 </param>
3469 <infoflow type="none"/>
3470 </interface>
3471 -<interface name="corenet_receive_oracledb_client_packets" lineno="58178">
3472 +<interface name="corenet_receive_oracledb_client_packets" lineno="58599">
3473 <summary>
3474 Receive oracledb_client packets.
3475 </summary>
3476 @@ -46109,7 +46729,7 @@ Domain allowed access.
3477 </param>
3478 <infoflow type="read" weight="10"/>
3479 </interface>
3480 -<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="58197">
3481 +<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="58618">
3482 <summary>
3483 Do not audit attempts to receive oracledb_client packets.
3484 </summary>
3485 @@ -46120,7 +46740,7 @@ Domain allowed access.
3486 </param>
3487 <infoflow type="none"/>
3488 </interface>
3489 -<interface name="corenet_sendrecv_oracledb_client_packets" lineno="58216">
3490 +<interface name="corenet_sendrecv_oracledb_client_packets" lineno="58637">
3491 <summary>
3492 Send and receive oracledb_client packets.
3493 </summary>
3494 @@ -46131,7 +46751,7 @@ Domain allowed access.
3495 </param>
3496 <infoflow type="both" weight="10"/>
3497 </interface>
3498 -<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="58232">
3499 +<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="58653">
3500 <summary>
3501 Do not audit attempts to send and receive oracledb_client packets.
3502 </summary>
3503 @@ -46142,7 +46762,7 @@ Domain to not audit.
3504 </param>
3505 <infoflow type="none"/>
3506 </interface>
3507 -<interface name="corenet_relabelto_oracledb_client_packets" lineno="58247">
3508 +<interface name="corenet_relabelto_oracledb_client_packets" lineno="58668">
3509 <summary>
3510 Relabel packets to oracledb_client the packet type.
3511 </summary>
3512 @@ -46152,7 +46772,7 @@ Domain allowed access.
3513 </summary>
3514 </param>
3515 </interface>
3516 -<interface name="corenet_send_oracledb_server_packets" lineno="58267">
3517 +<interface name="corenet_send_oracledb_server_packets" lineno="58688">
3518 <summary>
3519 Send oracledb_server packets.
3520 </summary>
3521 @@ -46163,7 +46783,7 @@ Domain allowed access.
3522 </param>
3523 <infoflow type="write" weight="10"/>
3524 </interface>
3525 -<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="58286">
3526 +<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="58707">
3527 <summary>
3528 Do not audit attempts to send oracledb_server packets.
3529 </summary>
3530 @@ -46174,7 +46794,7 @@ Domain to not audit.
3531 </param>
3532 <infoflow type="none"/>
3533 </interface>
3534 -<interface name="corenet_receive_oracledb_server_packets" lineno="58305">
3535 +<interface name="corenet_receive_oracledb_server_packets" lineno="58726">
3536 <summary>
3537 Receive oracledb_server packets.
3538 </summary>
3539 @@ -46185,7 +46805,7 @@ Domain allowed access.
3540 </param>
3541 <infoflow type="read" weight="10"/>
3542 </interface>
3543 -<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="58324">
3544 +<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="58745">
3545 <summary>
3546 Do not audit attempts to receive oracledb_server packets.
3547 </summary>
3548 @@ -46196,7 +46816,7 @@ Domain allowed access.
3549 </param>
3550 <infoflow type="none"/>
3551 </interface>
3552 -<interface name="corenet_sendrecv_oracledb_server_packets" lineno="58343">
3553 +<interface name="corenet_sendrecv_oracledb_server_packets" lineno="58764">
3554 <summary>
3555 Send and receive oracledb_server packets.
3556 </summary>
3557 @@ -46207,7 +46827,7 @@ Domain allowed access.
3558 </param>
3559 <infoflow type="both" weight="10"/>
3560 </interface>
3561 -<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="58359">
3562 +<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="58780">
3563 <summary>
3564 Do not audit attempts to send and receive oracledb_server packets.
3565 </summary>
3566 @@ -46218,7 +46838,7 @@ Domain to not audit.
3567 </param>
3568 <infoflow type="none"/>
3569 </interface>
3570 -<interface name="corenet_relabelto_oracledb_server_packets" lineno="58374">
3571 +<interface name="corenet_relabelto_oracledb_server_packets" lineno="58795">
3572 <summary>
3573 Relabel packets to oracledb_server the packet type.
3574 </summary>
3575 @@ -46228,7 +46848,7 @@ Domain allowed access.
3576 </summary>
3577 </param>
3578 </interface>
3579 -<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58396">
3580 +<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58817">
3581 <summary>
3582 Send and receive TCP traffic on the ocsp port.
3583 </summary>
3584 @@ -46239,7 +46859,7 @@ Domain allowed access.
3585 </param>
3586 <infoflow type="both" weight="10"/>
3587 </interface>
3588 -<interface name="corenet_udp_send_ocsp_port" lineno="58411">
3589 +<interface name="corenet_udp_send_ocsp_port" lineno="58832">
3590 <summary>
3591 Send UDP traffic on the ocsp port.
3592 </summary>
3593 @@ -46250,7 +46870,7 @@ Domain allowed access.
3594 </param>
3595 <infoflow type="write" weight="10"/>
3596 </interface>
3597 -<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58426">
3598 +<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58847">
3599 <summary>
3600 Do not audit attempts to send UDP traffic on the ocsp port.
3601 </summary>
3602 @@ -46261,7 +46881,7 @@ Domain to not audit.
3603 </param>
3604 <infoflow type="none"/>
3605 </interface>
3606 -<interface name="corenet_udp_receive_ocsp_port" lineno="58441">
3607 +<interface name="corenet_udp_receive_ocsp_port" lineno="58862">
3608 <summary>
3609 Receive UDP traffic on the ocsp port.
3610 </summary>
3611 @@ -46272,7 +46892,7 @@ Domain allowed access.
3612 </param>
3613 <infoflow type="read" weight="10"/>
3614 </interface>
3615 -<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58456">
3616 +<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58877">
3617 <summary>
3618 Do not audit attempts to receive UDP traffic on the ocsp port.
3619 </summary>
3620 @@ -46283,7 +46903,7 @@ Domain to not audit.
3621 </param>
3622 <infoflow type="none"/>
3623 </interface>
3624 -<interface name="corenet_udp_sendrecv_ocsp_port" lineno="58471">
3625 +<interface name="corenet_udp_sendrecv_ocsp_port" lineno="58892">
3626 <summary>
3627 Send and receive UDP traffic on the ocsp port.
3628 </summary>
3629 @@ -46294,7 +46914,7 @@ Domain allowed access.
3630 </param>
3631 <infoflow type="both" weight="10"/>
3632 </interface>
3633 -<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58487">
3634 +<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58908">
3635 <summary>
3636 Do not audit attempts to send and receive
3637 UDP traffic on the ocsp port.
3638 @@ -46306,7 +46926,7 @@ Domain to not audit.
3639 </param>
3640 <infoflow type="none"/>
3641 </interface>
3642 -<interface name="corenet_tcp_bind_ocsp_port" lineno="58502">
3643 +<interface name="corenet_tcp_bind_ocsp_port" lineno="58923">
3644 <summary>
3645 Bind TCP sockets to the ocsp port.
3646 </summary>
3647 @@ -46317,7 +46937,7 @@ Domain allowed access.
3648 </param>
3649 <infoflow type="none"/>
3650 </interface>
3651 -<interface name="corenet_udp_bind_ocsp_port" lineno="58522">
3652 +<interface name="corenet_udp_bind_ocsp_port" lineno="58943">
3653 <summary>
3654 Bind UDP sockets to the ocsp port.
3655 </summary>
3656 @@ -46328,7 +46948,7 @@ Domain allowed access.
3657 </param>
3658 <infoflow type="none"/>
3659 </interface>
3660 -<interface name="corenet_tcp_connect_ocsp_port" lineno="58541">
3661 +<interface name="corenet_tcp_connect_ocsp_port" lineno="58962">
3662 <summary>
3663 Make a TCP connection to the ocsp port.
3664 </summary>
3665 @@ -46338,7 +46958,7 @@ Domain allowed access.
3666 </summary>
3667 </param>
3668 </interface>
3669 -<interface name="corenet_send_ocsp_client_packets" lineno="58561">
3670 +<interface name="corenet_send_ocsp_client_packets" lineno="58982">
3671 <summary>
3672 Send ocsp_client packets.
3673 </summary>
3674 @@ -46349,7 +46969,7 @@ Domain allowed access.
3675 </param>
3676 <infoflow type="write" weight="10"/>
3677 </interface>
3678 -<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="58580">
3679 +<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="59001">
3680 <summary>
3681 Do not audit attempts to send ocsp_client packets.
3682 </summary>
3683 @@ -46360,7 +46980,7 @@ Domain to not audit.
3684 </param>
3685 <infoflow type="none"/>
3686 </interface>
3687 -<interface name="corenet_receive_ocsp_client_packets" lineno="58599">
3688 +<interface name="corenet_receive_ocsp_client_packets" lineno="59020">
3689 <summary>
3690 Receive ocsp_client packets.
3691 </summary>
3692 @@ -46371,7 +46991,7 @@ Domain allowed access.
3693 </param>
3694 <infoflow type="read" weight="10"/>
3695 </interface>
3696 -<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="58618">
3697 +<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="59039">
3698 <summary>
3699 Do not audit attempts to receive ocsp_client packets.
3700 </summary>
3701 @@ -46382,7 +47002,7 @@ Domain allowed access.
3702 </param>
3703 <infoflow type="none"/>
3704 </interface>
3705 -<interface name="corenet_sendrecv_ocsp_client_packets" lineno="58637">
3706 +<interface name="corenet_sendrecv_ocsp_client_packets" lineno="59058">
3707 <summary>
3708 Send and receive ocsp_client packets.
3709 </summary>
3710 @@ -46393,7 +47013,7 @@ Domain allowed access.
3711 </param>
3712 <infoflow type="both" weight="10"/>
3713 </interface>
3714 -<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="58653">
3715 +<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="59074">
3716 <summary>
3717 Do not audit attempts to send and receive ocsp_client packets.
3718 </summary>
3719 @@ -46404,7 +47024,7 @@ Domain to not audit.
3720 </param>
3721 <infoflow type="none"/>
3722 </interface>
3723 -<interface name="corenet_relabelto_ocsp_client_packets" lineno="58668">
3724 +<interface name="corenet_relabelto_ocsp_client_packets" lineno="59089">
3725 <summary>
3726 Relabel packets to ocsp_client the packet type.
3727 </summary>
3728 @@ -46414,7 +47034,7 @@ Domain allowed access.
3729 </summary>
3730 </param>
3731 </interface>
3732 -<interface name="corenet_send_ocsp_server_packets" lineno="58688">
3733 +<interface name="corenet_send_ocsp_server_packets" lineno="59109">
3734 <summary>
3735 Send ocsp_server packets.
3736 </summary>
3737 @@ -46425,7 +47045,7 @@ Domain allowed access.
3738 </param>
3739 <infoflow type="write" weight="10"/>
3740 </interface>
3741 -<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="58707">
3742 +<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="59128">
3743 <summary>
3744 Do not audit attempts to send ocsp_server packets.
3745 </summary>
3746 @@ -46436,7 +47056,7 @@ Domain to not audit.
3747 </param>
3748 <infoflow type="none"/>
3749 </interface>
3750 -<interface name="corenet_receive_ocsp_server_packets" lineno="58726">
3751 +<interface name="corenet_receive_ocsp_server_packets" lineno="59147">
3752 <summary>
3753 Receive ocsp_server packets.
3754 </summary>
3755 @@ -46447,7 +47067,7 @@ Domain allowed access.
3756 </param>
3757 <infoflow type="read" weight="10"/>
3758 </interface>
3759 -<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="58745">
3760 +<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="59166">
3761 <summary>
3762 Do not audit attempts to receive ocsp_server packets.
3763 </summary>
3764 @@ -46458,7 +47078,7 @@ Domain allowed access.
3765 </param>
3766 <infoflow type="none"/>
3767 </interface>
3768 -<interface name="corenet_sendrecv_ocsp_server_packets" lineno="58764">
3769 +<interface name="corenet_sendrecv_ocsp_server_packets" lineno="59185">
3770 <summary>
3771 Send and receive ocsp_server packets.
3772 </summary>
3773 @@ -46469,7 +47089,7 @@ Domain allowed access.
3774 </param>
3775 <infoflow type="both" weight="10"/>
3776 </interface>
3777 -<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="58780">
3778 +<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="59201">
3779 <summary>
3780 Do not audit attempts to send and receive ocsp_server packets.
3781 </summary>
3782 @@ -46480,7 +47100,7 @@ Domain to not audit.
3783 </param>
3784 <infoflow type="none"/>
3785 </interface>
3786 -<interface name="corenet_relabelto_ocsp_server_packets" lineno="58795">
3787 +<interface name="corenet_relabelto_ocsp_server_packets" lineno="59216">
3788 <summary>
3789 Relabel packets to ocsp_server the packet type.
3790 </summary>
3791 @@ -46490,7 +47110,7 @@ Domain allowed access.
3792 </summary>
3793 </param>
3794 </interface>
3795 -<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="58817">
3796 +<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="59238">
3797 <summary>
3798 Send and receive TCP traffic on the openhpid port.
3799 </summary>
3800 @@ -46501,7 +47121,7 @@ Domain allowed access.
3801 </param>
3802 <infoflow type="both" weight="10"/>
3803 </interface>
3804 -<interface name="corenet_udp_send_openhpid_port" lineno="58832">
3805 +<interface name="corenet_udp_send_openhpid_port" lineno="59253">
3806 <summary>
3807 Send UDP traffic on the openhpid port.
3808 </summary>
3809 @@ -46512,7 +47132,7 @@ Domain allowed access.
3810 </param>
3811 <infoflow type="write" weight="10"/>
3812 </interface>
3813 -<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="58847">
3814 +<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="59268">
3815 <summary>
3816 Do not audit attempts to send UDP traffic on the openhpid port.
3817 </summary>
3818 @@ -46523,7 +47143,7 @@ Domain to not audit.
3819 </param>
3820 <infoflow type="none"/>
3821 </interface>
3822 -<interface name="corenet_udp_receive_openhpid_port" lineno="58862">
3823 +<interface name="corenet_udp_receive_openhpid_port" lineno="59283">
3824 <summary>
3825 Receive UDP traffic on the openhpid port.
3826 </summary>
3827 @@ -46534,7 +47154,7 @@ Domain allowed access.
3828 </param>
3829 <infoflow type="read" weight="10"/>
3830 </interface>
3831 -<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="58877">
3832 +<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="59298">
3833 <summary>
3834 Do not audit attempts to receive UDP traffic on the openhpid port.
3835 </summary>
3836 @@ -46545,7 +47165,7 @@ Domain to not audit.
3837 </param>
3838 <infoflow type="none"/>
3839 </interface>
3840 -<interface name="corenet_udp_sendrecv_openhpid_port" lineno="58892">
3841 +<interface name="corenet_udp_sendrecv_openhpid_port" lineno="59313">
3842 <summary>
3843 Send and receive UDP traffic on the openhpid port.
3844 </summary>
3845 @@ -46556,7 +47176,7 @@ Domain allowed access.
3846 </param>
3847 <infoflow type="both" weight="10"/>
3848 </interface>
3849 -<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="58908">
3850 +<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="59329">
3851 <summary>
3852 Do not audit attempts to send and receive
3853 UDP traffic on the openhpid port.
3854 @@ -46568,7 +47188,7 @@ Domain to not audit.
3855 </param>
3856 <infoflow type="none"/>
3857 </interface>
3858 -<interface name="corenet_tcp_bind_openhpid_port" lineno="58923">
3859 +<interface name="corenet_tcp_bind_openhpid_port" lineno="59344">
3860 <summary>
3861 Bind TCP sockets to the openhpid port.
3862 </summary>
3863 @@ -46579,7 +47199,7 @@ Domain allowed access.
3864 </param>
3865 <infoflow type="none"/>
3866 </interface>
3867 -<interface name="corenet_udp_bind_openhpid_port" lineno="58943">
3868 +<interface name="corenet_udp_bind_openhpid_port" lineno="59364">
3869 <summary>
3870 Bind UDP sockets to the openhpid port.
3871 </summary>
3872 @@ -46590,7 +47210,7 @@ Domain allowed access.
3873 </param>
3874 <infoflow type="none"/>
3875 </interface>
3876 -<interface name="corenet_tcp_connect_openhpid_port" lineno="58962">
3877 +<interface name="corenet_tcp_connect_openhpid_port" lineno="59383">
3878 <summary>
3879 Make a TCP connection to the openhpid port.
3880 </summary>
3881 @@ -46600,7 +47220,7 @@ Domain allowed access.
3882 </summary>
3883 </param>
3884 </interface>
3885 -<interface name="corenet_send_openhpid_client_packets" lineno="58982">
3886 +<interface name="corenet_send_openhpid_client_packets" lineno="59403">
3887 <summary>
3888 Send openhpid_client packets.
3889 </summary>
3890 @@ -46611,7 +47231,7 @@ Domain allowed access.
3891 </param>
3892 <infoflow type="write" weight="10"/>
3893 </interface>
3894 -<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="59001">
3895 +<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="59422">
3896 <summary>
3897 Do not audit attempts to send openhpid_client packets.
3898 </summary>
3899 @@ -46622,7 +47242,7 @@ Domain to not audit.
3900 </param>
3901 <infoflow type="none"/>
3902 </interface>
3903 -<interface name="corenet_receive_openhpid_client_packets" lineno="59020">
3904 +<interface name="corenet_receive_openhpid_client_packets" lineno="59441">
3905 <summary>
3906 Receive openhpid_client packets.
3907 </summary>
3908 @@ -46633,7 +47253,7 @@ Domain allowed access.
3909 </param>
3910 <infoflow type="read" weight="10"/>
3911 </interface>
3912 -<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="59039">
3913 +<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="59460">
3914 <summary>
3915 Do not audit attempts to receive openhpid_client packets.
3916 </summary>
3917 @@ -46644,7 +47264,7 @@ Domain allowed access.
3918 </param>
3919 <infoflow type="none"/>
3920 </interface>
3921 -<interface name="corenet_sendrecv_openhpid_client_packets" lineno="59058">
3922 +<interface name="corenet_sendrecv_openhpid_client_packets" lineno="59479">
3923 <summary>
3924 Send and receive openhpid_client packets.
3925 </summary>
3926 @@ -46655,7 +47275,7 @@ Domain allowed access.
3927 </param>
3928 <infoflow type="both" weight="10"/>
3929 </interface>
3930 -<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="59074">
3931 +<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="59495">
3932 <summary>
3933 Do not audit attempts to send and receive openhpid_client packets.
3934 </summary>
3935 @@ -46666,7 +47286,7 @@ Domain to not audit.
3936 </param>
3937 <infoflow type="none"/>
3938 </interface>
3939 -<interface name="corenet_relabelto_openhpid_client_packets" lineno="59089">
3940 +<interface name="corenet_relabelto_openhpid_client_packets" lineno="59510">
3941 <summary>
3942 Relabel packets to openhpid_client the packet type.
3943 </summary>
3944 @@ -46676,7 +47296,7 @@ Domain allowed access.
3945 </summary>
3946 </param>
3947 </interface>
3948 -<interface name="corenet_send_openhpid_server_packets" lineno="59109">
3949 +<interface name="corenet_send_openhpid_server_packets" lineno="59530">
3950 <summary>
3951 Send openhpid_server packets.
3952 </summary>
3953 @@ -46687,7 +47307,7 @@ Domain allowed access.
3954 </param>
3955 <infoflow type="write" weight="10"/>
3956 </interface>
3957 -<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59128">
3958 +<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59549">
3959 <summary>
3960 Do not audit attempts to send openhpid_server packets.
3961 </summary>
3962 @@ -46698,7 +47318,7 @@ Domain to not audit.
3963 </param>
3964 <infoflow type="none"/>
3965 </interface>
3966 -<interface name="corenet_receive_openhpid_server_packets" lineno="59147">
3967 +<interface name="corenet_receive_openhpid_server_packets" lineno="59568">
3968 <summary>
3969 Receive openhpid_server packets.
3970 </summary>
3971 @@ -46709,7 +47329,7 @@ Domain allowed access.
3972 </param>
3973 <infoflow type="read" weight="10"/>
3974 </interface>
3975 -<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59166">
3976 +<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59587">
3977 <summary>
3978 Do not audit attempts to receive openhpid_server packets.
3979 </summary>
3980 @@ -46720,7 +47340,7 @@ Domain allowed access.
3981 </param>
3982 <infoflow type="none"/>
3983 </interface>
3984 -<interface name="corenet_sendrecv_openhpid_server_packets" lineno="59185">
3985 +<interface name="corenet_sendrecv_openhpid_server_packets" lineno="59606">
3986 <summary>
3987 Send and receive openhpid_server packets.
3988 </summary>
3989 @@ -46731,7 +47351,7 @@ Domain allowed access.
3990 </param>
3991 <infoflow type="both" weight="10"/>
3992 </interface>
3993 -<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59201">
3994 +<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59622">
3995 <summary>
3996 Do not audit attempts to send and receive openhpid_server packets.
3997 </summary>
3998 @@ -46742,7 +47362,7 @@ Domain to not audit.
3999 </param>
4000 <infoflow type="none"/>
4001 </interface>
4002 -<interface name="corenet_relabelto_openhpid_server_packets" lineno="59216">
4003 +<interface name="corenet_relabelto_openhpid_server_packets" lineno="59637">
4004 <summary>
4005 Relabel packets to openhpid_server the packet type.
4006 </summary>
4007 @@ -46752,7 +47372,7 @@ Domain allowed access.
4008 </summary>
4009 </param>
4010 </interface>
4011 -<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59238">
4012 +<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59659">
4013 <summary>
4014 Send and receive TCP traffic on the openvpn port.
4015 </summary>
4016 @@ -46763,7 +47383,7 @@ Domain allowed access.
4017 </param>
4018 <infoflow type="both" weight="10"/>
4019 </interface>
4020 -<interface name="corenet_udp_send_openvpn_port" lineno="59253">
4021 +<interface name="corenet_udp_send_openvpn_port" lineno="59674">
4022 <summary>
4023 Send UDP traffic on the openvpn port.
4024 </summary>
4025 @@ -46774,7 +47394,7 @@ Domain allowed access.
4026 </param>
4027 <infoflow type="write" weight="10"/>
4028 </interface>
4029 -<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59268">
4030 +<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59689">
4031 <summary>
4032 Do not audit attempts to send UDP traffic on the openvpn port.
4033 </summary>
4034 @@ -46785,7 +47405,7 @@ Domain to not audit.
4035 </param>
4036 <infoflow type="none"/>
4037 </interface>
4038 -<interface name="corenet_udp_receive_openvpn_port" lineno="59283">
4039 +<interface name="corenet_udp_receive_openvpn_port" lineno="59704">
4040 <summary>
4041 Receive UDP traffic on the openvpn port.
4042 </summary>
4043 @@ -46796,7 +47416,7 @@ Domain allowed access.
4044 </param>
4045 <infoflow type="read" weight="10"/>
4046 </interface>
4047 -<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59298">
4048 +<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59719">
4049 <summary>
4050 Do not audit attempts to receive UDP traffic on the openvpn port.
4051 </summary>
4052 @@ -46807,7 +47427,7 @@ Domain to not audit.
4053 </param>
4054 <infoflow type="none"/>
4055 </interface>
4056 -<interface name="corenet_udp_sendrecv_openvpn_port" lineno="59313">
4057 +<interface name="corenet_udp_sendrecv_openvpn_port" lineno="59734">
4058 <summary>
4059 Send and receive UDP traffic on the openvpn port.
4060 </summary>
4061 @@ -46818,7 +47438,7 @@ Domain allowed access.
4062 </param>
4063 <infoflow type="both" weight="10"/>
4064 </interface>
4065 -<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59329">
4066 +<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59750">
4067 <summary>
4068 Do not audit attempts to send and receive
4069 UDP traffic on the openvpn port.
4070 @@ -46830,7 +47450,7 @@ Domain to not audit.
4071 </param>
4072 <infoflow type="none"/>
4073 </interface>
4074 -<interface name="corenet_tcp_bind_openvpn_port" lineno="59344">
4075 +<interface name="corenet_tcp_bind_openvpn_port" lineno="59765">
4076 <summary>
4077 Bind TCP sockets to the openvpn port.
4078 </summary>
4079 @@ -46841,7 +47461,7 @@ Domain allowed access.
4080 </param>
4081 <infoflow type="none"/>
4082 </interface>
4083 -<interface name="corenet_udp_bind_openvpn_port" lineno="59364">
4084 +<interface name="corenet_udp_bind_openvpn_port" lineno="59785">
4085 <summary>
4086 Bind UDP sockets to the openvpn port.
4087 </summary>
4088 @@ -46852,7 +47472,7 @@ Domain allowed access.
4089 </param>
4090 <infoflow type="none"/>
4091 </interface>
4092 -<interface name="corenet_tcp_connect_openvpn_port" lineno="59383">
4093 +<interface name="corenet_tcp_connect_openvpn_port" lineno="59804">
4094 <summary>
4095 Make a TCP connection to the openvpn port.
4096 </summary>
4097 @@ -46862,7 +47482,7 @@ Domain allowed access.
4098 </summary>
4099 </param>
4100 </interface>
4101 -<interface name="corenet_send_openvpn_client_packets" lineno="59403">
4102 +<interface name="corenet_send_openvpn_client_packets" lineno="59824">
4103 <summary>
4104 Send openvpn_client packets.
4105 </summary>
4106 @@ -46873,7 +47493,7 @@ Domain allowed access.
4107 </param>
4108 <infoflow type="write" weight="10"/>
4109 </interface>
4110 -<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59422">
4111 +<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59843">
4112 <summary>
4113 Do not audit attempts to send openvpn_client packets.
4114 </summary>
4115 @@ -46884,7 +47504,7 @@ Domain to not audit.
4116 </param>
4117 <infoflow type="none"/>
4118 </interface>
4119 -<interface name="corenet_receive_openvpn_client_packets" lineno="59441">
4120 +<interface name="corenet_receive_openvpn_client_packets" lineno="59862">
4121 <summary>
4122 Receive openvpn_client packets.
4123 </summary>
4124 @@ -46895,7 +47515,7 @@ Domain allowed access.
4125 </param>
4126 <infoflow type="read" weight="10"/>
4127 </interface>
4128 -<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59460">
4129 +<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59881">
4130 <summary>
4131 Do not audit attempts to receive openvpn_client packets.
4132 </summary>
4133 @@ -46906,7 +47526,7 @@ Domain allowed access.
4134 </param>
4135 <infoflow type="none"/>
4136 </interface>
4137 -<interface name="corenet_sendrecv_openvpn_client_packets" lineno="59479">
4138 +<interface name="corenet_sendrecv_openvpn_client_packets" lineno="59900">
4139 <summary>
4140 Send and receive openvpn_client packets.
4141 </summary>
4142 @@ -46917,7 +47537,7 @@ Domain allowed access.
4143 </param>
4144 <infoflow type="both" weight="10"/>
4145 </interface>
4146 -<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59495">
4147 +<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59916">
4148 <summary>
4149 Do not audit attempts to send and receive openvpn_client packets.
4150 </summary>
4151 @@ -46928,7 +47548,7 @@ Domain to not audit.
4152 </param>
4153 <infoflow type="none"/>
4154 </interface>
4155 -<interface name="corenet_relabelto_openvpn_client_packets" lineno="59510">
4156 +<interface name="corenet_relabelto_openvpn_client_packets" lineno="59931">
4157 <summary>
4158 Relabel packets to openvpn_client the packet type.
4159 </summary>
4160 @@ -46938,7 +47558,7 @@ Domain allowed access.
4161 </summary>
4162 </param>
4163 </interface>
4164 -<interface name="corenet_send_openvpn_server_packets" lineno="59530">
4165 +<interface name="corenet_send_openvpn_server_packets" lineno="59951">
4166 <summary>
4167 Send openvpn_server packets.
4168 </summary>
4169 @@ -46949,7 +47569,7 @@ Domain allowed access.
4170 </param>
4171 <infoflow type="write" weight="10"/>
4172 </interface>
4173 -<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59549">
4174 +<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59970">
4175 <summary>
4176 Do not audit attempts to send openvpn_server packets.
4177 </summary>
4178 @@ -46960,7 +47580,7 @@ Domain to not audit.
4179 </param>
4180 <infoflow type="none"/>
4181 </interface>
4182 -<interface name="corenet_receive_openvpn_server_packets" lineno="59568">
4183 +<interface name="corenet_receive_openvpn_server_packets" lineno="59989">
4184 <summary>
4185 Receive openvpn_server packets.
4186 </summary>
4187 @@ -46971,7 +47591,7 @@ Domain allowed access.
4188 </param>
4189 <infoflow type="read" weight="10"/>
4190 </interface>
4191 -<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="59587">
4192 +<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="60008">
4193 <summary>
4194 Do not audit attempts to receive openvpn_server packets.
4195 </summary>
4196 @@ -46982,7 +47602,7 @@ Domain allowed access.
4197 </param>
4198 <infoflow type="none"/>
4199 </interface>
4200 -<interface name="corenet_sendrecv_openvpn_server_packets" lineno="59606">
4201 +<interface name="corenet_sendrecv_openvpn_server_packets" lineno="60027">
4202 <summary>
4203 Send and receive openvpn_server packets.
4204 </summary>
4205 @@ -46993,7 +47613,7 @@ Domain allowed access.
4206 </param>
4207 <infoflow type="both" weight="10"/>
4208 </interface>
4209 -<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="59622">
4210 +<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="60043">
4211 <summary>
4212 Do not audit attempts to send and receive openvpn_server packets.
4213 </summary>
4214 @@ -47004,7 +47624,7 @@ Domain to not audit.
4215 </param>
4216 <infoflow type="none"/>
4217 </interface>
4218 -<interface name="corenet_relabelto_openvpn_server_packets" lineno="59637">
4219 +<interface name="corenet_relabelto_openvpn_server_packets" lineno="60058">
4220 <summary>
4221 Relabel packets to openvpn_server the packet type.
4222 </summary>
4223 @@ -47014,7 +47634,7 @@ Domain allowed access.
4224 </summary>
4225 </param>
4226 </interface>
4227 -<interface name="corenet_tcp_sendrecv_pdps_port" lineno="59659">
4228 +<interface name="corenet_tcp_sendrecv_pdps_port" lineno="60080">
4229 <summary>
4230 Send and receive TCP traffic on the pdps port.
4231 </summary>
4232 @@ -47025,7 +47645,7 @@ Domain allowed access.
4233 </param>
4234 <infoflow type="both" weight="10"/>
4235 </interface>
4236 -<interface name="corenet_udp_send_pdps_port" lineno="59674">
4237 +<interface name="corenet_udp_send_pdps_port" lineno="60095">
4238 <summary>
4239 Send UDP traffic on the pdps port.
4240 </summary>
4241 @@ -47036,7 +47656,7 @@ Domain allowed access.
4242 </param>
4243 <infoflow type="write" weight="10"/>
4244 </interface>
4245 -<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="59689">
4246 +<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="60110">
4247 <summary>
4248 Do not audit attempts to send UDP traffic on the pdps port.
4249 </summary>
4250 @@ -47047,7 +47667,7 @@ Domain to not audit.
4251 </param>
4252 <infoflow type="none"/>
4253 </interface>
4254 -<interface name="corenet_udp_receive_pdps_port" lineno="59704">
4255 +<interface name="corenet_udp_receive_pdps_port" lineno="60125">
4256 <summary>
4257 Receive UDP traffic on the pdps port.
4258 </summary>
4259 @@ -47058,7 +47678,7 @@ Domain allowed access.
4260 </param>
4261 <infoflow type="read" weight="10"/>
4262 </interface>
4263 -<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="59719">
4264 +<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="60140">
4265 <summary>
4266 Do not audit attempts to receive UDP traffic on the pdps port.
4267 </summary>
4268 @@ -47069,7 +47689,7 @@ Domain to not audit.
4269 </param>
4270 <infoflow type="none"/>
4271 </interface>
4272 -<interface name="corenet_udp_sendrecv_pdps_port" lineno="59734">
4273 +<interface name="corenet_udp_sendrecv_pdps_port" lineno="60155">
4274 <summary>
4275 Send and receive UDP traffic on the pdps port.
4276 </summary>
4277 @@ -47080,7 +47700,7 @@ Domain allowed access.
4278 </param>
4279 <infoflow type="both" weight="10"/>
4280 </interface>
4281 -<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="59750">
4282 +<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="60171">
4283 <summary>
4284 Do not audit attempts to send and receive
4285 UDP traffic on the pdps port.
4286 @@ -47092,7 +47712,7 @@ Domain to not audit.
4287 </param>
4288 <infoflow type="none"/>
4289 </interface>
4290 -<interface name="corenet_tcp_bind_pdps_port" lineno="59765">
4291 +<interface name="corenet_tcp_bind_pdps_port" lineno="60186">
4292 <summary>
4293 Bind TCP sockets to the pdps port.
4294 </summary>
4295 @@ -47103,7 +47723,7 @@ Domain allowed access.
4296 </param>
4297 <infoflow type="none"/>
4298 </interface>
4299 -<interface name="corenet_udp_bind_pdps_port" lineno="59785">
4300 +<interface name="corenet_udp_bind_pdps_port" lineno="60206">
4301 <summary>
4302 Bind UDP sockets to the pdps port.
4303 </summary>
4304 @@ -47114,7 +47734,7 @@ Domain allowed access.
4305 </param>
4306 <infoflow type="none"/>
4307 </interface>
4308 -<interface name="corenet_tcp_connect_pdps_port" lineno="59804">
4309 +<interface name="corenet_tcp_connect_pdps_port" lineno="60225">
4310 <summary>
4311 Make a TCP connection to the pdps port.
4312 </summary>
4313 @@ -47124,7 +47744,7 @@ Domain allowed access.
4314 </summary>
4315 </param>
4316 </interface>
4317 -<interface name="corenet_send_pdps_client_packets" lineno="59824">
4318 +<interface name="corenet_send_pdps_client_packets" lineno="60245">
4319 <summary>
4320 Send pdps_client packets.
4321 </summary>
4322 @@ -47135,7 +47755,7 @@ Domain allowed access.
4323 </param>
4324 <infoflow type="write" weight="10"/>
4325 </interface>
4326 -<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="59843">
4327 +<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="60264">
4328 <summary>
4329 Do not audit attempts to send pdps_client packets.
4330 </summary>
4331 @@ -47146,7 +47766,7 @@ Domain to not audit.
4332 </param>
4333 <infoflow type="none"/>
4334 </interface>
4335 -<interface name="corenet_receive_pdps_client_packets" lineno="59862">
4336 +<interface name="corenet_receive_pdps_client_packets" lineno="60283">
4337 <summary>
4338 Receive pdps_client packets.
4339 </summary>
4340 @@ -47157,7 +47777,7 @@ Domain allowed access.
4341 </param>
4342 <infoflow type="read" weight="10"/>
4343 </interface>
4344 -<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="59881">
4345 +<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="60302">
4346 <summary>
4347 Do not audit attempts to receive pdps_client packets.
4348 </summary>
4349 @@ -47168,7 +47788,7 @@ Domain allowed access.
4350 </param>
4351 <infoflow type="none"/>
4352 </interface>
4353 -<interface name="corenet_sendrecv_pdps_client_packets" lineno="59900">
4354 +<interface name="corenet_sendrecv_pdps_client_packets" lineno="60321">
4355 <summary>
4356 Send and receive pdps_client packets.
4357 </summary>
4358 @@ -47179,7 +47799,7 @@ Domain allowed access.
4359 </param>
4360 <infoflow type="both" weight="10"/>
4361 </interface>
4362 -<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="59916">
4363 +<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="60337">
4364 <summary>
4365 Do not audit attempts to send and receive pdps_client packets.
4366 </summary>
4367 @@ -47190,7 +47810,7 @@ Domain to not audit.
4368 </param>
4369 <infoflow type="none"/>
4370 </interface>
4371 -<interface name="corenet_relabelto_pdps_client_packets" lineno="59931">
4372 +<interface name="corenet_relabelto_pdps_client_packets" lineno="60352">
4373 <summary>
4374 Relabel packets to pdps_client the packet type.
4375 </summary>
4376 @@ -47200,7 +47820,7 @@ Domain allowed access.
4377 </summary>
4378 </param>
4379 </interface>
4380 -<interface name="corenet_send_pdps_server_packets" lineno="59951">
4381 +<interface name="corenet_send_pdps_server_packets" lineno="60372">
4382 <summary>
4383 Send pdps_server packets.
4384 </summary>
4385 @@ -47211,7 +47831,7 @@ Domain allowed access.
4386 </param>
4387 <infoflow type="write" weight="10"/>
4388 </interface>
4389 -<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="59970">
4390 +<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="60391">
4391 <summary>
4392 Do not audit attempts to send pdps_server packets.
4393 </summary>
4394 @@ -47222,7 +47842,7 @@ Domain to not audit.
4395 </param>
4396 <infoflow type="none"/>
4397 </interface>
4398 -<interface name="corenet_receive_pdps_server_packets" lineno="59989">
4399 +<interface name="corenet_receive_pdps_server_packets" lineno="60410">
4400 <summary>
4401 Receive pdps_server packets.
4402 </summary>
4403 @@ -47233,7 +47853,7 @@ Domain allowed access.
4404 </param>
4405 <infoflow type="read" weight="10"/>
4406 </interface>
4407 -<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="60008">
4408 +<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="60429">
4409 <summary>
4410 Do not audit attempts to receive pdps_server packets.
4411 </summary>
4412 @@ -47244,7 +47864,7 @@ Domain allowed access.
4413 </param>
4414 <infoflow type="none"/>
4415 </interface>
4416 -<interface name="corenet_sendrecv_pdps_server_packets" lineno="60027">
4417 +<interface name="corenet_sendrecv_pdps_server_packets" lineno="60448">
4418 <summary>
4419 Send and receive pdps_server packets.
4420 </summary>
4421 @@ -47255,7 +47875,7 @@ Domain allowed access.
4422 </param>
4423 <infoflow type="both" weight="10"/>
4424 </interface>
4425 -<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="60043">
4426 +<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="60464">
4427 <summary>
4428 Do not audit attempts to send and receive pdps_server packets.
4429 </summary>
4430 @@ -47266,7 +47886,7 @@ Domain to not audit.
4431 </param>
4432 <infoflow type="none"/>
4433 </interface>
4434 -<interface name="corenet_relabelto_pdps_server_packets" lineno="60058">
4435 +<interface name="corenet_relabelto_pdps_server_packets" lineno="60479">
4436 <summary>
4437 Relabel packets to pdps_server the packet type.
4438 </summary>
4439 @@ -47276,7 +47896,7 @@ Domain allowed access.
4440 </summary>
4441 </param>
4442 </interface>
4443 -<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="60080">
4444 +<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="60501">
4445 <summary>
4446 Send and receive TCP traffic on the pegasus_http port.
4447 </summary>
4448 @@ -47287,7 +47907,7 @@ Domain allowed access.
4449 </param>
4450 <infoflow type="both" weight="10"/>
4451 </interface>
4452 -<interface name="corenet_udp_send_pegasus_http_port" lineno="60095">
4453 +<interface name="corenet_udp_send_pegasus_http_port" lineno="60516">
4454 <summary>
4455 Send UDP traffic on the pegasus_http port.
4456 </summary>
4457 @@ -47298,7 +47918,7 @@ Domain allowed access.
4458 </param>
4459 <infoflow type="write" weight="10"/>
4460 </interface>
4461 -<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="60110">
4462 +<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="60531">
4463 <summary>
4464 Do not audit attempts to send UDP traffic on the pegasus_http port.
4465 </summary>
4466 @@ -47309,7 +47929,7 @@ Domain to not audit.
4467 </param>
4468 <infoflow type="none"/>
4469 </interface>
4470 -<interface name="corenet_udp_receive_pegasus_http_port" lineno="60125">
4471 +<interface name="corenet_udp_receive_pegasus_http_port" lineno="60546">
4472 <summary>
4473 Receive UDP traffic on the pegasus_http port.
4474 </summary>
4475 @@ -47320,7 +47940,7 @@ Domain allowed access.
4476 </param>
4477 <infoflow type="read" weight="10"/>
4478 </interface>
4479 -<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60140">
4480 +<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60561">
4481 <summary>
4482 Do not audit attempts to receive UDP traffic on the pegasus_http port.
4483 </summary>
4484 @@ -47331,7 +47951,7 @@ Domain to not audit.
4485 </param>
4486 <infoflow type="none"/>
4487 </interface>
4488 -<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60155">
4489 +<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60576">
4490 <summary>
4491 Send and receive UDP traffic on the pegasus_http port.
4492 </summary>
4493 @@ -47342,7 +47962,7 @@ Domain allowed access.
4494 </param>
4495 <infoflow type="both" weight="10"/>
4496 </interface>
4497 -<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60171">
4498 +<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60592">
4499 <summary>
4500 Do not audit attempts to send and receive
4501 UDP traffic on the pegasus_http port.
4502 @@ -47354,7 +47974,7 @@ Domain to not audit.
4503 </param>
4504 <infoflow type="none"/>
4505 </interface>
4506 -<interface name="corenet_tcp_bind_pegasus_http_port" lineno="60186">
4507 +<interface name="corenet_tcp_bind_pegasus_http_port" lineno="60607">
4508 <summary>
4509 Bind TCP sockets to the pegasus_http port.
4510 </summary>
4511 @@ -47365,7 +47985,7 @@ Domain allowed access.
4512 </param>
4513 <infoflow type="none"/>
4514 </interface>
4515 -<interface name="corenet_udp_bind_pegasus_http_port" lineno="60206">
4516 +<interface name="corenet_udp_bind_pegasus_http_port" lineno="60627">
4517 <summary>
4518 Bind UDP sockets to the pegasus_http port.
4519 </summary>
4520 @@ -47376,7 +47996,7 @@ Domain allowed access.
4521 </param>
4522 <infoflow type="none"/>
4523 </interface>
4524 -<interface name="corenet_tcp_connect_pegasus_http_port" lineno="60225">
4525 +<interface name="corenet_tcp_connect_pegasus_http_port" lineno="60646">
4526 <summary>
4527 Make a TCP connection to the pegasus_http port.
4528 </summary>
4529 @@ -47386,7 +48006,7 @@ Domain allowed access.
4530 </summary>
4531 </param>
4532 </interface>
4533 -<interface name="corenet_send_pegasus_http_client_packets" lineno="60245">
4534 +<interface name="corenet_send_pegasus_http_client_packets" lineno="60666">
4535 <summary>
4536 Send pegasus_http_client packets.
4537 </summary>
4538 @@ -47397,7 +48017,7 @@ Domain allowed access.
4539 </param>
4540 <infoflow type="write" weight="10"/>
4541 </interface>
4542 -<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60264">
4543 +<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60685">
4544 <summary>
4545 Do not audit attempts to send pegasus_http_client packets.
4546 </summary>
4547 @@ -47408,7 +48028,7 @@ Domain to not audit.
4548 </param>
4549 <infoflow type="none"/>
4550 </interface>
4551 -<interface name="corenet_receive_pegasus_http_client_packets" lineno="60283">
4552 +<interface name="corenet_receive_pegasus_http_client_packets" lineno="60704">
4553 <summary>
4554 Receive pegasus_http_client packets.
4555 </summary>
4556 @@ -47419,7 +48039,7 @@ Domain allowed access.
4557 </param>
4558 <infoflow type="read" weight="10"/>
4559 </interface>
4560 -<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60302">
4561 +<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60723">
4562 <summary>
4563 Do not audit attempts to receive pegasus_http_client packets.
4564 </summary>
4565 @@ -47430,7 +48050,7 @@ Domain allowed access.
4566 </param>
4567 <infoflow type="none"/>
4568 </interface>
4569 -<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60321">
4570 +<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60742">
4571 <summary>
4572 Send and receive pegasus_http_client packets.
4573 </summary>
4574 @@ -47441,7 +48061,7 @@ Domain allowed access.
4575 </param>
4576 <infoflow type="both" weight="10"/>
4577 </interface>
4578 -<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60337">
4579 +<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60758">
4580 <summary>
4581 Do not audit attempts to send and receive pegasus_http_client packets.
4582 </summary>
4583 @@ -47452,7 +48072,7 @@ Domain to not audit.
4584 </param>
4585 <infoflow type="none"/>
4586 </interface>
4587 -<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60352">
4588 +<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60773">
4589 <summary>
4590 Relabel packets to pegasus_http_client the packet type.
4591 </summary>
4592 @@ -47462,7 +48082,7 @@ Domain allowed access.
4593 </summary>
4594 </param>
4595 </interface>
4596 -<interface name="corenet_send_pegasus_http_server_packets" lineno="60372">
4597 +<interface name="corenet_send_pegasus_http_server_packets" lineno="60793">
4598 <summary>
4599 Send pegasus_http_server packets.
4600 </summary>
4601 @@ -47473,7 +48093,7 @@ Domain allowed access.
4602 </param>
4603 <infoflow type="write" weight="10"/>
4604 </interface>
4605 -<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60391">
4606 +<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60812">
4607 <summary>
4608 Do not audit attempts to send pegasus_http_server packets.
4609 </summary>
4610 @@ -47484,7 +48104,7 @@ Domain to not audit.
4611 </param>
4612 <infoflow type="none"/>
4613 </interface>
4614 -<interface name="corenet_receive_pegasus_http_server_packets" lineno="60410">
4615 +<interface name="corenet_receive_pegasus_http_server_packets" lineno="60831">
4616 <summary>
4617 Receive pegasus_http_server packets.
4618 </summary>
4619 @@ -47495,7 +48115,7 @@ Domain allowed access.
4620 </param>
4621 <infoflow type="read" weight="10"/>
4622 </interface>
4623 -<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60429">
4624 +<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60850">
4625 <summary>
4626 Do not audit attempts to receive pegasus_http_server packets.
4627 </summary>
4628 @@ -47506,7 +48126,7 @@ Domain allowed access.
4629 </param>
4630 <infoflow type="none"/>
4631 </interface>
4632 -<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60448">
4633 +<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60869">
4634 <summary>
4635 Send and receive pegasus_http_server packets.
4636 </summary>
4637 @@ -47517,7 +48137,7 @@ Domain allowed access.
4638 </param>
4639 <infoflow type="both" weight="10"/>
4640 </interface>
4641 -<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60464">
4642 +<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60885">
4643 <summary>
4644 Do not audit attempts to send and receive pegasus_http_server packets.
4645 </summary>
4646 @@ -47528,7 +48148,7 @@ Domain to not audit.
4647 </param>
4648 <infoflow type="none"/>
4649 </interface>
4650 -<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60479">
4651 +<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60900">
4652 <summary>
4653 Relabel packets to pegasus_http_server the packet type.
4654 </summary>
4655 @@ -47538,7 +48158,7 @@ Domain allowed access.
4656 </summary>
4657 </param>
4658 </interface>
4659 -<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60501">
4660 +<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60922">
4661 <summary>
4662 Send and receive TCP traffic on the pegasus_https port.
4663 </summary>
4664 @@ -47549,7 +48169,7 @@ Domain allowed access.
4665 </param>
4666 <infoflow type="both" weight="10"/>
4667 </interface>
4668 -<interface name="corenet_udp_send_pegasus_https_port" lineno="60516">
4669 +<interface name="corenet_udp_send_pegasus_https_port" lineno="60937">
4670 <summary>
4671 Send UDP traffic on the pegasus_https port.
4672 </summary>
4673 @@ -47560,7 +48180,7 @@ Domain allowed access.
4674 </param>
4675 <infoflow type="write" weight="10"/>
4676 </interface>
4677 -<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60531">
4678 +<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60952">
4679 <summary>
4680 Do not audit attempts to send UDP traffic on the pegasus_https port.
4681 </summary>
4682 @@ -47571,7 +48191,7 @@ Domain to not audit.
4683 </param>
4684 <infoflow type="none"/>
4685 </interface>
4686 -<interface name="corenet_udp_receive_pegasus_https_port" lineno="60546">
4687 +<interface name="corenet_udp_receive_pegasus_https_port" lineno="60967">
4688 <summary>
4689 Receive UDP traffic on the pegasus_https port.
4690 </summary>
4691 @@ -47582,7 +48202,7 @@ Domain allowed access.
4692 </param>
4693 <infoflow type="read" weight="10"/>
4694 </interface>
4695 -<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="60561">
4696 +<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="60982">
4697 <summary>
4698 Do not audit attempts to receive UDP traffic on the pegasus_https port.
4699 </summary>
4700 @@ -47593,7 +48213,7 @@ Domain to not audit.
4701 </param>
4702 <infoflow type="none"/>
4703 </interface>
4704 -<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="60576">
4705 +<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="60997">
4706 <summary>
4707 Send and receive UDP traffic on the pegasus_https port.
4708 </summary>
4709 @@ -47604,7 +48224,7 @@ Domain allowed access.
4710 </param>
4711 <infoflow type="both" weight="10"/>
4712 </interface>
4713 -<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="60592">
4714 +<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="61013">
4715 <summary>
4716 Do not audit attempts to send and receive
4717 UDP traffic on the pegasus_https port.
4718 @@ -47616,7 +48236,7 @@ Domain to not audit.
4719 </param>
4720 <infoflow type="none"/>
4721 </interface>
4722 -<interface name="corenet_tcp_bind_pegasus_https_port" lineno="60607">
4723 +<interface name="corenet_tcp_bind_pegasus_https_port" lineno="61028">
4724 <summary>
4725 Bind TCP sockets to the pegasus_https port.
4726 </summary>
4727 @@ -47627,7 +48247,7 @@ Domain allowed access.
4728 </param>
4729 <infoflow type="none"/>
4730 </interface>
4731 -<interface name="corenet_udp_bind_pegasus_https_port" lineno="60627">
4732 +<interface name="corenet_udp_bind_pegasus_https_port" lineno="61048">
4733 <summary>
4734 Bind UDP sockets to the pegasus_https port.
4735 </summary>
4736 @@ -47638,7 +48258,7 @@ Domain allowed access.
4737 </param>
4738 <infoflow type="none"/>
4739 </interface>
4740 -<interface name="corenet_tcp_connect_pegasus_https_port" lineno="60646">
4741 +<interface name="corenet_tcp_connect_pegasus_https_port" lineno="61067">
4742 <summary>
4743 Make a TCP connection to the pegasus_https port.
4744 </summary>
4745 @@ -47648,7 +48268,7 @@ Domain allowed access.
4746 </summary>
4747 </param>
4748 </interface>
4749 -<interface name="corenet_send_pegasus_https_client_packets" lineno="60666">
4750 +<interface name="corenet_send_pegasus_https_client_packets" lineno="61087">
4751 <summary>
4752 Send pegasus_https_client packets.
4753 </summary>
4754 @@ -47659,7 +48279,7 @@ Domain allowed access.
4755 </param>
4756 <infoflow type="write" weight="10"/>
4757 </interface>
4758 -<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="60685">
4759 +<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="61106">
4760 <summary>
4761 Do not audit attempts to send pegasus_https_client packets.
4762 </summary>
4763 @@ -47670,7 +48290,7 @@ Domain to not audit.
4764 </param>
4765 <infoflow type="none"/>
4766 </interface>
4767 -<interface name="corenet_receive_pegasus_https_client_packets" lineno="60704">
4768 +<interface name="corenet_receive_pegasus_https_client_packets" lineno="61125">
4769 <summary>
4770 Receive pegasus_https_client packets.
4771 </summary>
4772 @@ -47681,7 +48301,7 @@ Domain allowed access.
4773 </param>
4774 <infoflow type="read" weight="10"/>
4775 </interface>
4776 -<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="60723">
4777 +<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="61144">
4778 <summary>
4779 Do not audit attempts to receive pegasus_https_client packets.
4780 </summary>
4781 @@ -47692,7 +48312,7 @@ Domain allowed access.
4782 </param>
4783 <infoflow type="none"/>
4784 </interface>
4785 -<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="60742">
4786 +<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="61163">
4787 <summary>
4788 Send and receive pegasus_https_client packets.
4789 </summary>
4790 @@ -47703,7 +48323,7 @@ Domain allowed access.
4791 </param>
4792 <infoflow type="both" weight="10"/>
4793 </interface>
4794 -<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="60758">
4795 +<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="61179">
4796 <summary>
4797 Do not audit attempts to send and receive pegasus_https_client packets.
4798 </summary>
4799 @@ -47714,7 +48334,7 @@ Domain to not audit.
4800 </param>
4801 <infoflow type="none"/>
4802 </interface>
4803 -<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="60773">
4804 +<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="61194">
4805 <summary>
4806 Relabel packets to pegasus_https_client the packet type.
4807 </summary>
4808 @@ -47724,7 +48344,7 @@ Domain allowed access.
4809 </summary>
4810 </param>
4811 </interface>
4812 -<interface name="corenet_send_pegasus_https_server_packets" lineno="60793">
4813 +<interface name="corenet_send_pegasus_https_server_packets" lineno="61214">
4814 <summary>
4815 Send pegasus_https_server packets.
4816 </summary>
4817 @@ -47735,7 +48355,7 @@ Domain allowed access.
4818 </param>
4819 <infoflow type="write" weight="10"/>
4820 </interface>
4821 -<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="60812">
4822 +<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="61233">
4823 <summary>
4824 Do not audit attempts to send pegasus_https_server packets.
4825 </summary>
4826 @@ -47746,7 +48366,7 @@ Domain to not audit.
4827 </param>
4828 <infoflow type="none"/>
4829 </interface>
4830 -<interface name="corenet_receive_pegasus_https_server_packets" lineno="60831">
4831 +<interface name="corenet_receive_pegasus_https_server_packets" lineno="61252">
4832 <summary>
4833 Receive pegasus_https_server packets.
4834 </summary>
4835 @@ -47757,7 +48377,7 @@ Domain allowed access.
4836 </param>
4837 <infoflow type="read" weight="10"/>
4838 </interface>
4839 -<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="60850">
4840 +<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="61271">
4841 <summary>
4842 Do not audit attempts to receive pegasus_https_server packets.
4843 </summary>
4844 @@ -47768,7 +48388,7 @@ Domain allowed access.
4845 </param>
4846 <infoflow type="none"/>
4847 </interface>
4848 -<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="60869">
4849 +<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="61290">
4850 <summary>
4851 Send and receive pegasus_https_server packets.
4852 </summary>
4853 @@ -47779,7 +48399,7 @@ Domain allowed access.
4854 </param>
4855 <infoflow type="both" weight="10"/>
4856 </interface>
4857 -<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="60885">
4858 +<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="61306">
4859 <summary>
4860 Do not audit attempts to send and receive pegasus_https_server packets.
4861 </summary>
4862 @@ -47790,7 +48410,7 @@ Domain to not audit.
4863 </param>
4864 <infoflow type="none"/>
4865 </interface>
4866 -<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="60900">
4867 +<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="61321">
4868 <summary>
4869 Relabel packets to pegasus_https_server the packet type.
4870 </summary>
4871 @@ -47800,7 +48420,7 @@ Domain allowed access.
4872 </summary>
4873 </param>
4874 </interface>
4875 -<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="60922">
4876 +<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="61343">
4877 <summary>
4878 Send and receive TCP traffic on the pgpkeyserver port.
4879 </summary>
4880 @@ -47811,7 +48431,7 @@ Domain allowed access.
4881 </param>
4882 <infoflow type="both" weight="10"/>
4883 </interface>
4884 -<interface name="corenet_udp_send_pgpkeyserver_port" lineno="60937">
4885 +<interface name="corenet_udp_send_pgpkeyserver_port" lineno="61358">
4886 <summary>
4887 Send UDP traffic on the pgpkeyserver port.
4888 </summary>
4889 @@ -47822,7 +48442,7 @@ Domain allowed access.
4890 </param>
4891 <infoflow type="write" weight="10"/>
4892 </interface>
4893 -<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="60952">
4894 +<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="61373">
4895 <summary>
4896 Do not audit attempts to send UDP traffic on the pgpkeyserver port.
4897 </summary>
4898 @@ -47833,7 +48453,7 @@ Domain to not audit.
4899 </param>
4900 <infoflow type="none"/>
4901 </interface>
4902 -<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="60967">
4903 +<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="61388">
4904 <summary>
4905 Receive UDP traffic on the pgpkeyserver port.
4906 </summary>
4907 @@ -47844,7 +48464,7 @@ Domain allowed access.
4908 </param>
4909 <infoflow type="read" weight="10"/>
4910 </interface>
4911 -<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="60982">
4912 +<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="61403">
4913 <summary>
4914 Do not audit attempts to receive UDP traffic on the pgpkeyserver port.
4915 </summary>
4916 @@ -47855,7 +48475,7 @@ Domain to not audit.
4917 </param>
4918 <infoflow type="none"/>
4919 </interface>
4920 -<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="60997">
4921 +<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="61418">
4922 <summary>
4923 Send and receive UDP traffic on the pgpkeyserver port.
4924 </summary>
4925 @@ -47866,7 +48486,7 @@ Domain allowed access.
4926 </param>
4927 <infoflow type="both" weight="10"/>
4928 </interface>
4929 -<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="61013">
4930 +<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="61434">
4931 <summary>
4932 Do not audit attempts to send and receive
4933 UDP traffic on the pgpkeyserver port.
4934 @@ -47878,7 +48498,7 @@ Domain to not audit.
4935 </param>
4936 <infoflow type="none"/>
4937 </interface>
4938 -<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="61028">
4939 +<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="61449">
4940 <summary>
4941 Bind TCP sockets to the pgpkeyserver port.
4942 </summary>
4943 @@ -47889,7 +48509,7 @@ Domain allowed access.
4944 </param>
4945 <infoflow type="none"/>
4946 </interface>
4947 -<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="61048">
4948 +<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="61469">
4949 <summary>
4950 Bind UDP sockets to the pgpkeyserver port.
4951 </summary>
4952 @@ -47900,7 +48520,7 @@ Domain allowed access.
4953 </param>
4954 <infoflow type="none"/>
4955 </interface>
4956 -<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="61067">
4957 +<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="61488">
4958 <summary>
4959 Make a TCP connection to the pgpkeyserver port.
4960 </summary>
4961 @@ -47910,7 +48530,7 @@ Domain allowed access.
4962 </summary>
4963 </param>
4964 </interface>
4965 -<interface name="corenet_send_pgpkeyserver_client_packets" lineno="61087">
4966 +<interface name="corenet_send_pgpkeyserver_client_packets" lineno="61508">
4967 <summary>
4968 Send pgpkeyserver_client packets.
4969 </summary>
4970 @@ -47921,7 +48541,7 @@ Domain allowed access.
4971 </param>
4972 <infoflow type="write" weight="10"/>
4973 </interface>
4974 -<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="61106">
4975 +<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="61527">
4976 <summary>
4977 Do not audit attempts to send pgpkeyserver_client packets.
4978 </summary>
4979 @@ -47932,7 +48552,7 @@ Domain to not audit.
4980 </param>
4981 <infoflow type="none"/>
4982 </interface>
4983 -<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61125">
4984 +<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61546">
4985 <summary>
4986 Receive pgpkeyserver_client packets.
4987 </summary>
4988 @@ -47943,7 +48563,7 @@ Domain allowed access.
4989 </param>
4990 <infoflow type="read" weight="10"/>
4991 </interface>
4992 -<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61144">
4993 +<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61565">
4994 <summary>
4995 Do not audit attempts to receive pgpkeyserver_client packets.
4996 </summary>
4997 @@ -47954,7 +48574,7 @@ Domain allowed access.
4998 </param>
4999 <infoflow type="none"/>
5000 </interface>
5001 -<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61163">
5002 +<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61584">
5003 <summary>
5004 Send and receive pgpkeyserver_client packets.
5005 </summary>
5006 @@ -47965,7 +48585,7 @@ Domain allowed access.
5007 </param>
5008 <infoflow type="both" weight="10"/>
5009 </interface>
5010 -<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61179">
5011 +<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61600">
5012 <summary>
5013 Do not audit attempts to send and receive pgpkeyserver_client packets.
5014 </summary>
5015 @@ -47976,7 +48596,7 @@ Domain to not audit.
5016 </param>
5017 <infoflow type="none"/>
5018 </interface>
5019 -<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61194">
5020 +<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61615">
5021 <summary>
5022 Relabel packets to pgpkeyserver_client the packet type.
5023 </summary>
5024 @@ -47986,7 +48606,7 @@ Domain allowed access.
5025 </summary>
5026 </param>
5027 </interface>
5028 -<interface name="corenet_send_pgpkeyserver_server_packets" lineno="61214">
5029 +<interface name="corenet_send_pgpkeyserver_server_packets" lineno="61635">
5030 <summary>
5031 Send pgpkeyserver_server packets.
5032 </summary>
5033 @@ -47997,7 +48617,7 @@ Domain allowed access.
5034 </param>
5035 <infoflow type="write" weight="10"/>
5036 </interface>
5037 -<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61233">
5038 +<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61654">
5039 <summary>
5040 Do not audit attempts to send pgpkeyserver_server packets.
5041 </summary>
5042 @@ -48008,7 +48628,7 @@ Domain to not audit.
5043 </param>
5044 <infoflow type="none"/>
5045 </interface>
5046 -<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61252">
5047 +<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61673">
5048 <summary>
5049 Receive pgpkeyserver_server packets.
5050 </summary>
5051 @@ -48019,7 +48639,7 @@ Domain allowed access.
5052 </param>
5053 <infoflow type="read" weight="10"/>
5054 </interface>
5055 -<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61271">
5056 +<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61692">
5057 <summary>
5058 Do not audit attempts to receive pgpkeyserver_server packets.
5059 </summary>
5060 @@ -48030,7 +48650,7 @@ Domain allowed access.
5061 </param>
5062 <infoflow type="none"/>
5063 </interface>
5064 -<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61290">
5065 +<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61711">
5066 <summary>
5067 Send and receive pgpkeyserver_server packets.
5068 </summary>
5069 @@ -48041,7 +48661,7 @@ Domain allowed access.
5070 </param>
5071 <infoflow type="both" weight="10"/>
5072 </interface>
5073 -<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61306">
5074 +<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61727">
5075 <summary>
5076 Do not audit attempts to send and receive pgpkeyserver_server packets.
5077 </summary>
5078 @@ -48052,7 +48672,7 @@ Domain to not audit.
5079 </param>
5080 <infoflow type="none"/>
5081 </interface>
5082 -<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61321">
5083 +<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61742">
5084 <summary>
5085 Relabel packets to pgpkeyserver_server the packet type.
5086 </summary>
5087 @@ -48062,7 +48682,7 @@ Domain allowed access.
5088 </summary>
5089 </param>
5090 </interface>
5091 -<interface name="corenet_tcp_sendrecv_pingd_port" lineno="61343">
5092 +<interface name="corenet_tcp_sendrecv_pingd_port" lineno="61764">
5093 <summary>
5094 Send and receive TCP traffic on the pingd port.
5095 </summary>
5096 @@ -48073,7 +48693,7 @@ Domain allowed access.
5097 </param>
5098 <infoflow type="both" weight="10"/>
5099 </interface>
5100 -<interface name="corenet_udp_send_pingd_port" lineno="61358">
5101 +<interface name="corenet_udp_send_pingd_port" lineno="61779">
5102 <summary>
5103 Send UDP traffic on the pingd port.
5104 </summary>
5105 @@ -48084,7 +48704,7 @@ Domain allowed access.
5106 </param>
5107 <infoflow type="write" weight="10"/>
5108 </interface>
5109 -<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61373">
5110 +<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61794">
5111 <summary>
5112 Do not audit attempts to send UDP traffic on the pingd port.
5113 </summary>
5114 @@ -48095,7 +48715,7 @@ Domain to not audit.
5115 </param>
5116 <infoflow type="none"/>
5117 </interface>
5118 -<interface name="corenet_udp_receive_pingd_port" lineno="61388">
5119 +<interface name="corenet_udp_receive_pingd_port" lineno="61809">
5120 <summary>
5121 Receive UDP traffic on the pingd port.
5122 </summary>
5123 @@ -48106,7 +48726,7 @@ Domain allowed access.
5124 </param>
5125 <infoflow type="read" weight="10"/>
5126 </interface>
5127 -<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61403">
5128 +<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61824">
5129 <summary>
5130 Do not audit attempts to receive UDP traffic on the pingd port.
5131 </summary>
5132 @@ -48117,7 +48737,7 @@ Domain to not audit.
5133 </param>
5134 <infoflow type="none"/>
5135 </interface>
5136 -<interface name="corenet_udp_sendrecv_pingd_port" lineno="61418">
5137 +<interface name="corenet_udp_sendrecv_pingd_port" lineno="61839">
5138 <summary>
5139 Send and receive UDP traffic on the pingd port.
5140 </summary>
5141 @@ -48128,7 +48748,7 @@ Domain allowed access.
5142 </param>
5143 <infoflow type="both" weight="10"/>
5144 </interface>
5145 -<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61434">
5146 +<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61855">
5147 <summary>
5148 Do not audit attempts to send and receive
5149 UDP traffic on the pingd port.
5150 @@ -48140,7 +48760,7 @@ Domain to not audit.
5151 </param>
5152 <infoflow type="none"/>
5153 </interface>
5154 -<interface name="corenet_tcp_bind_pingd_port" lineno="61449">
5155 +<interface name="corenet_tcp_bind_pingd_port" lineno="61870">
5156 <summary>
5157 Bind TCP sockets to the pingd port.
5158 </summary>
5159 @@ -48151,7 +48771,7 @@ Domain allowed access.
5160 </param>
5161 <infoflow type="none"/>
5162 </interface>
5163 -<interface name="corenet_udp_bind_pingd_port" lineno="61469">
5164 +<interface name="corenet_udp_bind_pingd_port" lineno="61890">
5165 <summary>
5166 Bind UDP sockets to the pingd port.
5167 </summary>
5168 @@ -48162,7 +48782,7 @@ Domain allowed access.
5169 </param>
5170 <infoflow type="none"/>
5171 </interface>
5172 -<interface name="corenet_tcp_connect_pingd_port" lineno="61488">
5173 +<interface name="corenet_tcp_connect_pingd_port" lineno="61909">
5174 <summary>
5175 Make a TCP connection to the pingd port.
5176 </summary>
5177 @@ -48172,7 +48792,7 @@ Domain allowed access.
5178 </summary>
5179 </param>
5180 </interface>
5181 -<interface name="corenet_send_pingd_client_packets" lineno="61508">
5182 +<interface name="corenet_send_pingd_client_packets" lineno="61929">
5183 <summary>
5184 Send pingd_client packets.
5185 </summary>
5186 @@ -48183,7 +48803,7 @@ Domain allowed access.
5187 </param>
5188 <infoflow type="write" weight="10"/>
5189 </interface>
5190 -<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61527">
5191 +<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61948">
5192 <summary>
5193 Do not audit attempts to send pingd_client packets.
5194 </summary>
5195 @@ -48194,7 +48814,7 @@ Domain to not audit.
5196 </param>
5197 <infoflow type="none"/>
5198 </interface>
5199 -<interface name="corenet_receive_pingd_client_packets" lineno="61546">
5200 +<interface name="corenet_receive_pingd_client_packets" lineno="61967">
5201 <summary>
5202 Receive pingd_client packets.
5203 </summary>
5204 @@ -48205,7 +48825,7 @@ Domain allowed access.
5205 </param>
5206 <infoflow type="read" weight="10"/>
5207 </interface>
5208 -<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="61565">
5209 +<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="61986">
5210 <summary>
5211 Do not audit attempts to receive pingd_client packets.
5212 </summary>
5213 @@ -48216,7 +48836,7 @@ Domain allowed access.
5214 </param>
5215 <infoflow type="none"/>
5216 </interface>
5217 -<interface name="corenet_sendrecv_pingd_client_packets" lineno="61584">
5218 +<interface name="corenet_sendrecv_pingd_client_packets" lineno="62005">
5219 <summary>
5220 Send and receive pingd_client packets.
5221 </summary>
5222 @@ -48227,7 +48847,7 @@ Domain allowed access.
5223 </param>
5224 <infoflow type="both" weight="10"/>
5225 </interface>
5226 -<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="61600">
5227 +<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="62021">
5228 <summary>
5229 Do not audit attempts to send and receive pingd_client packets.
5230 </summary>
5231 @@ -48238,7 +48858,7 @@ Domain to not audit.
5232 </param>
5233 <infoflow type="none"/>
5234 </interface>
5235 -<interface name="corenet_relabelto_pingd_client_packets" lineno="61615">
5236 +<interface name="corenet_relabelto_pingd_client_packets" lineno="62036">
5237 <summary>
5238 Relabel packets to pingd_client the packet type.
5239 </summary>
5240 @@ -48248,7 +48868,7 @@ Domain allowed access.
5241 </summary>
5242 </param>
5243 </interface>
5244 -<interface name="corenet_send_pingd_server_packets" lineno="61635">
5245 +<interface name="corenet_send_pingd_server_packets" lineno="62056">
5246 <summary>
5247 Send pingd_server packets.
5248 </summary>
5249 @@ -48259,7 +48879,7 @@ Domain allowed access.
5250 </param>
5251 <infoflow type="write" weight="10"/>
5252 </interface>
5253 -<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="61654">
5254 +<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="62075">
5255 <summary>
5256 Do not audit attempts to send pingd_server packets.
5257 </summary>
5258 @@ -48270,7 +48890,7 @@ Domain to not audit.
5259 </param>
5260 <infoflow type="none"/>
5261 </interface>
5262 -<interface name="corenet_receive_pingd_server_packets" lineno="61673">
5263 +<interface name="corenet_receive_pingd_server_packets" lineno="62094">
5264 <summary>
5265 Receive pingd_server packets.
5266 </summary>
5267 @@ -48281,7 +48901,7 @@ Domain allowed access.
5268 </param>
5269 <infoflow type="read" weight="10"/>
5270 </interface>
5271 -<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="61692">
5272 +<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="62113">
5273 <summary>
5274 Do not audit attempts to receive pingd_server packets.
5275 </summary>
5276 @@ -48292,7 +48912,7 @@ Domain allowed access.
5277 </param>
5278 <infoflow type="none"/>
5279 </interface>
5280 -<interface name="corenet_sendrecv_pingd_server_packets" lineno="61711">
5281 +<interface name="corenet_sendrecv_pingd_server_packets" lineno="62132">
5282 <summary>
5283 Send and receive pingd_server packets.
5284 </summary>
5285 @@ -48303,7 +48923,7 @@ Domain allowed access.
5286 </param>
5287 <infoflow type="both" weight="10"/>
5288 </interface>
5289 -<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="61727">
5290 +<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="62148">
5291 <summary>
5292 Do not audit attempts to send and receive pingd_server packets.
5293 </summary>
5294 @@ -48314,7 +48934,7 @@ Domain to not audit.
5295 </param>
5296 <infoflow type="none"/>
5297 </interface>
5298 -<interface name="corenet_relabelto_pingd_server_packets" lineno="61742">
5299 +<interface name="corenet_relabelto_pingd_server_packets" lineno="62163">
5300 <summary>
5301 Relabel packets to pingd_server the packet type.
5302 </summary>
5303 @@ -48324,7 +48944,7 @@ Domain allowed access.
5304 </summary>
5305 </param>
5306 </interface>
5307 -<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="61764">
5308 +<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="62185">
5309 <summary>
5310 Send and receive TCP traffic on the pktcable_cops port.
5311 </summary>
5312 @@ -48335,7 +48955,7 @@ Domain allowed access.
5313 </param>
5314 <infoflow type="both" weight="10"/>
5315 </interface>
5316 -<interface name="corenet_udp_send_pktcable_cops_port" lineno="61779">
5317 +<interface name="corenet_udp_send_pktcable_cops_port" lineno="62200">
5318 <summary>
5319 Send UDP traffic on the pktcable_cops port.
5320 </summary>
5321 @@ -48346,7 +48966,7 @@ Domain allowed access.
5322 </param>
5323 <infoflow type="write" weight="10"/>
5324 </interface>
5325 -<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="61794">
5326 +<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="62215">
5327 <summary>
5328 Do not audit attempts to send UDP traffic on the pktcable_cops port.
5329 </summary>
5330 @@ -48357,7 +48977,7 @@ Domain to not audit.
5331 </param>
5332 <infoflow type="none"/>
5333 </interface>
5334 -<interface name="corenet_udp_receive_pktcable_cops_port" lineno="61809">
5335 +<interface name="corenet_udp_receive_pktcable_cops_port" lineno="62230">
5336 <summary>
5337 Receive UDP traffic on the pktcable_cops port.
5338 </summary>
5339 @@ -48368,7 +48988,7 @@ Domain allowed access.
5340 </param>
5341 <infoflow type="read" weight="10"/>
5342 </interface>
5343 -<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="61824">
5344 +<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="62245">
5345 <summary>
5346 Do not audit attempts to receive UDP traffic on the pktcable_cops port.
5347 </summary>
5348 @@ -48379,7 +48999,7 @@ Domain to not audit.
5349 </param>
5350 <infoflow type="none"/>
5351 </interface>
5352 -<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="61839">
5353 +<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="62260">
5354 <summary>
5355 Send and receive UDP traffic on the pktcable_cops port.
5356 </summary>
5357 @@ -48390,7 +49010,7 @@ Domain allowed access.
5358 </param>
5359 <infoflow type="both" weight="10"/>
5360 </interface>
5361 -<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="61855">
5362 +<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="62276">
5363 <summary>
5364 Do not audit attempts to send and receive
5365 UDP traffic on the pktcable_cops port.
5366 @@ -48402,7 +49022,7 @@ Domain to not audit.
5367 </param>
5368 <infoflow type="none"/>
5369 </interface>
5370 -<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="61870">
5371 +<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="62291">
5372 <summary>
5373 Bind TCP sockets to the pktcable_cops port.
5374 </summary>
5375 @@ -48413,7 +49033,7 @@ Domain allowed access.
5376 </param>
5377 <infoflow type="none"/>
5378 </interface>
5379 -<interface name="corenet_udp_bind_pktcable_cops_port" lineno="61890">
5380 +<interface name="corenet_udp_bind_pktcable_cops_port" lineno="62311">
5381 <summary>
5382 Bind UDP sockets to the pktcable_cops port.
5383 </summary>
5384 @@ -48424,7 +49044,7 @@ Domain allowed access.
5385 </param>
5386 <infoflow type="none"/>
5387 </interface>
5388 -<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="61909">
5389 +<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="62330">
5390 <summary>
5391 Make a TCP connection to the pktcable_cops port.
5392 </summary>
5393 @@ -48434,7 +49054,7 @@ Domain allowed access.
5394 </summary>
5395 </param>
5396 </interface>
5397 -<interface name="corenet_send_pktcable_cops_client_packets" lineno="61929">
5398 +<interface name="corenet_send_pktcable_cops_client_packets" lineno="62350">
5399 <summary>
5400 Send pktcable_cops_client packets.
5401 </summary>
5402 @@ -48445,7 +49065,7 @@ Domain allowed access.
5403 </param>
5404 <infoflow type="write" weight="10"/>
5405 </interface>
5406 -<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="61948">
5407 +<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="62369">
5408 <summary>
5409 Do not audit attempts to send pktcable_cops_client packets.
5410 </summary>
5411 @@ -48456,7 +49076,7 @@ Domain to not audit.
5412 </param>
5413 <infoflow type="none"/>
5414 </interface>
5415 -<interface name="corenet_receive_pktcable_cops_client_packets" lineno="61967">
5416 +<interface name="corenet_receive_pktcable_cops_client_packets" lineno="62388">
5417 <summary>
5418 Receive pktcable_cops_client packets.
5419 </summary>
5420 @@ -48467,7 +49087,7 @@ Domain allowed access.
5421 </param>
5422 <infoflow type="read" weight="10"/>
5423 </interface>
5424 -<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="61986">
5425 +<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="62407">
5426 <summary>
5427 Do not audit attempts to receive pktcable_cops_client packets.
5428 </summary>
5429 @@ -48478,7 +49098,7 @@ Domain allowed access.
5430 </param>
5431 <infoflow type="none"/>
5432 </interface>
5433 -<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="62005">
5434 +<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="62426">
5435 <summary>
5436 Send and receive pktcable_cops_client packets.
5437 </summary>
5438 @@ -48489,7 +49109,7 @@ Domain allowed access.
5439 </param>
5440 <infoflow type="both" weight="10"/>
5441 </interface>
5442 -<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="62021">
5443 +<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="62442">
5444 <summary>
5445 Do not audit attempts to send and receive pktcable_cops_client packets.
5446 </summary>
5447 @@ -48500,7 +49120,7 @@ Domain to not audit.
5448 </param>
5449 <infoflow type="none"/>
5450 </interface>
5451 -<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="62036">
5452 +<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="62457">
5453 <summary>
5454 Relabel packets to pktcable_cops_client the packet type.
5455 </summary>
5456 @@ -48510,7 +49130,7 @@ Domain allowed access.
5457 </summary>
5458 </param>
5459 </interface>
5460 -<interface name="corenet_send_pktcable_cops_server_packets" lineno="62056">
5461 +<interface name="corenet_send_pktcable_cops_server_packets" lineno="62477">
5462 <summary>
5463 Send pktcable_cops_server packets.
5464 </summary>
5465 @@ -48521,7 +49141,7 @@ Domain allowed access.
5466 </param>
5467 <infoflow type="write" weight="10"/>
5468 </interface>
5469 -<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="62075">
5470 +<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="62496">
5471 <summary>
5472 Do not audit attempts to send pktcable_cops_server packets.
5473 </summary>
5474 @@ -48532,7 +49152,7 @@ Domain to not audit.
5475 </param>
5476 <infoflow type="none"/>
5477 </interface>
5478 -<interface name="corenet_receive_pktcable_cops_server_packets" lineno="62094">
5479 +<interface name="corenet_receive_pktcable_cops_server_packets" lineno="62515">
5480 <summary>
5481 Receive pktcable_cops_server packets.
5482 </summary>
5483 @@ -48543,7 +49163,7 @@ Domain allowed access.
5484 </param>
5485 <infoflow type="read" weight="10"/>
5486 </interface>
5487 -<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="62113">
5488 +<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="62534">
5489 <summary>
5490 Do not audit attempts to receive pktcable_cops_server packets.
5491 </summary>
5492 @@ -48554,7 +49174,7 @@ Domain allowed access.
5493 </param>
5494 <infoflow type="none"/>
5495 </interface>
5496 -<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="62132">
5497 +<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="62553">
5498 <summary>
5499 Send and receive pktcable_cops_server packets.
5500 </summary>
5501 @@ -48565,7 +49185,7 @@ Domain allowed access.
5502 </param>
5503 <infoflow type="both" weight="10"/>
5504 </interface>
5505 -<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="62148">
5506 +<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="62569">
5507 <summary>
5508 Do not audit attempts to send and receive pktcable_cops_server packets.
5509 </summary>
5510 @@ -48576,7 +49196,7 @@ Domain to not audit.
5511 </param>
5512 <infoflow type="none"/>
5513 </interface>
5514 -<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="62163">
5515 +<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="62584">
5516 <summary>
5517 Relabel packets to pktcable_cops_server the packet type.
5518 </summary>
5519 @@ -48586,7 +49206,7 @@ Domain allowed access.
5520 </summary>
5521 </param>
5522 </interface>
5523 -<interface name="corenet_tcp_sendrecv_pop_port" lineno="62185">
5524 +<interface name="corenet_tcp_sendrecv_pop_port" lineno="62606">
5525 <summary>
5526 Send and receive TCP traffic on the pop port.
5527 </summary>
5528 @@ -48597,7 +49217,7 @@ Domain allowed access.
5529 </param>
5530 <infoflow type="both" weight="10"/>
5531 </interface>
5532 -<interface name="corenet_udp_send_pop_port" lineno="62200">
5533 +<interface name="corenet_udp_send_pop_port" lineno="62621">
5534 <summary>
5535 Send UDP traffic on the pop port.
5536 </summary>
5537 @@ -48608,7 +49228,7 @@ Domain allowed access.
5538 </param>
5539 <infoflow type="write" weight="10"/>
5540 </interface>
5541 -<interface name="corenet_dontaudit_udp_send_pop_port" lineno="62215">
5542 +<interface name="corenet_dontaudit_udp_send_pop_port" lineno="62636">
5543 <summary>
5544 Do not audit attempts to send UDP traffic on the pop port.
5545 </summary>
5546 @@ -48619,7 +49239,7 @@ Domain to not audit.
5547 </param>
5548 <infoflow type="none"/>
5549 </interface>
5550 -<interface name="corenet_udp_receive_pop_port" lineno="62230">
5551 +<interface name="corenet_udp_receive_pop_port" lineno="62651">
5552 <summary>
5553 Receive UDP traffic on the pop port.
5554 </summary>
5555 @@ -48630,7 +49250,7 @@ Domain allowed access.
5556 </param>
5557 <infoflow type="read" weight="10"/>
5558 </interface>
5559 -<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="62245">
5560 +<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="62666">
5561 <summary>
5562 Do not audit attempts to receive UDP traffic on the pop port.
5563 </summary>
5564 @@ -48641,7 +49261,7 @@ Domain to not audit.
5565 </param>
5566 <infoflow type="none"/>
5567 </interface>
5568 -<interface name="corenet_udp_sendrecv_pop_port" lineno="62260">
5569 +<interface name="corenet_udp_sendrecv_pop_port" lineno="62681">
5570 <summary>
5571 Send and receive UDP traffic on the pop port.
5572 </summary>
5573 @@ -48652,7 +49272,7 @@ Domain allowed access.
5574 </param>
5575 <infoflow type="both" weight="10"/>
5576 </interface>
5577 -<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="62276">
5578 +<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="62697">
5579 <summary>
5580 Do not audit attempts to send and receive
5581 UDP traffic on the pop port.
5582 @@ -48664,7 +49284,7 @@ Domain to not audit.
5583 </param>
5584 <infoflow type="none"/>
5585 </interface>
5586 -<interface name="corenet_tcp_bind_pop_port" lineno="62291">
5587 +<interface name="corenet_tcp_bind_pop_port" lineno="62712">
5588 <summary>
5589 Bind TCP sockets to the pop port.
5590 </summary>
5591 @@ -48675,7 +49295,7 @@ Domain allowed access.
5592 </param>
5593 <infoflow type="none"/>
5594 </interface>
5595 -<interface name="corenet_udp_bind_pop_port" lineno="62311">
5596 +<interface name="corenet_udp_bind_pop_port" lineno="62732">
5597 <summary>
5598 Bind UDP sockets to the pop port.
5599 </summary>
5600 @@ -48686,7 +49306,7 @@ Domain allowed access.
5601 </param>
5602 <infoflow type="none"/>
5603 </interface>
5604 -<interface name="corenet_tcp_connect_pop_port" lineno="62330">
5605 +<interface name="corenet_tcp_connect_pop_port" lineno="62751">
5606 <summary>
5607 Make a TCP connection to the pop port.
5608 </summary>
5609 @@ -48696,7 +49316,7 @@ Domain allowed access.
5610 </summary>
5611 </param>
5612 </interface>
5613 -<interface name="corenet_send_pop_client_packets" lineno="62350">
5614 +<interface name="corenet_send_pop_client_packets" lineno="62771">
5615 <summary>
5616 Send pop_client packets.
5617 </summary>
5618 @@ -48707,7 +49327,7 @@ Domain allowed access.
5619 </param>
5620 <infoflow type="write" weight="10"/>
5621 </interface>
5622 -<interface name="corenet_dontaudit_send_pop_client_packets" lineno="62369">
5623 +<interface name="corenet_dontaudit_send_pop_client_packets" lineno="62790">
5624 <summary>
5625 Do not audit attempts to send pop_client packets.
5626 </summary>
5627 @@ -48718,7 +49338,7 @@ Domain to not audit.
5628 </param>
5629 <infoflow type="none"/>
5630 </interface>
5631 -<interface name="corenet_receive_pop_client_packets" lineno="62388">
5632 +<interface name="corenet_receive_pop_client_packets" lineno="62809">
5633 <summary>
5634 Receive pop_client packets.
5635 </summary>
5636 @@ -48729,7 +49349,7 @@ Domain allowed access.
5637 </param>
5638 <infoflow type="read" weight="10"/>
5639 </interface>
5640 -<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="62407">
5641 +<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="62828">
5642 <summary>
5643 Do not audit attempts to receive pop_client packets.
5644 </summary>
5645 @@ -48740,7 +49360,7 @@ Domain allowed access.
5646 </param>
5647 <infoflow type="none"/>
5648 </interface>
5649 -<interface name="corenet_sendrecv_pop_client_packets" lineno="62426">
5650 +<interface name="corenet_sendrecv_pop_client_packets" lineno="62847">
5651 <summary>
5652 Send and receive pop_client packets.
5653 </summary>
5654 @@ -48751,7 +49371,7 @@ Domain allowed access.
5655 </param>
5656 <infoflow type="both" weight="10"/>
5657 </interface>
5658 -<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="62442">
5659 +<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="62863">
5660 <summary>
5661 Do not audit attempts to send and receive pop_client packets.
5662 </summary>
5663 @@ -48762,7 +49382,7 @@ Domain to not audit.
5664 </param>
5665 <infoflow type="none"/>
5666 </interface>
5667 -<interface name="corenet_relabelto_pop_client_packets" lineno="62457">
5668 +<interface name="corenet_relabelto_pop_client_packets" lineno="62878">
5669 <summary>
5670 Relabel packets to pop_client the packet type.
5671 </summary>
5672 @@ -48772,7 +49392,7 @@ Domain allowed access.
5673 </summary>
5674 </param>
5675 </interface>
5676 -<interface name="corenet_send_pop_server_packets" lineno="62477">
5677 +<interface name="corenet_send_pop_server_packets" lineno="62898">
5678 <summary>
5679 Send pop_server packets.
5680 </summary>
5681 @@ -48783,7 +49403,7 @@ Domain allowed access.
5682 </param>
5683 <infoflow type="write" weight="10"/>
5684 </interface>
5685 -<interface name="corenet_dontaudit_send_pop_server_packets" lineno="62496">
5686 +<interface name="corenet_dontaudit_send_pop_server_packets" lineno="62917">
5687 <summary>
5688 Do not audit attempts to send pop_server packets.
5689 </summary>
5690 @@ -48794,7 +49414,7 @@ Domain to not audit.
5691 </param>
5692 <infoflow type="none"/>
5693 </interface>
5694 -<interface name="corenet_receive_pop_server_packets" lineno="62515">
5695 +<interface name="corenet_receive_pop_server_packets" lineno="62936">
5696 <summary>
5697 Receive pop_server packets.
5698 </summary>
5699 @@ -48805,7 +49425,7 @@ Domain allowed access.
5700 </param>
5701 <infoflow type="read" weight="10"/>
5702 </interface>
5703 -<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="62534">
5704 +<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="62955">
5705 <summary>
5706 Do not audit attempts to receive pop_server packets.
5707 </summary>
5708 @@ -48816,7 +49436,7 @@ Domain allowed access.
5709 </param>
5710 <infoflow type="none"/>
5711 </interface>
5712 -<interface name="corenet_sendrecv_pop_server_packets" lineno="62553">
5713 +<interface name="corenet_sendrecv_pop_server_packets" lineno="62974">
5714 <summary>
5715 Send and receive pop_server packets.
5716 </summary>
5717 @@ -48827,7 +49447,7 @@ Domain allowed access.
5718 </param>
5719 <infoflow type="both" weight="10"/>
5720 </interface>
5721 -<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="62569">
5722 +<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="62990">
5723 <summary>
5724 Do not audit attempts to send and receive pop_server packets.
5725 </summary>
5726 @@ -48838,7 +49458,7 @@ Domain to not audit.
5727 </param>
5728 <infoflow type="none"/>
5729 </interface>
5730 -<interface name="corenet_relabelto_pop_server_packets" lineno="62584">
5731 +<interface name="corenet_relabelto_pop_server_packets" lineno="63005">
5732 <summary>
5733 Relabel packets to pop_server the packet type.
5734 </summary>
5735 @@ -48848,7 +49468,7 @@ Domain allowed access.
5736 </summary>
5737 </param>
5738 </interface>
5739 -<interface name="corenet_tcp_sendrecv_portmap_port" lineno="62606">
5740 +<interface name="corenet_tcp_sendrecv_portmap_port" lineno="63027">
5741 <summary>
5742 Send and receive TCP traffic on the portmap port.
5743 </summary>
5744 @@ -48859,7 +49479,7 @@ Domain allowed access.
5745 </param>
5746 <infoflow type="both" weight="10"/>
5747 </interface>
5748 -<interface name="corenet_udp_send_portmap_port" lineno="62621">
5749 +<interface name="corenet_udp_send_portmap_port" lineno="63042">
5750 <summary>
5751 Send UDP traffic on the portmap port.
5752 </summary>
5753 @@ -48870,7 +49490,7 @@ Domain allowed access.
5754 </param>
5755 <infoflow type="write" weight="10"/>
5756 </interface>
5757 -<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="62636">
5758 +<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="63057">
5759 <summary>
5760 Do not audit attempts to send UDP traffic on the portmap port.
5761 </summary>
5762 @@ -48881,7 +49501,7 @@ Domain to not audit.
5763 </param>
5764 <infoflow type="none"/>
5765 </interface>
5766 -<interface name="corenet_udp_receive_portmap_port" lineno="62651">
5767 +<interface name="corenet_udp_receive_portmap_port" lineno="63072">
5768 <summary>
5769 Receive UDP traffic on the portmap port.
5770 </summary>
5771 @@ -48892,7 +49512,7 @@ Domain allowed access.
5772 </param>
5773 <infoflow type="read" weight="10"/>
5774 </interface>
5775 -<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="62666">
5776 +<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="63087">
5777 <summary>
5778 Do not audit attempts to receive UDP traffic on the portmap port.
5779 </summary>
5780 @@ -48903,7 +49523,7 @@ Domain to not audit.
5781 </param>
5782 <infoflow type="none"/>
5783 </interface>
5784 -<interface name="corenet_udp_sendrecv_portmap_port" lineno="62681">
5785 +<interface name="corenet_udp_sendrecv_portmap_port" lineno="63102">
5786 <summary>
5787 Send and receive UDP traffic on the portmap port.
5788 </summary>
5789 @@ -48914,7 +49534,7 @@ Domain allowed access.
5790 </param>
5791 <infoflow type="both" weight="10"/>
5792 </interface>
5793 -<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="62697">
5794 +<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="63118">
5795 <summary>
5796 Do not audit attempts to send and receive
5797 UDP traffic on the portmap port.
5798 @@ -48926,7 +49546,7 @@ Domain to not audit.
5799 </param>
5800 <infoflow type="none"/>
5801 </interface>
5802 -<interface name="corenet_tcp_bind_portmap_port" lineno="62712">
5803 +<interface name="corenet_tcp_bind_portmap_port" lineno="63133">
5804 <summary>
5805 Bind TCP sockets to the portmap port.
5806 </summary>
5807 @@ -48937,7 +49557,7 @@ Domain allowed access.
5808 </param>
5809 <infoflow type="none"/>
5810 </interface>
5811 -<interface name="corenet_udp_bind_portmap_port" lineno="62732">
5812 +<interface name="corenet_udp_bind_portmap_port" lineno="63153">
5813 <summary>
5814 Bind UDP sockets to the portmap port.
5815 </summary>
5816 @@ -48948,7 +49568,7 @@ Domain allowed access.
5817 </param>
5818 <infoflow type="none"/>
5819 </interface>
5820 -<interface name="corenet_tcp_connect_portmap_port" lineno="62751">
5821 +<interface name="corenet_tcp_connect_portmap_port" lineno="63172">
5822 <summary>
5823 Make a TCP connection to the portmap port.
5824 </summary>
5825 @@ -48958,7 +49578,7 @@ Domain allowed access.
5826 </summary>
5827 </param>
5828 </interface>
5829 -<interface name="corenet_send_portmap_client_packets" lineno="62771">
5830 +<interface name="corenet_send_portmap_client_packets" lineno="63192">
5831 <summary>
5832 Send portmap_client packets.
5833 </summary>
5834 @@ -48969,7 +49589,7 @@ Domain allowed access.
5835 </param>
5836 <infoflow type="write" weight="10"/>
5837 </interface>
5838 -<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="62790">
5839 +<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="63211">
5840 <summary>
5841 Do not audit attempts to send portmap_client packets.
5842 </summary>
5843 @@ -48980,7 +49600,7 @@ Domain to not audit.
5844 </param>
5845 <infoflow type="none"/>
5846 </interface>
5847 -<interface name="corenet_receive_portmap_client_packets" lineno="62809">
5848 +<interface name="corenet_receive_portmap_client_packets" lineno="63230">
5849 <summary>
5850 Receive portmap_client packets.
5851 </summary>
5852 @@ -48991,7 +49611,7 @@ Domain allowed access.
5853 </param>
5854 <infoflow type="read" weight="10"/>
5855 </interface>
5856 -<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="62828">
5857 +<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="63249">
5858 <summary>
5859 Do not audit attempts to receive portmap_client packets.
5860 </summary>
5861 @@ -49002,7 +49622,7 @@ Domain allowed access.
5862 </param>
5863 <infoflow type="none"/>
5864 </interface>
5865 -<interface name="corenet_sendrecv_portmap_client_packets" lineno="62847">
5866 +<interface name="corenet_sendrecv_portmap_client_packets" lineno="63268">
5867 <summary>
5868 Send and receive portmap_client packets.
5869 </summary>
5870 @@ -49013,7 +49633,7 @@ Domain allowed access.
5871 </param>
5872 <infoflow type="both" weight="10"/>
5873 </interface>
5874 -<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="62863">
5875 +<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="63284">
5876 <summary>
5877 Do not audit attempts to send and receive portmap_client packets.
5878 </summary>
5879 @@ -49024,7 +49644,7 @@ Domain to not audit.
5880 </param>
5881 <infoflow type="none"/>
5882 </interface>
5883 -<interface name="corenet_relabelto_portmap_client_packets" lineno="62878">
5884 +<interface name="corenet_relabelto_portmap_client_packets" lineno="63299">
5885 <summary>
5886 Relabel packets to portmap_client the packet type.
5887 </summary>
5888 @@ -49034,7 +49654,7 @@ Domain allowed access.
5889 </summary>
5890 </param>
5891 </interface>
5892 -<interface name="corenet_send_portmap_server_packets" lineno="62898">
5893 +<interface name="corenet_send_portmap_server_packets" lineno="63319">
5894 <summary>
5895 Send portmap_server packets.
5896 </summary>
5897 @@ -49045,7 +49665,7 @@ Domain allowed access.
5898 </param>
5899 <infoflow type="write" weight="10"/>
5900 </interface>
5901 -<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="62917">
5902 +<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="63338">
5903 <summary>
5904 Do not audit attempts to send portmap_server packets.
5905 </summary>
5906 @@ -49056,7 +49676,7 @@ Domain to not audit.
5907 </param>
5908 <infoflow type="none"/>
5909 </interface>
5910 -<interface name="corenet_receive_portmap_server_packets" lineno="62936">
5911 +<interface name="corenet_receive_portmap_server_packets" lineno="63357">
5912 <summary>
5913 Receive portmap_server packets.
5914 </summary>
5915 @@ -49067,7 +49687,7 @@ Domain allowed access.
5916 </param>
5917 <infoflow type="read" weight="10"/>
5918 </interface>
5919 -<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="62955">
5920 +<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="63376">
5921 <summary>
5922 Do not audit attempts to receive portmap_server packets.
5923 </summary>
5924 @@ -49078,7 +49698,7 @@ Domain allowed access.
5925 </param>
5926 <infoflow type="none"/>
5927 </interface>
5928 -<interface name="corenet_sendrecv_portmap_server_packets" lineno="62974">
5929 +<interface name="corenet_sendrecv_portmap_server_packets" lineno="63395">
5930 <summary>
5931 Send and receive portmap_server packets.
5932 </summary>
5933 @@ -49089,7 +49709,7 @@ Domain allowed access.
5934 </param>
5935 <infoflow type="both" weight="10"/>
5936 </interface>
5937 -<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="62990">
5938 +<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="63411">
5939 <summary>
5940 Do not audit attempts to send and receive portmap_server packets.
5941 </summary>
5942 @@ -49100,7 +49720,7 @@ Domain to not audit.
5943 </param>
5944 <infoflow type="none"/>
5945 </interface>
5946 -<interface name="corenet_relabelto_portmap_server_packets" lineno="63005">
5947 +<interface name="corenet_relabelto_portmap_server_packets" lineno="63426">
5948 <summary>
5949 Relabel packets to portmap_server the packet type.
5950 </summary>
5951 @@ -49110,7 +49730,7 @@ Domain allowed access.
5952 </summary>
5953 </param>
5954 </interface>
5955 -<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="63027">
5956 +<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="63448">
5957 <summary>
5958 Send and receive TCP traffic on the postfix_policyd port.
5959 </summary>
5960 @@ -49121,7 +49741,7 @@ Domain allowed access.
5961 </param>
5962 <infoflow type="both" weight="10"/>
5963 </interface>
5964 -<interface name="corenet_udp_send_postfix_policyd_port" lineno="63042">
5965 +<interface name="corenet_udp_send_postfix_policyd_port" lineno="63463">
5966 <summary>
5967 Send UDP traffic on the postfix_policyd port.
5968 </summary>
5969 @@ -49132,7 +49752,7 @@ Domain allowed access.
5970 </param>
5971 <infoflow type="write" weight="10"/>
5972 </interface>
5973 -<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="63057">
5974 +<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="63478">
5975 <summary>
5976 Do not audit attempts to send UDP traffic on the postfix_policyd port.
5977 </summary>
5978 @@ -49143,7 +49763,7 @@ Domain to not audit.
5979 </param>
5980 <infoflow type="none"/>
5981 </interface>
5982 -<interface name="corenet_udp_receive_postfix_policyd_port" lineno="63072">
5983 +<interface name="corenet_udp_receive_postfix_policyd_port" lineno="63493">
5984 <summary>
5985 Receive UDP traffic on the postfix_policyd port.
5986 </summary>
5987 @@ -49154,7 +49774,7 @@ Domain allowed access.
5988 </param>
5989 <infoflow type="read" weight="10"/>
5990 </interface>
5991 -<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="63087">
5992 +<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="63508">
5993 <summary>
5994 Do not audit attempts to receive UDP traffic on the postfix_policyd port.
5995 </summary>
5996 @@ -49165,7 +49785,7 @@ Domain to not audit.
5997 </param>
5998 <infoflow type="none"/>
5999 </interface>
6000 -<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="63102">
6001 +<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="63523">
6002 <summary>
6003 Send and receive UDP traffic on the postfix_policyd port.
6004 </summary>
6005 @@ -49176,7 +49796,7 @@ Domain allowed access.
6006 </param>
6007 <infoflow type="both" weight="10"/>
6008 </interface>
6009 -<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="63118">
6010 +<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="63539">
6011 <summary>
6012 Do not audit attempts to send and receive
6013 UDP traffic on the postfix_policyd port.
6014 @@ -49188,7 +49808,7 @@ Domain to not audit.
6015 </param>
6016 <infoflow type="none"/>
6017 </interface>
6018 -<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="63133">
6019 +<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="63554">
6020 <summary>
6021 Bind TCP sockets to the postfix_policyd port.
6022 </summary>
6023 @@ -49199,7 +49819,7 @@ Domain allowed access.
6024 </param>
6025 <infoflow type="none"/>
6026 </interface>
6027 -<interface name="corenet_udp_bind_postfix_policyd_port" lineno="63153">
6028 +<interface name="corenet_udp_bind_postfix_policyd_port" lineno="63574">
6029 <summary>
6030 Bind UDP sockets to the postfix_policyd port.
6031 </summary>
6032 @@ -49210,7 +49830,7 @@ Domain allowed access.
6033 </param>
6034 <infoflow type="none"/>
6035 </interface>
6036 -<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="63172">
6037 +<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="63593">
6038 <summary>
6039 Make a TCP connection to the postfix_policyd port.
6040 </summary>
6041 @@ -49220,7 +49840,7 @@ Domain allowed access.
6042 </summary>
6043 </param>
6044 </interface>
6045 -<interface name="corenet_send_postfix_policyd_client_packets" lineno="63192">
6046 +<interface name="corenet_send_postfix_policyd_client_packets" lineno="63613">
6047 <summary>
6048 Send postfix_policyd_client packets.
6049 </summary>
6050 @@ -49231,7 +49851,7 @@ Domain allowed access.
6051 </param>
6052 <infoflow type="write" weight="10"/>
6053 </interface>
6054 -<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="63211">
6055 +<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="63632">
6056 <summary>
6057 Do not audit attempts to send postfix_policyd_client packets.
6058 </summary>
6059 @@ -49242,7 +49862,7 @@ Domain to not audit.
6060 </param>
6061 <infoflow type="none"/>
6062 </interface>
6063 -<interface name="corenet_receive_postfix_policyd_client_packets" lineno="63230">
6064 +<interface name="corenet_receive_postfix_policyd_client_packets" lineno="63651">
6065 <summary>
6066 Receive postfix_policyd_client packets.
6067 </summary>
6068 @@ -49253,7 +49873,7 @@ Domain allowed access.
6069 </param>
6070 <infoflow type="read" weight="10"/>
6071 </interface>
6072 -<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="63249">
6073 +<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="63670">
6074 <summary>
6075 Do not audit attempts to receive postfix_policyd_client packets.
6076 </summary>
6077 @@ -49264,7 +49884,7 @@ Domain allowed access.
6078 </param>
6079 <infoflow type="none"/>
6080 </interface>
6081 -<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="63268">
6082 +<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="63689">
6083 <summary>
6084 Send and receive postfix_policyd_client packets.
6085 </summary>
6086 @@ -49275,7 +49895,7 @@ Domain allowed access.
6087 </param>
6088 <infoflow type="both" weight="10"/>
6089 </interface>
6090 -<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="63284">
6091 +<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="63705">
6092 <summary>
6093 Do not audit attempts to send and receive postfix_policyd_client packets.
6094 </summary>
6095 @@ -49286,7 +49906,7 @@ Domain to not audit.
6096 </param>
6097 <infoflow type="none"/>
6098 </interface>
6099 -<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="63299">
6100 +<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="63720">
6101 <summary>
6102 Relabel packets to postfix_policyd_client the packet type.
6103 </summary>
6104 @@ -49296,7 +49916,7 @@ Domain allowed access.
6105 </summary>
6106 </param>
6107 </interface>
6108 -<interface name="corenet_send_postfix_policyd_server_packets" lineno="63319">
6109 +<interface name="corenet_send_postfix_policyd_server_packets" lineno="63740">
6110 <summary>
6111 Send postfix_policyd_server packets.
6112 </summary>
6113 @@ -49307,7 +49927,7 @@ Domain allowed access.
6114 </param>
6115 <infoflow type="write" weight="10"/>
6116 </interface>
6117 -<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="63338">
6118 +<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="63759">
6119 <summary>
6120 Do not audit attempts to send postfix_policyd_server packets.
6121 </summary>
6122 @@ -49318,7 +49938,7 @@ Domain to not audit.
6123 </param>
6124 <infoflow type="none"/>
6125 </interface>
6126 -<interface name="corenet_receive_postfix_policyd_server_packets" lineno="63357">
6127 +<interface name="corenet_receive_postfix_policyd_server_packets" lineno="63778">
6128 <summary>
6129 Receive postfix_policyd_server packets.
6130 </summary>
6131 @@ -49329,7 +49949,7 @@ Domain allowed access.
6132 </param>
6133 <infoflow type="read" weight="10"/>
6134 </interface>
6135 -<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="63376">
6136 +<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="63797">
6137 <summary>
6138 Do not audit attempts to receive postfix_policyd_server packets.
6139 </summary>
6140 @@ -49340,7 +49960,7 @@ Domain allowed access.
6141 </param>
6142 <infoflow type="none"/>
6143 </interface>
6144 -<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="63395">
6145 +<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="63816">
6146 <summary>
6147 Send and receive postfix_policyd_server packets.
6148 </summary>
6149 @@ -49351,7 +49971,7 @@ Domain allowed access.
6150 </param>
6151 <infoflow type="both" weight="10"/>
6152 </interface>
6153 -<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="63411">
6154 +<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="63832">
6155 <summary>
6156 Do not audit attempts to send and receive postfix_policyd_server packets.
6157 </summary>
6158 @@ -49362,7 +49982,7 @@ Domain to not audit.
6159 </param>
6160 <infoflow type="none"/>
6161 </interface>
6162 -<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="63426">
6163 +<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="63847">
6164 <summary>
6165 Relabel packets to postfix_policyd_server the packet type.
6166 </summary>
6167 @@ -49372,7 +49992,7 @@ Domain allowed access.
6168 </summary>
6169 </param>
6170 </interface>
6171 -<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="63448">
6172 +<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="63869">
6173 <summary>
6174 Send and receive TCP traffic on the postgresql port.
6175 </summary>
6176 @@ -49383,7 +50003,7 @@ Domain allowed access.
6177 </param>
6178 <infoflow type="both" weight="10"/>
6179 </interface>
6180 -<interface name="corenet_udp_send_postgresql_port" lineno="63463">
6181 +<interface name="corenet_udp_send_postgresql_port" lineno="63884">
6182 <summary>
6183 Send UDP traffic on the postgresql port.
6184 </summary>
6185 @@ -49394,7 +50014,7 @@ Domain allowed access.
6186 </param>
6187 <infoflow type="write" weight="10"/>
6188 </interface>
6189 -<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="63478">
6190 +<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="63899">
6191 <summary>
6192 Do not audit attempts to send UDP traffic on the postgresql port.
6193 </summary>
6194 @@ -49405,7 +50025,7 @@ Domain to not audit.
6195 </param>
6196 <infoflow type="none"/>
6197 </interface>
6198 -<interface name="corenet_udp_receive_postgresql_port" lineno="63493">
6199 +<interface name="corenet_udp_receive_postgresql_port" lineno="63914">
6200 <summary>
6201 Receive UDP traffic on the postgresql port.
6202 </summary>
6203 @@ -49416,7 +50036,7 @@ Domain allowed access.
6204 </param>
6205 <infoflow type="read" weight="10"/>
6206 </interface>
6207 -<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="63508">
6208 +<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="63929">
6209 <summary>
6210 Do not audit attempts to receive UDP traffic on the postgresql port.
6211 </summary>
6212 @@ -49427,7 +50047,7 @@ Domain to not audit.
6213 </param>
6214 <infoflow type="none"/>
6215 </interface>
6216 -<interface name="corenet_udp_sendrecv_postgresql_port" lineno="63523">
6217 +<interface name="corenet_udp_sendrecv_postgresql_port" lineno="63944">
6218 <summary>
6219 Send and receive UDP traffic on the postgresql port.
6220 </summary>
6221 @@ -49438,7 +50058,7 @@ Domain allowed access.
6222 </param>
6223 <infoflow type="both" weight="10"/>
6224 </interface>
6225 -<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="63539">
6226 +<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="63960">
6227 <summary>
6228 Do not audit attempts to send and receive
6229 UDP traffic on the postgresql port.
6230 @@ -49450,7 +50070,7 @@ Domain to not audit.
6231 </param>
6232 <infoflow type="none"/>
6233 </interface>
6234 -<interface name="corenet_tcp_bind_postgresql_port" lineno="63554">
6235 +<interface name="corenet_tcp_bind_postgresql_port" lineno="63975">
6236 <summary>
6237 Bind TCP sockets to the postgresql port.
6238 </summary>
6239 @@ -49461,7 +50081,7 @@ Domain allowed access.
6240 </param>
6241 <infoflow type="none"/>
6242 </interface>
6243 -<interface name="corenet_udp_bind_postgresql_port" lineno="63574">
6244 +<interface name="corenet_udp_bind_postgresql_port" lineno="63995">
6245 <summary>
6246 Bind UDP sockets to the postgresql port.
6247 </summary>
6248 @@ -49472,7 +50092,7 @@ Domain allowed access.
6249 </param>
6250 <infoflow type="none"/>
6251 </interface>
6252 -<interface name="corenet_tcp_connect_postgresql_port" lineno="63593">
6253 +<interface name="corenet_tcp_connect_postgresql_port" lineno="64014">
6254 <summary>
6255 Make a TCP connection to the postgresql port.
6256 </summary>
6257 @@ -49482,7 +50102,7 @@ Domain allowed access.
6258 </summary>
6259 </param>
6260 </interface>
6261 -<interface name="corenet_send_postgresql_client_packets" lineno="63613">
6262 +<interface name="corenet_send_postgresql_client_packets" lineno="64034">
6263 <summary>
6264 Send postgresql_client packets.
6265 </summary>
6266 @@ -49493,7 +50113,7 @@ Domain allowed access.
6267 </param>
6268 <infoflow type="write" weight="10"/>
6269 </interface>
6270 -<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="63632">
6271 +<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="64053">
6272 <summary>
6273 Do not audit attempts to send postgresql_client packets.
6274 </summary>
6275 @@ -49504,7 +50124,7 @@ Domain to not audit.
6276 </param>
6277 <infoflow type="none"/>
6278 </interface>
6279 -<interface name="corenet_receive_postgresql_client_packets" lineno="63651">
6280 +<interface name="corenet_receive_postgresql_client_packets" lineno="64072">
6281 <summary>
6282 Receive postgresql_client packets.
6283 </summary>
6284 @@ -49515,7 +50135,7 @@ Domain allowed access.
6285 </param>
6286 <infoflow type="read" weight="10"/>
6287 </interface>
6288 -<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="63670">
6289 +<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="64091">
6290 <summary>
6291 Do not audit attempts to receive postgresql_client packets.
6292 </summary>
6293 @@ -49526,7 +50146,7 @@ Domain allowed access.
6294 </param>
6295 <infoflow type="none"/>
6296 </interface>
6297 -<interface name="corenet_sendrecv_postgresql_client_packets" lineno="63689">
6298 +<interface name="corenet_sendrecv_postgresql_client_packets" lineno="64110">
6299 <summary>
6300 Send and receive postgresql_client packets.
6301 </summary>
6302 @@ -49537,7 +50157,7 @@ Domain allowed access.
6303 </param>
6304 <infoflow type="both" weight="10"/>
6305 </interface>
6306 -<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="63705">
6307 +<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="64126">
6308 <summary>
6309 Do not audit attempts to send and receive postgresql_client packets.
6310 </summary>
6311 @@ -49548,7 +50168,7 @@ Domain to not audit.
6312 </param>
6313 <infoflow type="none"/>
6314 </interface>
6315 -<interface name="corenet_relabelto_postgresql_client_packets" lineno="63720">
6316 +<interface name="corenet_relabelto_postgresql_client_packets" lineno="64141">
6317 <summary>
6318 Relabel packets to postgresql_client the packet type.
6319 </summary>
6320 @@ -49558,7 +50178,7 @@ Domain allowed access.
6321 </summary>
6322 </param>
6323 </interface>
6324 -<interface name="corenet_send_postgresql_server_packets" lineno="63740">
6325 +<interface name="corenet_send_postgresql_server_packets" lineno="64161">
6326 <summary>
6327 Send postgresql_server packets.
6328 </summary>
6329 @@ -49569,7 +50189,7 @@ Domain allowed access.
6330 </param>
6331 <infoflow type="write" weight="10"/>
6332 </interface>
6333 -<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="63759">
6334 +<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="64180">
6335 <summary>
6336 Do not audit attempts to send postgresql_server packets.
6337 </summary>
6338 @@ -49580,7 +50200,7 @@ Domain to not audit.
6339 </param>
6340 <infoflow type="none"/>
6341 </interface>
6342 -<interface name="corenet_receive_postgresql_server_packets" lineno="63778">
6343 +<interface name="corenet_receive_postgresql_server_packets" lineno="64199">
6344 <summary>
6345 Receive postgresql_server packets.
6346 </summary>
6347 @@ -49591,7 +50211,7 @@ Domain allowed access.
6348 </param>
6349 <infoflow type="read" weight="10"/>
6350 </interface>
6351 -<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="63797">
6352 +<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="64218">
6353 <summary>
6354 Do not audit attempts to receive postgresql_server packets.
6355 </summary>
6356 @@ -49602,7 +50222,7 @@ Domain allowed access.
6357 </param>
6358 <infoflow type="none"/>
6359 </interface>
6360 -<interface name="corenet_sendrecv_postgresql_server_packets" lineno="63816">
6361 +<interface name="corenet_sendrecv_postgresql_server_packets" lineno="64237">
6362 <summary>
6363 Send and receive postgresql_server packets.
6364 </summary>
6365 @@ -49613,7 +50233,7 @@ Domain allowed access.
6366 </param>
6367 <infoflow type="both" weight="10"/>
6368 </interface>
6369 -<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="63832">
6370 +<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="64253">
6371 <summary>
6372 Do not audit attempts to send and receive postgresql_server packets.
6373 </summary>
6374 @@ -49624,7 +50244,7 @@ Domain to not audit.
6375 </param>
6376 <infoflow type="none"/>
6377 </interface>
6378 -<interface name="corenet_relabelto_postgresql_server_packets" lineno="63847">
6379 +<interface name="corenet_relabelto_postgresql_server_packets" lineno="64268">
6380 <summary>
6381 Relabel packets to postgresql_server the packet type.
6382 </summary>
6383 @@ -49634,7 +50254,7 @@ Domain allowed access.
6384 </summary>
6385 </param>
6386 </interface>
6387 -<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="63869">
6388 +<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="64290">
6389 <summary>
6390 Send and receive TCP traffic on the postgrey port.
6391 </summary>
6392 @@ -49645,7 +50265,7 @@ Domain allowed access.
6393 </param>
6394 <infoflow type="both" weight="10"/>
6395 </interface>
6396 -<interface name="corenet_udp_send_postgrey_port" lineno="63884">
6397 +<interface name="corenet_udp_send_postgrey_port" lineno="64305">
6398 <summary>
6399 Send UDP traffic on the postgrey port.
6400 </summary>
6401 @@ -49656,7 +50276,7 @@ Domain allowed access.
6402 </param>
6403 <infoflow type="write" weight="10"/>
6404 </interface>
6405 -<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="63899">
6406 +<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="64320">
6407 <summary>
6408 Do not audit attempts to send UDP traffic on the postgrey port.
6409 </summary>
6410 @@ -49667,7 +50287,7 @@ Domain to not audit.
6411 </param>
6412 <infoflow type="none"/>
6413 </interface>
6414 -<interface name="corenet_udp_receive_postgrey_port" lineno="63914">
6415 +<interface name="corenet_udp_receive_postgrey_port" lineno="64335">
6416 <summary>
6417 Receive UDP traffic on the postgrey port.
6418 </summary>
6419 @@ -49678,7 +50298,7 @@ Domain allowed access.
6420 </param>
6421 <infoflow type="read" weight="10"/>
6422 </interface>
6423 -<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="63929">
6424 +<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="64350">
6425 <summary>
6426 Do not audit attempts to receive UDP traffic on the postgrey port.
6427 </summary>
6428 @@ -49689,7 +50309,7 @@ Domain to not audit.
6429 </param>
6430 <infoflow type="none"/>
6431 </interface>
6432 -<interface name="corenet_udp_sendrecv_postgrey_port" lineno="63944">
6433 +<interface name="corenet_udp_sendrecv_postgrey_port" lineno="64365">
6434 <summary>
6435 Send and receive UDP traffic on the postgrey port.
6436 </summary>
6437 @@ -49700,7 +50320,7 @@ Domain allowed access.
6438 </param>
6439 <infoflow type="both" weight="10"/>
6440 </interface>
6441 -<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="63960">
6442 +<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="64381">
6443 <summary>
6444 Do not audit attempts to send and receive
6445 UDP traffic on the postgrey port.
6446 @@ -49712,7 +50332,7 @@ Domain to not audit.
6447 </param>
6448 <infoflow type="none"/>
6449 </interface>
6450 -<interface name="corenet_tcp_bind_postgrey_port" lineno="63975">
6451 +<interface name="corenet_tcp_bind_postgrey_port" lineno="64396">
6452 <summary>
6453 Bind TCP sockets to the postgrey port.
6454 </summary>
6455 @@ -49723,7 +50343,7 @@ Domain allowed access.
6456 </param>
6457 <infoflow type="none"/>
6458 </interface>
6459 -<interface name="corenet_udp_bind_postgrey_port" lineno="63995">
6460 +<interface name="corenet_udp_bind_postgrey_port" lineno="64416">
6461 <summary>
6462 Bind UDP sockets to the postgrey port.
6463 </summary>
6464 @@ -49734,7 +50354,7 @@ Domain allowed access.
6465 </param>
6466 <infoflow type="none"/>
6467 </interface>
6468 -<interface name="corenet_tcp_connect_postgrey_port" lineno="64014">
6469 +<interface name="corenet_tcp_connect_postgrey_port" lineno="64435">
6470 <summary>
6471 Make a TCP connection to the postgrey port.
6472 </summary>
6473 @@ -49744,7 +50364,7 @@ Domain allowed access.
6474 </summary>
6475 </param>
6476 </interface>
6477 -<interface name="corenet_send_postgrey_client_packets" lineno="64034">
6478 +<interface name="corenet_send_postgrey_client_packets" lineno="64455">
6479 <summary>
6480 Send postgrey_client packets.
6481 </summary>
6482 @@ -49755,7 +50375,7 @@ Domain allowed access.
6483 </param>
6484 <infoflow type="write" weight="10"/>
6485 </interface>
6486 -<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="64053">
6487 +<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="64474">
6488 <summary>
6489 Do not audit attempts to send postgrey_client packets.
6490 </summary>
6491 @@ -49766,7 +50386,7 @@ Domain to not audit.
6492 </param>
6493 <infoflow type="none"/>
6494 </interface>
6495 -<interface name="corenet_receive_postgrey_client_packets" lineno="64072">
6496 +<interface name="corenet_receive_postgrey_client_packets" lineno="64493">
6497 <summary>
6498 Receive postgrey_client packets.
6499 </summary>
6500 @@ -49777,7 +50397,7 @@ Domain allowed access.
6501 </param>
6502 <infoflow type="read" weight="10"/>
6503 </interface>
6504 -<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="64091">
6505 +<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="64512">
6506 <summary>
6507 Do not audit attempts to receive postgrey_client packets.
6508 </summary>
6509 @@ -49788,7 +50408,7 @@ Domain allowed access.
6510 </param>
6511 <infoflow type="none"/>
6512 </interface>
6513 -<interface name="corenet_sendrecv_postgrey_client_packets" lineno="64110">
6514 +<interface name="corenet_sendrecv_postgrey_client_packets" lineno="64531">
6515 <summary>
6516 Send and receive postgrey_client packets.
6517 </summary>
6518 @@ -49799,7 +50419,7 @@ Domain allowed access.
6519 </param>
6520 <infoflow type="both" weight="10"/>
6521 </interface>
6522 -<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="64126">
6523 +<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="64547">
6524 <summary>
6525 Do not audit attempts to send and receive postgrey_client packets.
6526 </summary>
6527 @@ -49810,7 +50430,7 @@ Domain to not audit.
6528 </param>
6529 <infoflow type="none"/>
6530 </interface>
6531 -<interface name="corenet_relabelto_postgrey_client_packets" lineno="64141">
6532 +<interface name="corenet_relabelto_postgrey_client_packets" lineno="64562">
6533 <summary>
6534 Relabel packets to postgrey_client the packet type.
6535 </summary>
6536 @@ -49820,7 +50440,7 @@ Domain allowed access.
6537 </summary>
6538 </param>
6539 </interface>
6540 -<interface name="corenet_send_postgrey_server_packets" lineno="64161">
6541 +<interface name="corenet_send_postgrey_server_packets" lineno="64582">
6542 <summary>
6543 Send postgrey_server packets.
6544 </summary>
6545 @@ -49831,7 +50451,7 @@ Domain allowed access.
6546 </param>
6547 <infoflow type="write" weight="10"/>
6548 </interface>
6549 -<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="64180">
6550 +<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="64601">
6551 <summary>
6552 Do not audit attempts to send postgrey_server packets.
6553 </summary>
6554 @@ -49842,7 +50462,7 @@ Domain to not audit.
6555 </param>
6556 <infoflow type="none"/>
6557 </interface>
6558 -<interface name="corenet_receive_postgrey_server_packets" lineno="64199">
6559 +<interface name="corenet_receive_postgrey_server_packets" lineno="64620">
6560 <summary>
6561 Receive postgrey_server packets.
6562 </summary>
6563 @@ -49853,7 +50473,7 @@ Domain allowed access.
6564 </param>
6565 <infoflow type="read" weight="10"/>
6566 </interface>
6567 -<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="64218">
6568 +<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="64639">
6569 <summary>
6570 Do not audit attempts to receive postgrey_server packets.
6571 </summary>
6572 @@ -49864,7 +50484,7 @@ Domain allowed access.
6573 </param>
6574 <infoflow type="none"/>
6575 </interface>
6576 -<interface name="corenet_sendrecv_postgrey_server_packets" lineno="64237">
6577 +<interface name="corenet_sendrecv_postgrey_server_packets" lineno="64658">
6578 <summary>
6579 Send and receive postgrey_server packets.
6580 </summary>
6581 @@ -49875,7 +50495,7 @@ Domain allowed access.
6582 </param>
6583 <infoflow type="both" weight="10"/>
6584 </interface>
6585 -<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="64253">
6586 +<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="64674">
6587 <summary>
6588 Do not audit attempts to send and receive postgrey_server packets.
6589 </summary>
6590 @@ -49886,7 +50506,7 @@ Domain to not audit.
6591 </param>
6592 <infoflow type="none"/>
6593 </interface>
6594 -<interface name="corenet_relabelto_postgrey_server_packets" lineno="64268">
6595 +<interface name="corenet_relabelto_postgrey_server_packets" lineno="64689">
6596 <summary>
6597 Relabel packets to postgrey_server the packet type.
6598 </summary>
6599 @@ -49896,7 +50516,7 @@ Domain allowed access.
6600 </summary>
6601 </param>
6602 </interface>
6603 -<interface name="corenet_tcp_sendrecv_pptp_port" lineno="64290">
6604 +<interface name="corenet_tcp_sendrecv_pptp_port" lineno="64711">
6605 <summary>
6606 Send and receive TCP traffic on the pptp port.
6607 </summary>
6608 @@ -49907,7 +50527,7 @@ Domain allowed access.
6609 </param>
6610 <infoflow type="both" weight="10"/>
6611 </interface>
6612 -<interface name="corenet_udp_send_pptp_port" lineno="64305">
6613 +<interface name="corenet_udp_send_pptp_port" lineno="64726">
6614 <summary>
6615 Send UDP traffic on the pptp port.
6616 </summary>
6617 @@ -49918,7 +50538,7 @@ Domain allowed access.
6618 </param>
6619 <infoflow type="write" weight="10"/>
6620 </interface>
6621 -<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="64320">
6622 +<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="64741">
6623 <summary>
6624 Do not audit attempts to send UDP traffic on the pptp port.
6625 </summary>
6626 @@ -49929,7 +50549,7 @@ Domain to not audit.
6627 </param>
6628 <infoflow type="none"/>
6629 </interface>
6630 -<interface name="corenet_udp_receive_pptp_port" lineno="64335">
6631 +<interface name="corenet_udp_receive_pptp_port" lineno="64756">
6632 <summary>
6633 Receive UDP traffic on the pptp port.
6634 </summary>
6635 @@ -49940,7 +50560,7 @@ Domain allowed access.
6636 </param>
6637 <infoflow type="read" weight="10"/>
6638 </interface>
6639 -<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="64350">
6640 +<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="64771">
6641 <summary>
6642 Do not audit attempts to receive UDP traffic on the pptp port.
6643 </summary>
6644 @@ -49951,7 +50571,7 @@ Domain to not audit.
6645 </param>
6646 <infoflow type="none"/>
6647 </interface>
6648 -<interface name="corenet_udp_sendrecv_pptp_port" lineno="64365">
6649 +<interface name="corenet_udp_sendrecv_pptp_port" lineno="64786">
6650 <summary>
6651 Send and receive UDP traffic on the pptp port.
6652 </summary>
6653 @@ -49962,7 +50582,7 @@ Domain allowed access.
6654 </param>
6655 <infoflow type="both" weight="10"/>
6656 </interface>
6657 -<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="64381">
6658 +<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="64802">
6659 <summary>
6660 Do not audit attempts to send and receive
6661 UDP traffic on the pptp port.
6662 @@ -49974,7 +50594,7 @@ Domain to not audit.
6663 </param>
6664 <infoflow type="none"/>
6665 </interface>
6666 -<interface name="corenet_tcp_bind_pptp_port" lineno="64396">
6667 +<interface name="corenet_tcp_bind_pptp_port" lineno="64817">
6668 <summary>
6669 Bind TCP sockets to the pptp port.
6670 </summary>
6671 @@ -49985,7 +50605,7 @@ Domain allowed access.
6672 </param>
6673 <infoflow type="none"/>
6674 </interface>
6675 -<interface name="corenet_udp_bind_pptp_port" lineno="64416">
6676 +<interface name="corenet_udp_bind_pptp_port" lineno="64837">
6677 <summary>
6678 Bind UDP sockets to the pptp port.
6679 </summary>
6680 @@ -49996,7 +50616,7 @@ Domain allowed access.
6681 </param>
6682 <infoflow type="none"/>
6683 </interface>
6684 -<interface name="corenet_tcp_connect_pptp_port" lineno="64435">
6685 +<interface name="corenet_tcp_connect_pptp_port" lineno="64856">
6686 <summary>
6687 Make a TCP connection to the pptp port.
6688 </summary>
6689 @@ -50006,7 +50626,7 @@ Domain allowed access.
6690 </summary>
6691 </param>
6692 </interface>
6693 -<interface name="corenet_send_pptp_client_packets" lineno="64455">
6694 +<interface name="corenet_send_pptp_client_packets" lineno="64876">
6695 <summary>
6696 Send pptp_client packets.
6697 </summary>
6698 @@ -50017,7 +50637,7 @@ Domain allowed access.
6699 </param>
6700 <infoflow type="write" weight="10"/>
6701 </interface>
6702 -<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="64474">
6703 +<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="64895">
6704 <summary>
6705 Do not audit attempts to send pptp_client packets.
6706 </summary>
6707 @@ -50028,7 +50648,7 @@ Domain to not audit.
6708 </param>
6709 <infoflow type="none"/>
6710 </interface>
6711 -<interface name="corenet_receive_pptp_client_packets" lineno="64493">
6712 +<interface name="corenet_receive_pptp_client_packets" lineno="64914">
6713 <summary>
6714 Receive pptp_client packets.
6715 </summary>
6716 @@ -50039,7 +50659,7 @@ Domain allowed access.
6717 </param>
6718 <infoflow type="read" weight="10"/>
6719 </interface>
6720 -<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="64512">
6721 +<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="64933">
6722 <summary>
6723 Do not audit attempts to receive pptp_client packets.
6724 </summary>
6725 @@ -50050,7 +50670,7 @@ Domain allowed access.
6726 </param>
6727 <infoflow type="none"/>
6728 </interface>
6729 -<interface name="corenet_sendrecv_pptp_client_packets" lineno="64531">
6730 +<interface name="corenet_sendrecv_pptp_client_packets" lineno="64952">
6731 <summary>
6732 Send and receive pptp_client packets.
6733 </summary>
6734 @@ -50061,7 +50681,7 @@ Domain allowed access.
6735 </param>
6736 <infoflow type="both" weight="10"/>
6737 </interface>
6738 -<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="64547">
6739 +<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="64968">
6740 <summary>
6741 Do not audit attempts to send and receive pptp_client packets.
6742 </summary>
6743 @@ -50072,7 +50692,7 @@ Domain to not audit.
6744 </param>
6745 <infoflow type="none"/>
6746 </interface>
6747 -<interface name="corenet_relabelto_pptp_client_packets" lineno="64562">
6748 +<interface name="corenet_relabelto_pptp_client_packets" lineno="64983">
6749 <summary>
6750 Relabel packets to pptp_client the packet type.
6751 </summary>
6752 @@ -50082,7 +50702,7 @@ Domain allowed access.
6753 </summary>
6754 </param>
6755 </interface>
6756 -<interface name="corenet_send_pptp_server_packets" lineno="64582">
6757 +<interface name="corenet_send_pptp_server_packets" lineno="65003">
6758 <summary>
6759 Send pptp_server packets.
6760 </summary>
6761 @@ -50093,7 +50713,7 @@ Domain allowed access.
6762 </param>
6763 <infoflow type="write" weight="10"/>
6764 </interface>
6765 -<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="64601">
6766 +<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="65022">
6767 <summary>
6768 Do not audit attempts to send pptp_server packets.
6769 </summary>
6770 @@ -50104,7 +50724,7 @@ Domain to not audit.
6771 </param>
6772 <infoflow type="none"/>
6773 </interface>
6774 -<interface name="corenet_receive_pptp_server_packets" lineno="64620">
6775 +<interface name="corenet_receive_pptp_server_packets" lineno="65041">
6776 <summary>
6777 Receive pptp_server packets.
6778 </summary>
6779 @@ -50115,7 +50735,7 @@ Domain allowed access.
6780 </param>
6781 <infoflow type="read" weight="10"/>
6782 </interface>
6783 -<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="64639">
6784 +<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="65060">
6785 <summary>
6786 Do not audit attempts to receive pptp_server packets.
6787 </summary>
6788 @@ -50126,7 +50746,7 @@ Domain allowed access.
6789 </param>
6790 <infoflow type="none"/>
6791 </interface>
6792 -<interface name="corenet_sendrecv_pptp_server_packets" lineno="64658">
6793 +<interface name="corenet_sendrecv_pptp_server_packets" lineno="65079">
6794 <summary>
6795 Send and receive pptp_server packets.
6796 </summary>
6797 @@ -50137,7 +50757,7 @@ Domain allowed access.
6798 </param>
6799 <infoflow type="both" weight="10"/>
6800 </interface>
6801 -<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="64674">
6802 +<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="65095">
6803 <summary>
6804 Do not audit attempts to send and receive pptp_server packets.
6805 </summary>
6806 @@ -50148,7 +50768,7 @@ Domain to not audit.
6807 </param>
6808 <infoflow type="none"/>
6809 </interface>
6810 -<interface name="corenet_relabelto_pptp_server_packets" lineno="64689">
6811 +<interface name="corenet_relabelto_pptp_server_packets" lineno="65110">
6812 <summary>
6813 Relabel packets to pptp_server the packet type.
6814 </summary>
6815 @@ -50158,7 +50778,7 @@ Domain allowed access.
6816 </summary>
6817 </param>
6818 </interface>
6819 -<interface name="corenet_tcp_sendrecv_prelude_port" lineno="64711">
6820 +<interface name="corenet_tcp_sendrecv_prelude_port" lineno="65132">
6821 <summary>
6822 Send and receive TCP traffic on the prelude port.
6823 </summary>
6824 @@ -50169,7 +50789,7 @@ Domain allowed access.
6825 </param>
6826 <infoflow type="both" weight="10"/>
6827 </interface>
6828 -<interface name="corenet_udp_send_prelude_port" lineno="64726">
6829 +<interface name="corenet_udp_send_prelude_port" lineno="65147">
6830 <summary>
6831 Send UDP traffic on the prelude port.
6832 </summary>
6833 @@ -50180,7 +50800,7 @@ Domain allowed access.
6834 </param>
6835 <infoflow type="write" weight="10"/>
6836 </interface>
6837 -<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="64741">
6838 +<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="65162">
6839 <summary>
6840 Do not audit attempts to send UDP traffic on the prelude port.
6841 </summary>
6842 @@ -50191,7 +50811,7 @@ Domain to not audit.
6843 </param>
6844 <infoflow type="none"/>
6845 </interface>
6846 -<interface name="corenet_udp_receive_prelude_port" lineno="64756">
6847 +<interface name="corenet_udp_receive_prelude_port" lineno="65177">
6848 <summary>
6849 Receive UDP traffic on the prelude port.
6850 </summary>
6851 @@ -50202,7 +50822,7 @@ Domain allowed access.
6852 </param>
6853 <infoflow type="read" weight="10"/>
6854 </interface>
6855 -<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="64771">
6856 +<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="65192">
6857 <summary>
6858 Do not audit attempts to receive UDP traffic on the prelude port.
6859 </summary>
6860 @@ -50213,7 +50833,7 @@ Domain to not audit.
6861 </param>
6862 <infoflow type="none"/>
6863 </interface>
6864 -<interface name="corenet_udp_sendrecv_prelude_port" lineno="64786">
6865 +<interface name="corenet_udp_sendrecv_prelude_port" lineno="65207">
6866 <summary>
6867 Send and receive UDP traffic on the prelude port.
6868 </summary>
6869 @@ -50224,7 +50844,7 @@ Domain allowed access.
6870 </param>
6871 <infoflow type="both" weight="10"/>
6872 </interface>
6873 -<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="64802">
6874 +<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="65223">
6875 <summary>
6876 Do not audit attempts to send and receive
6877 UDP traffic on the prelude port.
6878 @@ -50236,7 +50856,7 @@ Domain to not audit.
6879 </param>
6880 <infoflow type="none"/>
6881 </interface>
6882 -<interface name="corenet_tcp_bind_prelude_port" lineno="64817">
6883 +<interface name="corenet_tcp_bind_prelude_port" lineno="65238">
6884 <summary>
6885 Bind TCP sockets to the prelude port.
6886 </summary>
6887 @@ -50247,7 +50867,7 @@ Domain allowed access.
6888 </param>
6889 <infoflow type="none"/>
6890 </interface>
6891 -<interface name="corenet_udp_bind_prelude_port" lineno="64837">
6892 +<interface name="corenet_udp_bind_prelude_port" lineno="65258">
6893 <summary>
6894 Bind UDP sockets to the prelude port.
6895 </summary>
6896 @@ -50258,7 +50878,7 @@ Domain allowed access.
6897 </param>
6898 <infoflow type="none"/>
6899 </interface>
6900 -<interface name="corenet_tcp_connect_prelude_port" lineno="64856">
6901 +<interface name="corenet_tcp_connect_prelude_port" lineno="65277">
6902 <summary>
6903 Make a TCP connection to the prelude port.
6904 </summary>
6905 @@ -50268,7 +50888,7 @@ Domain allowed access.
6906 </summary>
6907 </param>
6908 </interface>
6909 -<interface name="corenet_send_prelude_client_packets" lineno="64876">
6910 +<interface name="corenet_send_prelude_client_packets" lineno="65297">
6911 <summary>
6912 Send prelude_client packets.
6913 </summary>
6914 @@ -50279,7 +50899,7 @@ Domain allowed access.
6915 </param>
6916 <infoflow type="write" weight="10"/>
6917 </interface>
6918 -<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="64895">
6919 +<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="65316">
6920 <summary>
6921 Do not audit attempts to send prelude_client packets.
6922 </summary>
6923 @@ -50290,7 +50910,7 @@ Domain to not audit.
6924 </param>
6925 <infoflow type="none"/>
6926 </interface>
6927 -<interface name="corenet_receive_prelude_client_packets" lineno="64914">
6928 +<interface name="corenet_receive_prelude_client_packets" lineno="65335">
6929 <summary>
6930 Receive prelude_client packets.
6931 </summary>
6932 @@ -50301,7 +50921,7 @@ Domain allowed access.
6933 </param>
6934 <infoflow type="read" weight="10"/>
6935 </interface>
6936 -<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="64933">
6937 +<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="65354">
6938 <summary>
6939 Do not audit attempts to receive prelude_client packets.
6940 </summary>
6941 @@ -50312,7 +50932,7 @@ Domain allowed access.
6942 </param>
6943 <infoflow type="none"/>
6944 </interface>
6945 -<interface name="corenet_sendrecv_prelude_client_packets" lineno="64952">
6946 +<interface name="corenet_sendrecv_prelude_client_packets" lineno="65373">
6947 <summary>
6948 Send and receive prelude_client packets.
6949 </summary>
6950 @@ -50323,7 +50943,7 @@ Domain allowed access.
6951 </param>
6952 <infoflow type="both" weight="10"/>
6953 </interface>
6954 -<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="64968">
6955 +<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="65389">
6956 <summary>
6957 Do not audit attempts to send and receive prelude_client packets.
6958 </summary>
6959 @@ -50334,7 +50954,7 @@ Domain to not audit.
6960 </param>
6961 <infoflow type="none"/>
6962 </interface>
6963 -<interface name="corenet_relabelto_prelude_client_packets" lineno="64983">
6964 +<interface name="corenet_relabelto_prelude_client_packets" lineno="65404">
6965 <summary>
6966 Relabel packets to prelude_client the packet type.
6967 </summary>
6968 @@ -50344,7 +50964,7 @@ Domain allowed access.
6969 </summary>
6970 </param>
6971 </interface>
6972 -<interface name="corenet_send_prelude_server_packets" lineno="65003">
6973 +<interface name="corenet_send_prelude_server_packets" lineno="65424">
6974 <summary>
6975 Send prelude_server packets.
6976 </summary>
6977 @@ -50355,7 +50975,7 @@ Domain allowed access.
6978 </param>
6979 <infoflow type="write" weight="10"/>
6980 </interface>
6981 -<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="65022">
6982 +<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="65443">
6983 <summary>
6984 Do not audit attempts to send prelude_server packets.
6985 </summary>
6986 @@ -50366,7 +50986,7 @@ Domain to not audit.
6987 </param>
6988 <infoflow type="none"/>
6989 </interface>
6990 -<interface name="corenet_receive_prelude_server_packets" lineno="65041">
6991 +<interface name="corenet_receive_prelude_server_packets" lineno="65462">
6992 <summary>
6993 Receive prelude_server packets.
6994 </summary>
6995 @@ -50377,7 +50997,7 @@ Domain allowed access.
6996 </param>
6997 <infoflow type="read" weight="10"/>
6998 </interface>
6999 -<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="65060">
7000 +<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="65481">
7001 <summary>
7002 Do not audit attempts to receive prelude_server packets.
7003 </summary>
7004 @@ -50388,7 +51008,7 @@ Domain allowed access.
7005 </param>
7006 <infoflow type="none"/>
7007 </interface>
7008 -<interface name="corenet_sendrecv_prelude_server_packets" lineno="65079">
7009 +<interface name="corenet_sendrecv_prelude_server_packets" lineno="65500">
7010 <summary>
7011 Send and receive prelude_server packets.
7012 </summary>
7013 @@ -50399,7 +51019,7 @@ Domain allowed access.
7014 </param>
7015 <infoflow type="both" weight="10"/>
7016 </interface>
7017 -<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="65095">
7018 +<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="65516">
7019 <summary>
7020 Do not audit attempts to send and receive prelude_server packets.
7021 </summary>
7022 @@ -50410,7 +51030,7 @@ Domain to not audit.
7023 </param>
7024 <infoflow type="none"/>
7025 </interface>
7026 -<interface name="corenet_relabelto_prelude_server_packets" lineno="65110">
7027 +<interface name="corenet_relabelto_prelude_server_packets" lineno="65531">
7028 <summary>
7029 Relabel packets to prelude_server the packet type.
7030 </summary>
7031 @@ -50420,7 +51040,7 @@ Domain allowed access.
7032 </summary>
7033 </param>
7034 </interface>
7035 -<interface name="corenet_tcp_sendrecv_presence_port" lineno="65132">
7036 +<interface name="corenet_tcp_sendrecv_presence_port" lineno="65553">
7037 <summary>
7038 Send and receive TCP traffic on the presence port.
7039 </summary>
7040 @@ -50431,7 +51051,7 @@ Domain allowed access.
7041 </param>
7042 <infoflow type="both" weight="10"/>
7043 </interface>
7044 -<interface name="corenet_udp_send_presence_port" lineno="65147">
7045 +<interface name="corenet_udp_send_presence_port" lineno="65568">
7046 <summary>
7047 Send UDP traffic on the presence port.
7048 </summary>
7049 @@ -50442,7 +51062,7 @@ Domain allowed access.
7050 </param>
7051 <infoflow type="write" weight="10"/>
7052 </interface>
7053 -<interface name="corenet_dontaudit_udp_send_presence_port" lineno="65162">
7054 +<interface name="corenet_dontaudit_udp_send_presence_port" lineno="65583">
7055 <summary>
7056 Do not audit attempts to send UDP traffic on the presence port.
7057 </summary>
7058 @@ -50453,7 +51073,7 @@ Domain to not audit.
7059 </param>
7060 <infoflow type="none"/>
7061 </interface>
7062 -<interface name="corenet_udp_receive_presence_port" lineno="65177">
7063 +<interface name="corenet_udp_receive_presence_port" lineno="65598">
7064 <summary>
7065 Receive UDP traffic on the presence port.
7066 </summary>
7067 @@ -50464,7 +51084,7 @@ Domain allowed access.
7068 </param>
7069 <infoflow type="read" weight="10"/>
7070 </interface>
7071 -<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="65192">
7072 +<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="65613">
7073 <summary>
7074 Do not audit attempts to receive UDP traffic on the presence port.
7075 </summary>
7076 @@ -50475,7 +51095,7 @@ Domain to not audit.
7077 </param>
7078 <infoflow type="none"/>
7079 </interface>
7080 -<interface name="corenet_udp_sendrecv_presence_port" lineno="65207">
7081 +<interface name="corenet_udp_sendrecv_presence_port" lineno="65628">
7082 <summary>
7083 Send and receive UDP traffic on the presence port.
7084 </summary>
7085 @@ -50486,7 +51106,7 @@ Domain allowed access.
7086 </param>
7087 <infoflow type="both" weight="10"/>
7088 </interface>
7089 -<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="65223">
7090 +<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="65644">
7091 <summary>
7092 Do not audit attempts to send and receive
7093 UDP traffic on the presence port.
7094 @@ -50498,7 +51118,7 @@ Domain to not audit.
7095 </param>
7096 <infoflow type="none"/>
7097 </interface>
7098 -<interface name="corenet_tcp_bind_presence_port" lineno="65238">
7099 +<interface name="corenet_tcp_bind_presence_port" lineno="65659">
7100 <summary>
7101 Bind TCP sockets to the presence port.
7102 </summary>
7103 @@ -50509,7 +51129,7 @@ Domain allowed access.
7104 </param>
7105 <infoflow type="none"/>
7106 </interface>
7107 -<interface name="corenet_udp_bind_presence_port" lineno="65258">
7108 +<interface name="corenet_udp_bind_presence_port" lineno="65679">
7109 <summary>
7110 Bind UDP sockets to the presence port.
7111 </summary>
7112 @@ -50520,7 +51140,7 @@ Domain allowed access.
7113 </param>
7114 <infoflow type="none"/>
7115 </interface>
7116 -<interface name="corenet_tcp_connect_presence_port" lineno="65277">
7117 +<interface name="corenet_tcp_connect_presence_port" lineno="65698">
7118 <summary>
7119 Make a TCP connection to the presence port.
7120 </summary>
7121 @@ -50530,7 +51150,7 @@ Domain allowed access.
7122 </summary>
7123 </param>
7124 </interface>
7125 -<interface name="corenet_send_presence_client_packets" lineno="65297">
7126 +<interface name="corenet_send_presence_client_packets" lineno="65718">
7127 <summary>
7128 Send presence_client packets.
7129 </summary>
7130 @@ -50541,7 +51161,7 @@ Domain allowed access.
7131 </param>
7132 <infoflow type="write" weight="10"/>
7133 </interface>
7134 -<interface name="corenet_dontaudit_send_presence_client_packets" lineno="65316">
7135 +<interface name="corenet_dontaudit_send_presence_client_packets" lineno="65737">
7136 <summary>
7137 Do not audit attempts to send presence_client packets.
7138 </summary>
7139 @@ -50552,7 +51172,7 @@ Domain to not audit.
7140 </param>
7141 <infoflow type="none"/>
7142 </interface>
7143 -<interface name="corenet_receive_presence_client_packets" lineno="65335">
7144 +<interface name="corenet_receive_presence_client_packets" lineno="65756">
7145 <summary>
7146 Receive presence_client packets.
7147 </summary>
7148 @@ -50563,7 +51183,7 @@ Domain allowed access.
7149 </param>
7150 <infoflow type="read" weight="10"/>
7151 </interface>
7152 -<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="65354">
7153 +<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="65775">
7154 <summary>
7155 Do not audit attempts to receive presence_client packets.
7156 </summary>
7157 @@ -50574,7 +51194,7 @@ Domain allowed access.
7158 </param>
7159 <infoflow type="none"/>
7160 </interface>
7161 -<interface name="corenet_sendrecv_presence_client_packets" lineno="65373">
7162 +<interface name="corenet_sendrecv_presence_client_packets" lineno="65794">
7163 <summary>
7164 Send and receive presence_client packets.
7165 </summary>
7166 @@ -50585,7 +51205,7 @@ Domain allowed access.
7167 </param>
7168 <infoflow type="both" weight="10"/>
7169 </interface>
7170 -<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="65389">
7171 +<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="65810">
7172 <summary>
7173 Do not audit attempts to send and receive presence_client packets.
7174 </summary>
7175 @@ -50596,7 +51216,7 @@ Domain to not audit.
7176 </param>
7177 <infoflow type="none"/>
7178 </interface>
7179 -<interface name="corenet_relabelto_presence_client_packets" lineno="65404">
7180 +<interface name="corenet_relabelto_presence_client_packets" lineno="65825">
7181 <summary>
7182 Relabel packets to presence_client the packet type.
7183 </summary>
7184 @@ -50606,7 +51226,7 @@ Domain allowed access.
7185 </summary>
7186 </param>
7187 </interface>
7188 -<interface name="corenet_send_presence_server_packets" lineno="65424">
7189 +<interface name="corenet_send_presence_server_packets" lineno="65845">
7190 <summary>
7191 Send presence_server packets.
7192 </summary>
7193 @@ -50617,7 +51237,7 @@ Domain allowed access.
7194 </param>
7195 <infoflow type="write" weight="10"/>
7196 </interface>
7197 -<interface name="corenet_dontaudit_send_presence_server_packets" lineno="65443">
7198 +<interface name="corenet_dontaudit_send_presence_server_packets" lineno="65864">
7199 <summary>
7200 Do not audit attempts to send presence_server packets.
7201 </summary>
7202 @@ -50628,7 +51248,7 @@ Domain to not audit.
7203 </param>
7204 <infoflow type="none"/>
7205 </interface>
7206 -<interface name="corenet_receive_presence_server_packets" lineno="65462">
7207 +<interface name="corenet_receive_presence_server_packets" lineno="65883">
7208 <summary>
7209 Receive presence_server packets.
7210 </summary>
7211 @@ -50639,7 +51259,7 @@ Domain allowed access.
7212 </param>
7213 <infoflow type="read" weight="10"/>
7214 </interface>
7215 -<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="65481">
7216 +<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="65902">
7217 <summary>
7218 Do not audit attempts to receive presence_server packets.
7219 </summary>
7220 @@ -50650,7 +51270,7 @@ Domain allowed access.
7221 </param>
7222 <infoflow type="none"/>
7223 </interface>
7224 -<interface name="corenet_sendrecv_presence_server_packets" lineno="65500">
7225 +<interface name="corenet_sendrecv_presence_server_packets" lineno="65921">
7226 <summary>
7227 Send and receive presence_server packets.
7228 </summary>
7229 @@ -50661,7 +51281,7 @@ Domain allowed access.
7230 </param>
7231 <infoflow type="both" weight="10"/>
7232 </interface>
7233 -<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="65516">
7234 +<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="65937">
7235 <summary>
7236 Do not audit attempts to send and receive presence_server packets.
7237 </summary>
7238 @@ -50672,7 +51292,7 @@ Domain to not audit.
7239 </param>
7240 <infoflow type="none"/>
7241 </interface>
7242 -<interface name="corenet_relabelto_presence_server_packets" lineno="65531">
7243 +<interface name="corenet_relabelto_presence_server_packets" lineno="65952">
7244 <summary>
7245 Relabel packets to presence_server the packet type.
7246 </summary>
7247 @@ -50682,7 +51302,7 @@ Domain allowed access.
7248 </summary>
7249 </param>
7250 </interface>
7251 -<interface name="corenet_tcp_sendrecv_printer_port" lineno="65553">
7252 +<interface name="corenet_tcp_sendrecv_printer_port" lineno="65974">
7253 <summary>
7254 Send and receive TCP traffic on the printer port.
7255 </summary>
7256 @@ -50693,7 +51313,7 @@ Domain allowed access.
7257 </param>
7258 <infoflow type="both" weight="10"/>
7259 </interface>
7260 -<interface name="corenet_udp_send_printer_port" lineno="65568">
7261 +<interface name="corenet_udp_send_printer_port" lineno="65989">
7262 <summary>
7263 Send UDP traffic on the printer port.
7264 </summary>
7265 @@ -50704,7 +51324,7 @@ Domain allowed access.
7266 </param>
7267 <infoflow type="write" weight="10"/>
7268 </interface>
7269 -<interface name="corenet_dontaudit_udp_send_printer_port" lineno="65583">
7270 +<interface name="corenet_dontaudit_udp_send_printer_port" lineno="66004">
7271 <summary>
7272 Do not audit attempts to send UDP traffic on the printer port.
7273 </summary>
7274 @@ -50715,7 +51335,7 @@ Domain to not audit.
7275 </param>
7276 <infoflow type="none"/>
7277 </interface>
7278 -<interface name="corenet_udp_receive_printer_port" lineno="65598">
7279 +<interface name="corenet_udp_receive_printer_port" lineno="66019">
7280 <summary>
7281 Receive UDP traffic on the printer port.
7282 </summary>
7283 @@ -50726,7 +51346,7 @@ Domain allowed access.
7284 </param>
7285 <infoflow type="read" weight="10"/>
7286 </interface>
7287 -<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="65613">
7288 +<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="66034">
7289 <summary>
7290 Do not audit attempts to receive UDP traffic on the printer port.
7291 </summary>
7292 @@ -50737,7 +51357,7 @@ Domain to not audit.
7293 </param>
7294 <infoflow type="none"/>
7295 </interface>
7296 -<interface name="corenet_udp_sendrecv_printer_port" lineno="65628">
7297 +<interface name="corenet_udp_sendrecv_printer_port" lineno="66049">
7298 <summary>
7299 Send and receive UDP traffic on the printer port.
7300 </summary>
7301 @@ -50748,7 +51368,7 @@ Domain allowed access.
7302 </param>
7303 <infoflow type="both" weight="10"/>
7304 </interface>
7305 -<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="65644">
7306 +<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="66065">
7307 <summary>
7308 Do not audit attempts to send and receive
7309 UDP traffic on the printer port.
7310 @@ -50760,7 +51380,7 @@ Domain to not audit.
7311 </param>
7312 <infoflow type="none"/>
7313 </interface>
7314 -<interface name="corenet_tcp_bind_printer_port" lineno="65659">
7315 +<interface name="corenet_tcp_bind_printer_port" lineno="66080">
7316 <summary>
7317 Bind TCP sockets to the printer port.
7318 </summary>
7319 @@ -50771,7 +51391,7 @@ Domain allowed access.
7320 </param>
7321 <infoflow type="none"/>
7322 </interface>
7323 -<interface name="corenet_udp_bind_printer_port" lineno="65679">
7324 +<interface name="corenet_udp_bind_printer_port" lineno="66100">
7325 <summary>
7326 Bind UDP sockets to the printer port.
7327 </summary>
7328 @@ -50782,7 +51402,7 @@ Domain allowed access.
7329 </param>
7330 <infoflow type="none"/>
7331 </interface>
7332 -<interface name="corenet_tcp_connect_printer_port" lineno="65698">
7333 +<interface name="corenet_tcp_connect_printer_port" lineno="66119">
7334 <summary>
7335 Make a TCP connection to the printer port.
7336 </summary>
7337 @@ -50792,7 +51412,7 @@ Domain allowed access.
7338 </summary>
7339 </param>
7340 </interface>
7341 -<interface name="corenet_send_printer_client_packets" lineno="65718">
7342 +<interface name="corenet_send_printer_client_packets" lineno="66139">
7343 <summary>
7344 Send printer_client packets.
7345 </summary>
7346 @@ -50803,7 +51423,7 @@ Domain allowed access.
7347 </param>
7348 <infoflow type="write" weight="10"/>
7349 </interface>
7350 -<interface name="corenet_dontaudit_send_printer_client_packets" lineno="65737">
7351 +<interface name="corenet_dontaudit_send_printer_client_packets" lineno="66158">
7352 <summary>
7353 Do not audit attempts to send printer_client packets.
7354 </summary>
7355 @@ -50814,7 +51434,7 @@ Domain to not audit.
7356 </param>
7357 <infoflow type="none"/>
7358 </interface>
7359 -<interface name="corenet_receive_printer_client_packets" lineno="65756">
7360 +<interface name="corenet_receive_printer_client_packets" lineno="66177">
7361 <summary>
7362 Receive printer_client packets.
7363 </summary>
7364 @@ -50825,7 +51445,7 @@ Domain allowed access.
7365 </param>
7366 <infoflow type="read" weight="10"/>
7367 </interface>
7368 -<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="65775">
7369 +<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="66196">
7370 <summary>
7371 Do not audit attempts to receive printer_client packets.
7372 </summary>
7373 @@ -50836,7 +51456,7 @@ Domain allowed access.
7374 </param>
7375 <infoflow type="none"/>
7376 </interface>
7377 -<interface name="corenet_sendrecv_printer_client_packets" lineno="65794">
7378 +<interface name="corenet_sendrecv_printer_client_packets" lineno="66215">
7379 <summary>
7380 Send and receive printer_client packets.
7381 </summary>
7382 @@ -50847,7 +51467,7 @@ Domain allowed access.
7383 </param>
7384 <infoflow type="both" weight="10"/>
7385 </interface>
7386 -<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="65810">
7387 +<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="66231">
7388 <summary>
7389 Do not audit attempts to send and receive printer_client packets.
7390 </summary>
7391 @@ -50858,7 +51478,7 @@ Domain to not audit.
7392 </param>
7393 <infoflow type="none"/>
7394 </interface>
7395 -<interface name="corenet_relabelto_printer_client_packets" lineno="65825">
7396 +<interface name="corenet_relabelto_printer_client_packets" lineno="66246">
7397 <summary>
7398 Relabel packets to printer_client the packet type.
7399 </summary>
7400 @@ -50868,7 +51488,7 @@ Domain allowed access.
7401 </summary>
7402 </param>
7403 </interface>
7404 -<interface name="corenet_send_printer_server_packets" lineno="65845">
7405 +<interface name="corenet_send_printer_server_packets" lineno="66266">
7406 <summary>
7407 Send printer_server packets.
7408 </summary>
7409 @@ -50879,7 +51499,7 @@ Domain allowed access.
7410 </param>
7411 <infoflow type="write" weight="10"/>
7412 </interface>
7413 -<interface name="corenet_dontaudit_send_printer_server_packets" lineno="65864">
7414 +<interface name="corenet_dontaudit_send_printer_server_packets" lineno="66285">
7415 <summary>
7416 Do not audit attempts to send printer_server packets.
7417 </summary>
7418 @@ -50890,7 +51510,7 @@ Domain to not audit.
7419 </param>
7420 <infoflow type="none"/>
7421 </interface>
7422 -<interface name="corenet_receive_printer_server_packets" lineno="65883">
7423 +<interface name="corenet_receive_printer_server_packets" lineno="66304">
7424 <summary>
7425 Receive printer_server packets.
7426 </summary>
7427 @@ -50901,7 +51521,7 @@ Domain allowed access.
7428 </param>
7429 <infoflow type="read" weight="10"/>
7430 </interface>
7431 -<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="65902">
7432 +<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="66323">
7433 <summary>
7434 Do not audit attempts to receive printer_server packets.
7435 </summary>
7436 @@ -50912,7 +51532,7 @@ Domain allowed access.
7437 </param>
7438 <infoflow type="none"/>
7439 </interface>
7440 -<interface name="corenet_sendrecv_printer_server_packets" lineno="65921">
7441 +<interface name="corenet_sendrecv_printer_server_packets" lineno="66342">
7442 <summary>
7443 Send and receive printer_server packets.
7444 </summary>
7445 @@ -50923,7 +51543,7 @@ Domain allowed access.
7446 </param>
7447 <infoflow type="both" weight="10"/>
7448 </interface>
7449 -<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="65937">
7450 +<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="66358">
7451 <summary>
7452 Do not audit attempts to send and receive printer_server packets.
7453 </summary>
7454 @@ -50934,7 +51554,7 @@ Domain to not audit.
7455 </param>
7456 <infoflow type="none"/>
7457 </interface>
7458 -<interface name="corenet_relabelto_printer_server_packets" lineno="65952">
7459 +<interface name="corenet_relabelto_printer_server_packets" lineno="66373">
7460 <summary>
7461 Relabel packets to printer_server the packet type.
7462 </summary>
7463 @@ -50944,7 +51564,7 @@ Domain allowed access.
7464 </summary>
7465 </param>
7466 </interface>
7467 -<interface name="corenet_tcp_sendrecv_ptal_port" lineno="65974">
7468 +<interface name="corenet_tcp_sendrecv_ptal_port" lineno="66395">
7469 <summary>
7470 Send and receive TCP traffic on the ptal port.
7471 </summary>
7472 @@ -50955,7 +51575,7 @@ Domain allowed access.
7473 </param>
7474 <infoflow type="both" weight="10"/>
7475 </interface>
7476 -<interface name="corenet_udp_send_ptal_port" lineno="65989">
7477 +<interface name="corenet_udp_send_ptal_port" lineno="66410">
7478 <summary>
7479 Send UDP traffic on the ptal port.
7480 </summary>
7481 @@ -50966,7 +51586,7 @@ Domain allowed access.
7482 </param>
7483 <infoflow type="write" weight="10"/>
7484 </interface>
7485 -<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="66004">
7486 +<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="66425">
7487 <summary>
7488 Do not audit attempts to send UDP traffic on the ptal port.
7489 </summary>
7490 @@ -50977,7 +51597,7 @@ Domain to not audit.
7491 </param>
7492 <infoflow type="none"/>
7493 </interface>
7494 -<interface name="corenet_udp_receive_ptal_port" lineno="66019">
7495 +<interface name="corenet_udp_receive_ptal_port" lineno="66440">
7496 <summary>
7497 Receive UDP traffic on the ptal port.
7498 </summary>
7499 @@ -50988,7 +51608,7 @@ Domain allowed access.
7500 </param>
7501 <infoflow type="read" weight="10"/>
7502 </interface>
7503 -<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="66034">
7504 +<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="66455">
7505 <summary>
7506 Do not audit attempts to receive UDP traffic on the ptal port.
7507 </summary>
7508 @@ -50999,7 +51619,7 @@ Domain to not audit.
7509 </param>
7510 <infoflow type="none"/>
7511 </interface>
7512 -<interface name="corenet_udp_sendrecv_ptal_port" lineno="66049">
7513 +<interface name="corenet_udp_sendrecv_ptal_port" lineno="66470">
7514 <summary>
7515 Send and receive UDP traffic on the ptal port.
7516 </summary>
7517 @@ -51010,7 +51630,7 @@ Domain allowed access.
7518 </param>
7519 <infoflow type="both" weight="10"/>
7520 </interface>
7521 -<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="66065">
7522 +<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="66486">
7523 <summary>
7524 Do not audit attempts to send and receive
7525 UDP traffic on the ptal port.
7526 @@ -51022,7 +51642,7 @@ Domain to not audit.
7527 </param>
7528 <infoflow type="none"/>
7529 </interface>
7530 -<interface name="corenet_tcp_bind_ptal_port" lineno="66080">
7531 +<interface name="corenet_tcp_bind_ptal_port" lineno="66501">
7532 <summary>
7533 Bind TCP sockets to the ptal port.
7534 </summary>
7535 @@ -51033,7 +51653,7 @@ Domain allowed access.
7536 </param>
7537 <infoflow type="none"/>
7538 </interface>
7539 -<interface name="corenet_udp_bind_ptal_port" lineno="66100">
7540 +<interface name="corenet_udp_bind_ptal_port" lineno="66521">
7541 <summary>
7542 Bind UDP sockets to the ptal port.
7543 </summary>
7544 @@ -51044,7 +51664,7 @@ Domain allowed access.
7545 </param>
7546 <infoflow type="none"/>
7547 </interface>
7548 -<interface name="corenet_tcp_connect_ptal_port" lineno="66119">
7549 +<interface name="corenet_tcp_connect_ptal_port" lineno="66540">
7550 <summary>
7551 Make a TCP connection to the ptal port.
7552 </summary>
7553 @@ -51054,7 +51674,7 @@ Domain allowed access.
7554 </summary>
7555 </param>
7556 </interface>
7557 -<interface name="corenet_send_ptal_client_packets" lineno="66139">
7558 +<interface name="corenet_send_ptal_client_packets" lineno="66560">
7559 <summary>
7560 Send ptal_client packets.
7561 </summary>
7562 @@ -51065,7 +51685,7 @@ Domain allowed access.
7563 </param>
7564 <infoflow type="write" weight="10"/>
7565 </interface>
7566 -<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="66158">
7567 +<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="66579">
7568 <summary>
7569 Do not audit attempts to send ptal_client packets.
7570 </summary>
7571 @@ -51076,7 +51696,7 @@ Domain to not audit.
7572 </param>
7573 <infoflow type="none"/>
7574 </interface>
7575 -<interface name="corenet_receive_ptal_client_packets" lineno="66177">
7576 +<interface name="corenet_receive_ptal_client_packets" lineno="66598">
7577 <summary>
7578 Receive ptal_client packets.
7579 </summary>
7580 @@ -51087,7 +51707,7 @@ Domain allowed access.
7581 </param>
7582 <infoflow type="read" weight="10"/>
7583 </interface>
7584 -<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="66196">
7585 +<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="66617">
7586 <summary>
7587 Do not audit attempts to receive ptal_client packets.
7588 </summary>
7589 @@ -51098,7 +51718,7 @@ Domain allowed access.
7590 </param>
7591 <infoflow type="none"/>
7592 </interface>
7593 -<interface name="corenet_sendrecv_ptal_client_packets" lineno="66215">
7594 +<interface name="corenet_sendrecv_ptal_client_packets" lineno="66636">
7595 <summary>
7596 Send and receive ptal_client packets.
7597 </summary>
7598 @@ -51109,7 +51729,7 @@ Domain allowed access.
7599 </param>
7600 <infoflow type="both" weight="10"/>
7601 </interface>
7602 -<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="66231">
7603 +<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="66652">
7604 <summary>
7605 Do not audit attempts to send and receive ptal_client packets.
7606 </summary>
7607 @@ -51120,7 +51740,7 @@ Domain to not audit.
7608 </param>
7609 <infoflow type="none"/>
7610 </interface>
7611 -<interface name="corenet_relabelto_ptal_client_packets" lineno="66246">
7612 +<interface name="corenet_relabelto_ptal_client_packets" lineno="66667">
7613 <summary>
7614 Relabel packets to ptal_client the packet type.
7615 </summary>
7616 @@ -51130,7 +51750,7 @@ Domain allowed access.
7617 </summary>
7618 </param>
7619 </interface>
7620 -<interface name="corenet_send_ptal_server_packets" lineno="66266">
7621 +<interface name="corenet_send_ptal_server_packets" lineno="66687">
7622 <summary>
7623 Send ptal_server packets.
7624 </summary>
7625 @@ -51141,7 +51761,7 @@ Domain allowed access.
7626 </param>
7627 <infoflow type="write" weight="10"/>
7628 </interface>
7629 -<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="66285">
7630 +<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="66706">
7631 <summary>
7632 Do not audit attempts to send ptal_server packets.
7633 </summary>
7634 @@ -51152,7 +51772,7 @@ Domain to not audit.
7635 </param>
7636 <infoflow type="none"/>
7637 </interface>
7638 -<interface name="corenet_receive_ptal_server_packets" lineno="66304">
7639 +<interface name="corenet_receive_ptal_server_packets" lineno="66725">
7640 <summary>
7641 Receive ptal_server packets.
7642 </summary>
7643 @@ -51163,7 +51783,7 @@ Domain allowed access.
7644 </param>
7645 <infoflow type="read" weight="10"/>
7646 </interface>
7647 -<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="66323">
7648 +<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="66744">
7649 <summary>
7650 Do not audit attempts to receive ptal_server packets.
7651 </summary>
7652 @@ -51174,7 +51794,7 @@ Domain allowed access.
7653 </param>
7654 <infoflow type="none"/>
7655 </interface>
7656 -<interface name="corenet_sendrecv_ptal_server_packets" lineno="66342">
7657 +<interface name="corenet_sendrecv_ptal_server_packets" lineno="66763">
7658 <summary>
7659 Send and receive ptal_server packets.
7660 </summary>
7661 @@ -51185,7 +51805,7 @@ Domain allowed access.
7662 </param>
7663 <infoflow type="both" weight="10"/>
7664 </interface>
7665 -<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="66358">
7666 +<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="66779">
7667 <summary>
7668 Do not audit attempts to send and receive ptal_server packets.
7669 </summary>
7670 @@ -51196,7 +51816,7 @@ Domain to not audit.
7671 </param>
7672 <infoflow type="none"/>
7673 </interface>
7674 -<interface name="corenet_relabelto_ptal_server_packets" lineno="66373">
7675 +<interface name="corenet_relabelto_ptal_server_packets" lineno="66794">
7676 <summary>
7677 Relabel packets to ptal_server the packet type.
7678 </summary>
7679 @@ -51206,7 +51826,7 @@ Domain allowed access.
7680 </summary>
7681 </param>
7682 </interface>
7683 -<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="66395">
7684 +<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="66816">
7685 <summary>
7686 Send and receive TCP traffic on the pulseaudio port.
7687 </summary>
7688 @@ -51217,7 +51837,7 @@ Domain allowed access.
7689 </param>
7690 <infoflow type="both" weight="10"/>
7691 </interface>
7692 -<interface name="corenet_udp_send_pulseaudio_port" lineno="66410">
7693 +<interface name="corenet_udp_send_pulseaudio_port" lineno="66831">
7694 <summary>
7695 Send UDP traffic on the pulseaudio port.
7696 </summary>
7697 @@ -51228,7 +51848,7 @@ Domain allowed access.
7698 </param>
7699 <infoflow type="write" weight="10"/>
7700 </interface>
7701 -<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="66425">
7702 +<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="66846">
7703 <summary>
7704 Do not audit attempts to send UDP traffic on the pulseaudio port.
7705 </summary>
7706 @@ -51239,7 +51859,7 @@ Domain to not audit.
7707 </param>
7708 <infoflow type="none"/>
7709 </interface>
7710 -<interface name="corenet_udp_receive_pulseaudio_port" lineno="66440">
7711 +<interface name="corenet_udp_receive_pulseaudio_port" lineno="66861">
7712 <summary>
7713 Receive UDP traffic on the pulseaudio port.
7714 </summary>
7715 @@ -51250,7 +51870,7 @@ Domain allowed access.
7716 </param>
7717 <infoflow type="read" weight="10"/>
7718 </interface>
7719 -<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="66455">
7720 +<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="66876">
7721 <summary>
7722 Do not audit attempts to receive UDP traffic on the pulseaudio port.
7723 </summary>
7724 @@ -51261,7 +51881,7 @@ Domain to not audit.
7725 </param>
7726 <infoflow type="none"/>
7727 </interface>
7728 -<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="66470">
7729 +<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="66891">
7730 <summary>
7731 Send and receive UDP traffic on the pulseaudio port.
7732 </summary>
7733 @@ -51272,7 +51892,7 @@ Domain allowed access.
7734 </param>
7735 <infoflow type="both" weight="10"/>
7736 </interface>
7737 -<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="66486">
7738 +<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="66907">
7739 <summary>
7740 Do not audit attempts to send and receive
7741 UDP traffic on the pulseaudio port.
7742 @@ -51284,7 +51904,7 @@ Domain to not audit.
7743 </param>
7744 <infoflow type="none"/>
7745 </interface>
7746 -<interface name="corenet_tcp_bind_pulseaudio_port" lineno="66501">
7747 +<interface name="corenet_tcp_bind_pulseaudio_port" lineno="66922">
7748 <summary>
7749 Bind TCP sockets to the pulseaudio port.
7750 </summary>
7751 @@ -51295,7 +51915,7 @@ Domain allowed access.
7752 </param>
7753 <infoflow type="none"/>
7754 </interface>
7755 -<interface name="corenet_udp_bind_pulseaudio_port" lineno="66521">
7756 +<interface name="corenet_udp_bind_pulseaudio_port" lineno="66942">
7757 <summary>
7758 Bind UDP sockets to the pulseaudio port.
7759 </summary>
7760 @@ -51306,7 +51926,7 @@ Domain allowed access.
7761 </param>
7762 <infoflow type="none"/>
7763 </interface>
7764 -<interface name="corenet_tcp_connect_pulseaudio_port" lineno="66540">
7765 +<interface name="corenet_tcp_connect_pulseaudio_port" lineno="66961">
7766 <summary>
7767 Make a TCP connection to the pulseaudio port.
7768 </summary>
7769 @@ -51316,7 +51936,7 @@ Domain allowed access.
7770 </summary>
7771 </param>
7772 </interface>
7773 -<interface name="corenet_send_pulseaudio_client_packets" lineno="66560">
7774 +<interface name="corenet_send_pulseaudio_client_packets" lineno="66981">
7775 <summary>
7776 Send pulseaudio_client packets.
7777 </summary>
7778 @@ -51327,7 +51947,7 @@ Domain allowed access.
7779 </param>
7780 <infoflow type="write" weight="10"/>
7781 </interface>
7782 -<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="66579">
7783 +<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="67000">
7784 <summary>
7785 Do not audit attempts to send pulseaudio_client packets.
7786 </summary>
7787 @@ -51338,7 +51958,7 @@ Domain to not audit.
7788 </param>
7789 <infoflow type="none"/>
7790 </interface>
7791 -<interface name="corenet_receive_pulseaudio_client_packets" lineno="66598">
7792 +<interface name="corenet_receive_pulseaudio_client_packets" lineno="67019">
7793 <summary>
7794 Receive pulseaudio_client packets.
7795 </summary>
7796 @@ -51349,7 +51969,7 @@ Domain allowed access.
7797 </param>
7798 <infoflow type="read" weight="10"/>
7799 </interface>
7800 -<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="66617">
7801 +<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="67038">
7802 <summary>
7803 Do not audit attempts to receive pulseaudio_client packets.
7804 </summary>
7805 @@ -51360,7 +51980,7 @@ Domain allowed access.
7806 </param>
7807 <infoflow type="none"/>
7808 </interface>
7809 -<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="66636">
7810 +<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="67057">
7811 <summary>
7812 Send and receive pulseaudio_client packets.
7813 </summary>
7814 @@ -51371,7 +51991,7 @@ Domain allowed access.
7815 </param>
7816 <infoflow type="both" weight="10"/>
7817 </interface>
7818 -<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="66652">
7819 +<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="67073">
7820 <summary>
7821 Do not audit attempts to send and receive pulseaudio_client packets.
7822 </summary>
7823 @@ -51382,7 +52002,7 @@ Domain to not audit.
7824 </param>
7825 <infoflow type="none"/>
7826 </interface>
7827 -<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="66667">
7828 +<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="67088">
7829 <summary>
7830 Relabel packets to pulseaudio_client the packet type.
7831 </summary>
7832 @@ -51392,7 +52012,7 @@ Domain allowed access.
7833 </summary>
7834 </param>
7835 </interface>
7836 -<interface name="corenet_send_pulseaudio_server_packets" lineno="66687">
7837 +<interface name="corenet_send_pulseaudio_server_packets" lineno="67108">
7838 <summary>
7839 Send pulseaudio_server packets.
7840 </summary>
7841 @@ -51403,7 +52023,7 @@ Domain allowed access.
7842 </param>
7843 <infoflow type="write" weight="10"/>
7844 </interface>
7845 -<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="66706">
7846 +<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="67127">
7847 <summary>
7848 Do not audit attempts to send pulseaudio_server packets.
7849 </summary>
7850 @@ -51414,7 +52034,7 @@ Domain to not audit.
7851 </param>
7852 <infoflow type="none"/>
7853 </interface>
7854 -<interface name="corenet_receive_pulseaudio_server_packets" lineno="66725">
7855 +<interface name="corenet_receive_pulseaudio_server_packets" lineno="67146">
7856 <summary>
7857 Receive pulseaudio_server packets.
7858 </summary>
7859 @@ -51425,7 +52045,7 @@ Domain allowed access.
7860 </param>
7861 <infoflow type="read" weight="10"/>
7862 </interface>
7863 -<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="66744">
7864 +<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="67165">
7865 <summary>
7866 Do not audit attempts to receive pulseaudio_server packets.
7867 </summary>
7868 @@ -51436,7 +52056,7 @@ Domain allowed access.
7869 </param>
7870 <infoflow type="none"/>
7871 </interface>
7872 -<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="66763">
7873 +<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="67184">
7874 <summary>
7875 Send and receive pulseaudio_server packets.
7876 </summary>
7877 @@ -51447,7 +52067,7 @@ Domain allowed access.
7878 </param>
7879 <infoflow type="both" weight="10"/>
7880 </interface>
7881 -<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="66779">
7882 +<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="67200">
7883 <summary>
7884 Do not audit attempts to send and receive pulseaudio_server packets.
7885 </summary>
7886 @@ -51458,7 +52078,7 @@ Domain to not audit.
7887 </param>
7888 <infoflow type="none"/>
7889 </interface>
7890 -<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="66794">
7891 +<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="67215">
7892 <summary>
7893 Relabel packets to pulseaudio_server the packet type.
7894 </summary>
7895 @@ -51468,7 +52088,7 @@ Domain allowed access.
7896 </summary>
7897 </param>
7898 </interface>
7899 -<interface name="corenet_tcp_sendrecv_puppet_port" lineno="66816">
7900 +<interface name="corenet_tcp_sendrecv_puppet_port" lineno="67237">
7901 <summary>
7902 Send and receive TCP traffic on the puppet port.
7903 </summary>
7904 @@ -51479,7 +52099,7 @@ Domain allowed access.
7905 </param>
7906 <infoflow type="both" weight="10"/>
7907 </interface>
7908 -<interface name="corenet_udp_send_puppet_port" lineno="66831">
7909 +<interface name="corenet_udp_send_puppet_port" lineno="67252">
7910 <summary>
7911 Send UDP traffic on the puppet port.
7912 </summary>
7913 @@ -51490,7 +52110,7 @@ Domain allowed access.
7914 </param>
7915 <infoflow type="write" weight="10"/>
7916 </interface>
7917 -<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="66846">
7918 +<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="67267">
7919 <summary>
7920 Do not audit attempts to send UDP traffic on the puppet port.
7921 </summary>
7922 @@ -51501,7 +52121,7 @@ Domain to not audit.
7923 </param>
7924 <infoflow type="none"/>
7925 </interface>
7926 -<interface name="corenet_udp_receive_puppet_port" lineno="66861">
7927 +<interface name="corenet_udp_receive_puppet_port" lineno="67282">
7928 <summary>
7929 Receive UDP traffic on the puppet port.
7930 </summary>
7931 @@ -51512,7 +52132,7 @@ Domain allowed access.
7932 </param>
7933 <infoflow type="read" weight="10"/>
7934 </interface>
7935 -<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="66876">
7936 +<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="67297">
7937 <summary>
7938 Do not audit attempts to receive UDP traffic on the puppet port.
7939 </summary>
7940 @@ -51523,7 +52143,7 @@ Domain to not audit.
7941 </param>
7942 <infoflow type="none"/>
7943 </interface>
7944 -<interface name="corenet_udp_sendrecv_puppet_port" lineno="66891">
7945 +<interface name="corenet_udp_sendrecv_puppet_port" lineno="67312">
7946 <summary>
7947 Send and receive UDP traffic on the puppet port.
7948 </summary>
7949 @@ -51534,7 +52154,7 @@ Domain allowed access.
7950 </param>
7951 <infoflow type="both" weight="10"/>
7952 </interface>
7953 -<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="66907">
7954 +<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="67328">
7955 <summary>
7956 Do not audit attempts to send and receive
7957 UDP traffic on the puppet port.
7958 @@ -51546,7 +52166,7 @@ Domain to not audit.
7959 </param>
7960 <infoflow type="none"/>
7961 </interface>
7962 -<interface name="corenet_tcp_bind_puppet_port" lineno="66922">
7963 +<interface name="corenet_tcp_bind_puppet_port" lineno="67343">
7964 <summary>
7965 Bind TCP sockets to the puppet port.
7966 </summary>
7967 @@ -51557,7 +52177,7 @@ Domain allowed access.
7968 </param>
7969 <infoflow type="none"/>
7970 </interface>
7971 -<interface name="corenet_udp_bind_puppet_port" lineno="66942">
7972 +<interface name="corenet_udp_bind_puppet_port" lineno="67363">
7973 <summary>
7974 Bind UDP sockets to the puppet port.
7975 </summary>
7976 @@ -51568,7 +52188,7 @@ Domain allowed access.
7977 </param>
7978 <infoflow type="none"/>
7979 </interface>
7980 -<interface name="corenet_tcp_connect_puppet_port" lineno="66961">
7981 +<interface name="corenet_tcp_connect_puppet_port" lineno="67382">
7982 <summary>
7983 Make a TCP connection to the puppet port.
7984 </summary>
7985 @@ -51578,7 +52198,7 @@ Domain allowed access.
7986 </summary>
7987 </param>
7988 </interface>
7989 -<interface name="corenet_send_puppet_client_packets" lineno="66981">
7990 +<interface name="corenet_send_puppet_client_packets" lineno="67402">
7991 <summary>
7992 Send puppet_client packets.
7993 </summary>
7994 @@ -51589,7 +52209,7 @@ Domain allowed access.
7995 </param>
7996 <infoflow type="write" weight="10"/>
7997 </interface>
7998 -<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="67000">
7999 +<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="67421">
8000 <summary>
8001 Do not audit attempts to send puppet_client packets.
8002 </summary>
8003 @@ -51600,7 +52220,7 @@ Domain to not audit.
8004 </param>
8005 <infoflow type="none"/>
8006 </interface>
8007 -<interface name="corenet_receive_puppet_client_packets" lineno="67019">
8008 +<interface name="corenet_receive_puppet_client_packets" lineno="67440">
8009 <summary>
8010 Receive puppet_client packets.
8011 </summary>
8012 @@ -51611,7 +52231,7 @@ Domain allowed access.
8013 </param>
8014 <infoflow type="read" weight="10"/>
8015 </interface>
8016 -<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="67038">
8017 +<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="67459">
8018 <summary>
8019 Do not audit attempts to receive puppet_client packets.
8020 </summary>
8021 @@ -51622,7 +52242,7 @@ Domain allowed access.
8022 </param>
8023 <infoflow type="none"/>
8024 </interface>
8025 -<interface name="corenet_sendrecv_puppet_client_packets" lineno="67057">
8026 +<interface name="corenet_sendrecv_puppet_client_packets" lineno="67478">
8027 <summary>
8028 Send and receive puppet_client packets.
8029 </summary>
8030 @@ -51633,7 +52253,7 @@ Domain allowed access.
8031 </param>
8032 <infoflow type="both" weight="10"/>
8033 </interface>
8034 -<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="67073">
8035 +<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="67494">
8036 <summary>
8037 Do not audit attempts to send and receive puppet_client packets.
8038 </summary>
8039 @@ -51644,7 +52264,7 @@ Domain to not audit.
8040 </param>
8041 <infoflow type="none"/>
8042 </interface>
8043 -<interface name="corenet_relabelto_puppet_client_packets" lineno="67088">
8044 +<interface name="corenet_relabelto_puppet_client_packets" lineno="67509">
8045 <summary>
8046 Relabel packets to puppet_client the packet type.
8047 </summary>
8048 @@ -51654,7 +52274,7 @@ Domain allowed access.
8049 </summary>
8050 </param>
8051 </interface>
8052 -<interface name="corenet_send_puppet_server_packets" lineno="67108">
8053 +<interface name="corenet_send_puppet_server_packets" lineno="67529">
8054 <summary>
8055 Send puppet_server packets.
8056 </summary>
8057 @@ -51665,7 +52285,7 @@ Domain allowed access.
8058 </param>
8059 <infoflow type="write" weight="10"/>
8060 </interface>
8061 -<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="67127">
8062 +<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="67548">
8063 <summary>
8064 Do not audit attempts to send puppet_server packets.
8065 </summary>
8066 @@ -51676,7 +52296,7 @@ Domain to not audit.
8067 </param>
8068 <infoflow type="none"/>
8069 </interface>
8070 -<interface name="corenet_receive_puppet_server_packets" lineno="67146">
8071 +<interface name="corenet_receive_puppet_server_packets" lineno="67567">
8072 <summary>
8073 Receive puppet_server packets.
8074 </summary>
8075 @@ -51687,7 +52307,7 @@ Domain allowed access.
8076 </param>
8077 <infoflow type="read" weight="10"/>
8078 </interface>
8079 -<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="67165">
8080 +<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="67586">
8081 <summary>
8082 Do not audit attempts to receive puppet_server packets.
8083 </summary>
8084 @@ -51698,7 +52318,7 @@ Domain allowed access.
8085 </param>
8086 <infoflow type="none"/>
8087 </interface>
8088 -<interface name="corenet_sendrecv_puppet_server_packets" lineno="67184">
8089 +<interface name="corenet_sendrecv_puppet_server_packets" lineno="67605">
8090 <summary>
8091 Send and receive puppet_server packets.
8092 </summary>
8093 @@ -51709,7 +52329,7 @@ Domain allowed access.
8094 </param>
8095 <infoflow type="both" weight="10"/>
8096 </interface>
8097 -<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="67200">
8098 +<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="67621">
8099 <summary>
8100 Do not audit attempts to send and receive puppet_server packets.
8101 </summary>
8102 @@ -51720,7 +52340,7 @@ Domain to not audit.
8103 </param>
8104 <infoflow type="none"/>
8105 </interface>
8106 -<interface name="corenet_relabelto_puppet_server_packets" lineno="67215">
8107 +<interface name="corenet_relabelto_puppet_server_packets" lineno="67636">
8108 <summary>
8109 Relabel packets to puppet_server the packet type.
8110 </summary>
8111 @@ -51730,7 +52350,7 @@ Domain allowed access.
8112 </summary>
8113 </param>
8114 </interface>
8115 -<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="67237">
8116 +<interface name="corenet_tcp_sendrecv_puppetclient_port" lineno="67658">
8117 <summary>
8118 Send and receive TCP traffic on the puppetclient port.
8119 </summary>
8120 @@ -51741,7 +52361,7 @@ Domain allowed access.
8121 </param>
8122 <infoflow type="both" weight="10"/>
8123 </interface>
8124 -<interface name="corenet_udp_send_puppetclient_port" lineno="67252">
8125 +<interface name="corenet_udp_send_puppetclient_port" lineno="67673">
8126 <summary>
8127 Send UDP traffic on the puppetclient port.
8128 </summary>
8129 @@ -51752,7 +52372,7 @@ Domain allowed access.
8130 </param>
8131 <infoflow type="write" weight="10"/>
8132 </interface>
8133 -<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="67267">
8134 +<interface name="corenet_dontaudit_udp_send_puppetclient_port" lineno="67688">
8135 <summary>
8136 Do not audit attempts to send UDP traffic on the puppetclient port.
8137 </summary>
8138 @@ -51763,7 +52383,7 @@ Domain to not audit.
8139 </param>
8140 <infoflow type="none"/>
8141 </interface>
8142 -<interface name="corenet_udp_receive_puppetclient_port" lineno="67282">
8143 +<interface name="corenet_udp_receive_puppetclient_port" lineno="67703">
8144 <summary>
8145 Receive UDP traffic on the puppetclient port.
8146 </summary>
8147 @@ -51774,7 +52394,7 @@ Domain allowed access.
8148 </param>
8149 <infoflow type="read" weight="10"/>
8150 </interface>
8151 -<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="67297">
8152 +<interface name="corenet_dontaudit_udp_receive_puppetclient_port" lineno="67718">
8153 <summary>
8154 Do not audit attempts to receive UDP traffic on the puppetclient port.
8155 </summary>
8156 @@ -51785,7 +52405,7 @@ Domain to not audit.
8157 </param>
8158 <infoflow type="none"/>
8159 </interface>
8160 -<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="67312">
8161 +<interface name="corenet_udp_sendrecv_puppetclient_port" lineno="67733">
8162 <summary>
8163 Send and receive UDP traffic on the puppetclient port.
8164 </summary>
8165 @@ -51796,7 +52416,7 @@ Domain allowed access.
8166 </param>
8167 <infoflow type="both" weight="10"/>
8168 </interface>
8169 -<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="67328">
8170 +<interface name="corenet_dontaudit_udp_sendrecv_puppetclient_port" lineno="67749">
8171 <summary>
8172 Do not audit attempts to send and receive
8173 UDP traffic on the puppetclient port.
8174 @@ -51808,7 +52428,7 @@ Domain to not audit.
8175 </param>
8176 <infoflow type="none"/>
8177 </interface>
8178 -<interface name="corenet_tcp_bind_puppetclient_port" lineno="67343">
8179 +<interface name="corenet_tcp_bind_puppetclient_port" lineno="67764">
8180 <summary>
8181 Bind TCP sockets to the puppetclient port.
8182 </summary>
8183 @@ -51819,7 +52439,7 @@ Domain allowed access.
8184 </param>
8185 <infoflow type="none"/>
8186 </interface>
8187 -<interface name="corenet_udp_bind_puppetclient_port" lineno="67363">
8188 +<interface name="corenet_udp_bind_puppetclient_port" lineno="67784">
8189 <summary>
8190 Bind UDP sockets to the puppetclient port.
8191 </summary>
8192 @@ -51830,7 +52450,7 @@ Domain allowed access.
8193 </param>
8194 <infoflow type="none"/>
8195 </interface>
8196 -<interface name="corenet_tcp_connect_puppetclient_port" lineno="67382">
8197 +<interface name="corenet_tcp_connect_puppetclient_port" lineno="67803">
8198 <summary>
8199 Make a TCP connection to the puppetclient port.
8200 </summary>
8201 @@ -51840,7 +52460,7 @@ Domain allowed access.
8202 </summary>
8203 </param>
8204 </interface>
8205 -<interface name="corenet_send_puppetclient_client_packets" lineno="67402">
8206 +<interface name="corenet_send_puppetclient_client_packets" lineno="67823">
8207 <summary>
8208 Send puppetclient_client packets.
8209 </summary>
8210 @@ -51851,7 +52471,7 @@ Domain allowed access.
8211 </param>
8212 <infoflow type="write" weight="10"/>
8213 </interface>
8214 -<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="67421">
8215 +<interface name="corenet_dontaudit_send_puppetclient_client_packets" lineno="67842">
8216 <summary>
8217 Do not audit attempts to send puppetclient_client packets.
8218 </summary>
8219 @@ -51862,7 +52482,7 @@ Domain to not audit.
8220 </param>
8221 <infoflow type="none"/>
8222 </interface>
8223 -<interface name="corenet_receive_puppetclient_client_packets" lineno="67440">
8224 +<interface name="corenet_receive_puppetclient_client_packets" lineno="67861">
8225 <summary>
8226 Receive puppetclient_client packets.
8227 </summary>
8228 @@ -51873,7 +52493,7 @@ Domain allowed access.
8229 </param>
8230 <infoflow type="read" weight="10"/>
8231 </interface>
8232 -<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="67459">
8233 +<interface name="corenet_dontaudit_receive_puppetclient_client_packets" lineno="67880">
8234 <summary>
8235 Do not audit attempts to receive puppetclient_client packets.
8236 </summary>
8237 @@ -51884,7 +52504,7 @@ Domain allowed access.
8238 </param>
8239 <infoflow type="none"/>
8240 </interface>
8241 -<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="67478">
8242 +<interface name="corenet_sendrecv_puppetclient_client_packets" lineno="67899">
8243 <summary>
8244 Send and receive puppetclient_client packets.
8245 </summary>
8246 @@ -51895,7 +52515,7 @@ Domain allowed access.
8247 </param>
8248 <infoflow type="both" weight="10"/>
8249 </interface>
8250 -<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="67494">
8251 +<interface name="corenet_dontaudit_sendrecv_puppetclient_client_packets" lineno="67915">
8252 <summary>
8253 Do not audit attempts to send and receive puppetclient_client packets.
8254 </summary>
8255 @@ -51906,7 +52526,7 @@ Domain to not audit.
8256 </param>
8257 <infoflow type="none"/>
8258 </interface>
8259 -<interface name="corenet_relabelto_puppetclient_client_packets" lineno="67509">
8260 +<interface name="corenet_relabelto_puppetclient_client_packets" lineno="67930">
8261 <summary>
8262 Relabel packets to puppetclient_client the packet type.
8263 </summary>
8264 @@ -51916,7 +52536,7 @@ Domain allowed access.
8265 </summary>
8266 </param>
8267 </interface>
8268 -<interface name="corenet_send_puppetclient_server_packets" lineno="67529">
8269 +<interface name="corenet_send_puppetclient_server_packets" lineno="67950">
8270 <summary>
8271 Send puppetclient_server packets.
8272 </summary>
8273 @@ -51927,7 +52547,7 @@ Domain allowed access.
8274 </param>
8275 <infoflow type="write" weight="10"/>
8276 </interface>
8277 -<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="67548">
8278 +<interface name="corenet_dontaudit_send_puppetclient_server_packets" lineno="67969">
8279 <summary>
8280 Do not audit attempts to send puppetclient_server packets.
8281 </summary>
8282 @@ -51938,7 +52558,7 @@ Domain to not audit.
8283 </param>
8284 <infoflow type="none"/>
8285 </interface>
8286 -<interface name="corenet_receive_puppetclient_server_packets" lineno="67567">
8287 +<interface name="corenet_receive_puppetclient_server_packets" lineno="67988">
8288 <summary>
8289 Receive puppetclient_server packets.
8290 </summary>
8291 @@ -51949,7 +52569,7 @@ Domain allowed access.
8292 </param>
8293 <infoflow type="read" weight="10"/>
8294 </interface>
8295 -<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="67586">
8296 +<interface name="corenet_dontaudit_receive_puppetclient_server_packets" lineno="68007">
8297 <summary>
8298 Do not audit attempts to receive puppetclient_server packets.
8299 </summary>
8300 @@ -51960,7 +52580,7 @@ Domain allowed access.
8301 </param>
8302 <infoflow type="none"/>
8303 </interface>
8304 -<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="67605">
8305 +<interface name="corenet_sendrecv_puppetclient_server_packets" lineno="68026">
8306 <summary>
8307 Send and receive puppetclient_server packets.
8308 </summary>
8309 @@ -51971,7 +52591,7 @@ Domain allowed access.
8310 </param>
8311 <infoflow type="both" weight="10"/>
8312 </interface>
8313 -<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="67621">
8314 +<interface name="corenet_dontaudit_sendrecv_puppetclient_server_packets" lineno="68042">
8315 <summary>
8316 Do not audit attempts to send and receive puppetclient_server packets.
8317 </summary>
8318 @@ -51982,7 +52602,7 @@ Domain to not audit.
8319 </param>
8320 <infoflow type="none"/>
8321 </interface>
8322 -<interface name="corenet_relabelto_puppetclient_server_packets" lineno="67636">
8323 +<interface name="corenet_relabelto_puppetclient_server_packets" lineno="68057">
8324 <summary>
8325 Relabel packets to puppetclient_server the packet type.
8326 </summary>
8327 @@ -51992,7 +52612,7 @@ Domain allowed access.
8328 </summary>
8329 </param>
8330 </interface>
8331 -<interface name="corenet_tcp_sendrecv_pxe_port" lineno="67658">
8332 +<interface name="corenet_tcp_sendrecv_pxe_port" lineno="68079">
8333 <summary>
8334 Send and receive TCP traffic on the pxe port.
8335 </summary>
8336 @@ -52003,7 +52623,7 @@ Domain allowed access.
8337 </param>
8338 <infoflow type="both" weight="10"/>
8339 </interface>
8340 -<interface name="corenet_udp_send_pxe_port" lineno="67673">
8341 +<interface name="corenet_udp_send_pxe_port" lineno="68094">
8342 <summary>
8343 Send UDP traffic on the pxe port.
8344 </summary>
8345 @@ -52014,7 +52634,7 @@ Domain allowed access.
8346 </param>
8347 <infoflow type="write" weight="10"/>
8348 </interface>
8349 -<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="67688">
8350 +<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="68109">
8351 <summary>
8352 Do not audit attempts to send UDP traffic on the pxe port.
8353 </summary>
8354 @@ -52025,7 +52645,7 @@ Domain to not audit.
8355 </param>
8356 <infoflow type="none"/>
8357 </interface>
8358 -<interface name="corenet_udp_receive_pxe_port" lineno="67703">
8359 +<interface name="corenet_udp_receive_pxe_port" lineno="68124">
8360 <summary>
8361 Receive UDP traffic on the pxe port.
8362 </summary>
8363 @@ -52036,7 +52656,7 @@ Domain allowed access.
8364 </param>
8365 <infoflow type="read" weight="10"/>
8366 </interface>
8367 -<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="67718">
8368 +<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="68139">
8369 <summary>
8370 Do not audit attempts to receive UDP traffic on the pxe port.
8371 </summary>
8372 @@ -52047,7 +52667,7 @@ Domain to not audit.
8373 </param>
8374 <infoflow type="none"/>
8375 </interface>
8376 -<interface name="corenet_udp_sendrecv_pxe_port" lineno="67733">
8377 +<interface name="corenet_udp_sendrecv_pxe_port" lineno="68154">
8378 <summary>
8379 Send and receive UDP traffic on the pxe port.
8380 </summary>
8381 @@ -52058,7 +52678,7 @@ Domain allowed access.
8382 </param>
8383 <infoflow type="both" weight="10"/>
8384 </interface>
8385 -<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="67749">
8386 +<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="68170">
8387 <summary>
8388 Do not audit attempts to send and receive
8389 UDP traffic on the pxe port.
8390 @@ -52070,7 +52690,7 @@ Domain to not audit.
8391 </param>
8392 <infoflow type="none"/>
8393 </interface>
8394 -<interface name="corenet_tcp_bind_pxe_port" lineno="67764">
8395 +<interface name="corenet_tcp_bind_pxe_port" lineno="68185">
8396 <summary>
8397 Bind TCP sockets to the pxe port.
8398 </summary>
8399 @@ -52081,7 +52701,7 @@ Domain allowed access.
8400 </param>
8401 <infoflow type="none"/>
8402 </interface>
8403 -<interface name="corenet_udp_bind_pxe_port" lineno="67784">
8404 +<interface name="corenet_udp_bind_pxe_port" lineno="68205">
8405 <summary>
8406 Bind UDP sockets to the pxe port.
8407 </summary>
8408 @@ -52092,7 +52712,7 @@ Domain allowed access.
8409 </param>
8410 <infoflow type="none"/>
8411 </interface>
8412 -<interface name="corenet_tcp_connect_pxe_port" lineno="67803">
8413 +<interface name="corenet_tcp_connect_pxe_port" lineno="68224">
8414 <summary>
8415 Make a TCP connection to the pxe port.
8416 </summary>
8417 @@ -52102,7 +52722,7 @@ Domain allowed access.
8418 </summary>
8419 </param>
8420 </interface>
8421 -<interface name="corenet_send_pxe_client_packets" lineno="67823">
8422 +<interface name="corenet_send_pxe_client_packets" lineno="68244">
8423 <summary>
8424 Send pxe_client packets.
8425 </summary>
8426 @@ -52113,7 +52733,7 @@ Domain allowed access.
8427 </param>
8428 <infoflow type="write" weight="10"/>
8429 </interface>
8430 -<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="67842">
8431 +<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="68263">
8432 <summary>
8433 Do not audit attempts to send pxe_client packets.
8434 </summary>
8435 @@ -52124,7 +52744,7 @@ Domain to not audit.
8436 </param>
8437 <infoflow type="none"/>
8438 </interface>
8439 -<interface name="corenet_receive_pxe_client_packets" lineno="67861">
8440 +<interface name="corenet_receive_pxe_client_packets" lineno="68282">
8441 <summary>
8442 Receive pxe_client packets.
8443 </summary>
8444 @@ -52135,7 +52755,7 @@ Domain allowed access.
8445 </param>
8446 <infoflow type="read" weight="10"/>
8447 </interface>
8448 -<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="67880">
8449 +<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="68301">
8450 <summary>
8451 Do not audit attempts to receive pxe_client packets.
8452 </summary>
8453 @@ -52146,7 +52766,7 @@ Domain allowed access.
8454 </param>
8455 <infoflow type="none"/>
8456 </interface>
8457 -<interface name="corenet_sendrecv_pxe_client_packets" lineno="67899">
8458 +<interface name="corenet_sendrecv_pxe_client_packets" lineno="68320">
8459 <summary>
8460 Send and receive pxe_client packets.
8461 </summary>
8462 @@ -52157,7 +52777,7 @@ Domain allowed access.
8463 </param>
8464 <infoflow type="both" weight="10"/>
8465 </interface>
8466 -<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="67915">
8467 +<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="68336">
8468 <summary>
8469 Do not audit attempts to send and receive pxe_client packets.
8470 </summary>
8471 @@ -52168,7 +52788,7 @@ Domain to not audit.
8472 </param>
8473 <infoflow type="none"/>
8474 </interface>
8475 -<interface name="corenet_relabelto_pxe_client_packets" lineno="67930">
8476 +<interface name="corenet_relabelto_pxe_client_packets" lineno="68351">
8477 <summary>
8478 Relabel packets to pxe_client the packet type.
8479 </summary>
8480 @@ -52178,7 +52798,7 @@ Domain allowed access.
8481 </summary>
8482 </param>
8483 </interface>
8484 -<interface name="corenet_send_pxe_server_packets" lineno="67950">
8485 +<interface name="corenet_send_pxe_server_packets" lineno="68371">
8486 <summary>
8487 Send pxe_server packets.
8488 </summary>
8489 @@ -52189,7 +52809,7 @@ Domain allowed access.
8490 </param>
8491 <infoflow type="write" weight="10"/>
8492 </interface>
8493 -<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="67969">
8494 +<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="68390">
8495 <summary>
8496 Do not audit attempts to send pxe_server packets.
8497 </summary>
8498 @@ -52200,7 +52820,7 @@ Domain to not audit.
8499 </param>
8500 <infoflow type="none"/>
8501 </interface>
8502 -<interface name="corenet_receive_pxe_server_packets" lineno="67988">
8503 +<interface name="corenet_receive_pxe_server_packets" lineno="68409">
8504 <summary>
8505 Receive pxe_server packets.
8506 </summary>
8507 @@ -52211,7 +52831,7 @@ Domain allowed access.
8508 </param>
8509 <infoflow type="read" weight="10"/>
8510 </interface>
8511 -<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="68007">
8512 +<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="68428">
8513 <summary>
8514 Do not audit attempts to receive pxe_server packets.
8515 </summary>
8516 @@ -52222,7 +52842,7 @@ Domain allowed access.
8517 </param>
8518 <infoflow type="none"/>
8519 </interface>
8520 -<interface name="corenet_sendrecv_pxe_server_packets" lineno="68026">
8521 +<interface name="corenet_sendrecv_pxe_server_packets" lineno="68447">
8522 <summary>
8523 Send and receive pxe_server packets.
8524 </summary>
8525 @@ -52233,7 +52853,7 @@ Domain allowed access.
8526 </param>
8527 <infoflow type="both" weight="10"/>
8528 </interface>
8529 -<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="68042">
8530 +<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="68463">
8531 <summary>
8532 Do not audit attempts to send and receive pxe_server packets.
8533 </summary>
8534 @@ -52244,7 +52864,7 @@ Domain to not audit.
8535 </param>
8536 <infoflow type="none"/>
8537 </interface>
8538 -<interface name="corenet_relabelto_pxe_server_packets" lineno="68057">
8539 +<interface name="corenet_relabelto_pxe_server_packets" lineno="68478">
8540 <summary>
8541 Relabel packets to pxe_server the packet type.
8542 </summary>
8543 @@ -52254,7 +52874,7 @@ Domain allowed access.
8544 </summary>
8545 </param>
8546 </interface>
8547 -<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="68079">
8548 +<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="68500">
8549 <summary>
8550 Send and receive TCP traffic on the pyzor port.
8551 </summary>
8552 @@ -52265,7 +52885,7 @@ Domain allowed access.
8553 </param>
8554 <infoflow type="both" weight="10"/>
8555 </interface>
8556 -<interface name="corenet_udp_send_pyzor_port" lineno="68094">
8557 +<interface name="corenet_udp_send_pyzor_port" lineno="68515">
8558 <summary>
8559 Send UDP traffic on the pyzor port.
8560 </summary>
8561 @@ -52276,7 +52896,7 @@ Domain allowed access.
8562 </param>
8563 <infoflow type="write" weight="10"/>
8564 </interface>
8565 -<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="68109">
8566 +<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="68530">
8567 <summary>
8568 Do not audit attempts to send UDP traffic on the pyzor port.
8569 </summary>
8570 @@ -52287,7 +52907,7 @@ Domain to not audit.
8571 </param>
8572 <infoflow type="none"/>
8573 </interface>
8574 -<interface name="corenet_udp_receive_pyzor_port" lineno="68124">
8575 +<interface name="corenet_udp_receive_pyzor_port" lineno="68545">
8576 <summary>
8577 Receive UDP traffic on the pyzor port.
8578 </summary>
8579 @@ -52298,7 +52918,7 @@ Domain allowed access.
8580 </param>
8581 <infoflow type="read" weight="10"/>
8582 </interface>
8583 -<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="68139">
8584 +<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="68560">
8585 <summary>
8586 Do not audit attempts to receive UDP traffic on the pyzor port.
8587 </summary>
8588 @@ -52309,7 +52929,7 @@ Domain to not audit.
8589 </param>
8590 <infoflow type="none"/>
8591 </interface>
8592 -<interface name="corenet_udp_sendrecv_pyzor_port" lineno="68154">
8593 +<interface name="corenet_udp_sendrecv_pyzor_port" lineno="68575">
8594 <summary>
8595 Send and receive UDP traffic on the pyzor port.
8596 </summary>
8597 @@ -52320,7 +52940,7 @@ Domain allowed access.
8598 </param>
8599 <infoflow type="both" weight="10"/>
8600 </interface>
8601 -<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="68170">
8602 +<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="68591">
8603 <summary>
8604 Do not audit attempts to send and receive
8605 UDP traffic on the pyzor port.
8606 @@ -52332,7 +52952,7 @@ Domain to not audit.
8607 </param>
8608 <infoflow type="none"/>
8609 </interface>
8610 -<interface name="corenet_tcp_bind_pyzor_port" lineno="68185">
8611 +<interface name="corenet_tcp_bind_pyzor_port" lineno="68606">
8612 <summary>
8613 Bind TCP sockets to the pyzor port.
8614 </summary>
8615 @@ -52343,7 +52963,7 @@ Domain allowed access.
8616 </param>
8617 <infoflow type="none"/>
8618 </interface>
8619 -<interface name="corenet_udp_bind_pyzor_port" lineno="68205">
8620 +<interface name="corenet_udp_bind_pyzor_port" lineno="68626">
8621 <summary>
8622 Bind UDP sockets to the pyzor port.
8623 </summary>
8624 @@ -52354,7 +52974,7 @@ Domain allowed access.
8625 </param>
8626 <infoflow type="none"/>
8627 </interface>
8628 -<interface name="corenet_tcp_connect_pyzor_port" lineno="68224">
8629 +<interface name="corenet_tcp_connect_pyzor_port" lineno="68645">
8630 <summary>
8631 Make a TCP connection to the pyzor port.
8632 </summary>
8633 @@ -52364,7 +52984,7 @@ Domain allowed access.
8634 </summary>
8635 </param>
8636 </interface>
8637 -<interface name="corenet_send_pyzor_client_packets" lineno="68244">
8638 +<interface name="corenet_send_pyzor_client_packets" lineno="68665">
8639 <summary>
8640 Send pyzor_client packets.
8641 </summary>
8642 @@ -52375,7 +52995,7 @@ Domain allowed access.
8643 </param>
8644 <infoflow type="write" weight="10"/>
8645 </interface>
8646 -<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="68263">
8647 +<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="68684">
8648 <summary>
8649 Do not audit attempts to send pyzor_client packets.
8650 </summary>
8651 @@ -52386,7 +53006,7 @@ Domain to not audit.
8652 </param>
8653 <infoflow type="none"/>
8654 </interface>
8655 -<interface name="corenet_receive_pyzor_client_packets" lineno="68282">
8656 +<interface name="corenet_receive_pyzor_client_packets" lineno="68703">
8657 <summary>
8658 Receive pyzor_client packets.
8659 </summary>
8660 @@ -52397,7 +53017,7 @@ Domain allowed access.
8661 </param>
8662 <infoflow type="read" weight="10"/>
8663 </interface>
8664 -<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="68301">
8665 +<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="68722">
8666 <summary>
8667 Do not audit attempts to receive pyzor_client packets.
8668 </summary>
8669 @@ -52408,7 +53028,7 @@ Domain allowed access.
8670 </param>
8671 <infoflow type="none"/>
8672 </interface>
8673 -<interface name="corenet_sendrecv_pyzor_client_packets" lineno="68320">
8674 +<interface name="corenet_sendrecv_pyzor_client_packets" lineno="68741">
8675 <summary>
8676 Send and receive pyzor_client packets.
8677 </summary>
8678 @@ -52419,7 +53039,7 @@ Domain allowed access.
8679 </param>
8680 <infoflow type="both" weight="10"/>
8681 </interface>
8682 -<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="68336">
8683 +<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="68757">
8684 <summary>
8685 Do not audit attempts to send and receive pyzor_client packets.
8686 </summary>
8687 @@ -52430,7 +53050,7 @@ Domain to not audit.
8688 </param>
8689 <infoflow type="none"/>
8690 </interface>
8691 -<interface name="corenet_relabelto_pyzor_client_packets" lineno="68351">
8692 +<interface name="corenet_relabelto_pyzor_client_packets" lineno="68772">
8693 <summary>
8694 Relabel packets to pyzor_client the packet type.
8695 </summary>
8696 @@ -52440,7 +53060,7 @@ Domain allowed access.
8697 </summary>
8698 </param>
8699 </interface>
8700 -<interface name="corenet_send_pyzor_server_packets" lineno="68371">
8701 +<interface name="corenet_send_pyzor_server_packets" lineno="68792">
8702 <summary>
8703 Send pyzor_server packets.
8704 </summary>
8705 @@ -52451,7 +53071,7 @@ Domain allowed access.
8706 </param>
8707 <infoflow type="write" weight="10"/>
8708 </interface>
8709 -<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="68390">
8710 +<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="68811">
8711 <summary>
8712 Do not audit attempts to send pyzor_server packets.
8713 </summary>
8714 @@ -52462,7 +53082,7 @@ Domain to not audit.
8715 </param>
8716 <infoflow type="none"/>
8717 </interface>
8718 -<interface name="corenet_receive_pyzor_server_packets" lineno="68409">
8719 +<interface name="corenet_receive_pyzor_server_packets" lineno="68830">
8720 <summary>
8721 Receive pyzor_server packets.
8722 </summary>
8723 @@ -52473,7 +53093,7 @@ Domain allowed access.
8724 </param>
8725 <infoflow type="read" weight="10"/>
8726 </interface>
8727 -<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="68428">
8728 +<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="68849">
8729 <summary>
8730 Do not audit attempts to receive pyzor_server packets.
8731 </summary>
8732 @@ -52484,7 +53104,7 @@ Domain allowed access.
8733 </param>
8734 <infoflow type="none"/>
8735 </interface>
8736 -<interface name="corenet_sendrecv_pyzor_server_packets" lineno="68447">
8737 +<interface name="corenet_sendrecv_pyzor_server_packets" lineno="68868">
8738 <summary>
8739 Send and receive pyzor_server packets.
8740 </summary>
8741 @@ -52495,7 +53115,7 @@ Domain allowed access.
8742 </param>
8743 <infoflow type="both" weight="10"/>
8744 </interface>
8745 -<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="68463">
8746 +<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="68884">
8747 <summary>
8748 Do not audit attempts to send and receive pyzor_server packets.
8749 </summary>
8750 @@ -52506,7 +53126,7 @@ Domain to not audit.
8751 </param>
8752 <infoflow type="none"/>
8753 </interface>
8754 -<interface name="corenet_relabelto_pyzor_server_packets" lineno="68478">
8755 +<interface name="corenet_relabelto_pyzor_server_packets" lineno="68899">
8756 <summary>
8757 Relabel packets to pyzor_server the packet type.
8758 </summary>
8759 @@ -52516,7 +53136,7 @@ Domain allowed access.
8760 </summary>
8761 </param>
8762 </interface>
8763 -<interface name="corenet_tcp_sendrecv_radacct_port" lineno="68500">
8764 +<interface name="corenet_tcp_sendrecv_radacct_port" lineno="68921">
8765 <summary>
8766 Send and receive TCP traffic on the radacct port.
8767 </summary>
8768 @@ -52527,7 +53147,7 @@ Domain allowed access.
8769 </param>
8770 <infoflow type="both" weight="10"/>
8771 </interface>
8772 -<interface name="corenet_udp_send_radacct_port" lineno="68515">
8773 +<interface name="corenet_udp_send_radacct_port" lineno="68936">
8774 <summary>
8775 Send UDP traffic on the radacct port.
8776 </summary>
8777 @@ -52538,7 +53158,7 @@ Domain allowed access.
8778 </param>
8779 <infoflow type="write" weight="10"/>
8780 </interface>
8781 -<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="68530">
8782 +<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="68951">
8783 <summary>
8784 Do not audit attempts to send UDP traffic on the radacct port.
8785 </summary>
8786 @@ -52549,7 +53169,7 @@ Domain to not audit.
8787 </param>
8788 <infoflow type="none"/>
8789 </interface>
8790 -<interface name="corenet_udp_receive_radacct_port" lineno="68545">
8791 +<interface name="corenet_udp_receive_radacct_port" lineno="68966">
8792 <summary>
8793 Receive UDP traffic on the radacct port.
8794 </summary>
8795 @@ -52560,7 +53180,7 @@ Domain allowed access.
8796 </param>
8797 <infoflow type="read" weight="10"/>
8798 </interface>
8799 -<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="68560">
8800 +<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="68981">
8801 <summary>
8802 Do not audit attempts to receive UDP traffic on the radacct port.
8803 </summary>
8804 @@ -52571,7 +53191,7 @@ Domain to not audit.
8805 </param>
8806 <infoflow type="none"/>
8807 </interface>
8808 -<interface name="corenet_udp_sendrecv_radacct_port" lineno="68575">
8809 +<interface name="corenet_udp_sendrecv_radacct_port" lineno="68996">
8810 <summary>
8811 Send and receive UDP traffic on the radacct port.
8812 </summary>
8813 @@ -52582,7 +53202,7 @@ Domain allowed access.
8814 </param>
8815 <infoflow type="both" weight="10"/>
8816 </interface>
8817 -<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="68591">
8818 +<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="69012">
8819 <summary>
8820 Do not audit attempts to send and receive
8821 UDP traffic on the radacct port.
8822 @@ -52594,7 +53214,7 @@ Domain to not audit.
8823 </param>
8824 <infoflow type="none"/>
8825 </interface>
8826 -<interface name="corenet_tcp_bind_radacct_port" lineno="68606">
8827 +<interface name="corenet_tcp_bind_radacct_port" lineno="69027">
8828 <summary>
8829 Bind TCP sockets to the radacct port.
8830 </summary>
8831 @@ -52605,7 +53225,7 @@ Domain allowed access.
8832 </param>
8833 <infoflow type="none"/>
8834 </interface>
8835 -<interface name="corenet_udp_bind_radacct_port" lineno="68626">
8836 +<interface name="corenet_udp_bind_radacct_port" lineno="69047">
8837 <summary>
8838 Bind UDP sockets to the radacct port.
8839 </summary>
8840 @@ -52616,7 +53236,7 @@ Domain allowed access.
8841 </param>
8842 <infoflow type="none"/>
8843 </interface>
8844 -<interface name="corenet_tcp_connect_radacct_port" lineno="68645">
8845 +<interface name="corenet_tcp_connect_radacct_port" lineno="69066">
8846 <summary>
8847 Make a TCP connection to the radacct port.
8848 </summary>
8849 @@ -52626,7 +53246,7 @@ Domain allowed access.
8850 </summary>
8851 </param>
8852 </interface>
8853 -<interface name="corenet_send_radacct_client_packets" lineno="68665">
8854 +<interface name="corenet_send_radacct_client_packets" lineno="69086">
8855 <summary>
8856 Send radacct_client packets.
8857 </summary>
8858 @@ -52637,7 +53257,7 @@ Domain allowed access.
8859 </param>
8860 <infoflow type="write" weight="10"/>
8861 </interface>
8862 -<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="68684">
8863 +<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="69105">
8864 <summary>
8865 Do not audit attempts to send radacct_client packets.
8866 </summary>
8867 @@ -52648,7 +53268,7 @@ Domain to not audit.
8868 </param>
8869 <infoflow type="none"/>
8870 </interface>
8871 -<interface name="corenet_receive_radacct_client_packets" lineno="68703">
8872 +<interface name="corenet_receive_radacct_client_packets" lineno="69124">
8873 <summary>
8874 Receive radacct_client packets.
8875 </summary>
8876 @@ -52659,7 +53279,7 @@ Domain allowed access.
8877 </param>
8878 <infoflow type="read" weight="10"/>
8879 </interface>
8880 -<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="68722">
8881 +<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="69143">
8882 <summary>
8883 Do not audit attempts to receive radacct_client packets.
8884 </summary>
8885 @@ -52670,7 +53290,7 @@ Domain allowed access.
8886 </param>
8887 <infoflow type="none"/>
8888 </interface>
8889 -<interface name="corenet_sendrecv_radacct_client_packets" lineno="68741">
8890 +<interface name="corenet_sendrecv_radacct_client_packets" lineno="69162">
8891 <summary>
8892 Send and receive radacct_client packets.
8893 </summary>
8894 @@ -52681,7 +53301,7 @@ Domain allowed access.
8895 </param>
8896 <infoflow type="both" weight="10"/>
8897 </interface>
8898 -<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="68757">
8899 +<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="69178">
8900 <summary>
8901 Do not audit attempts to send and receive radacct_client packets.
8902 </summary>
8903 @@ -52692,7 +53312,7 @@ Domain to not audit.
8904 </param>
8905 <infoflow type="none"/>
8906 </interface>
8907 -<interface name="corenet_relabelto_radacct_client_packets" lineno="68772">
8908 +<interface name="corenet_relabelto_radacct_client_packets" lineno="69193">
8909 <summary>
8910 Relabel packets to radacct_client the packet type.
8911 </summary>
8912 @@ -52702,7 +53322,7 @@ Domain allowed access.
8913 </summary>
8914 </param>
8915 </interface>
8916 -<interface name="corenet_send_radacct_server_packets" lineno="68792">
8917 +<interface name="corenet_send_radacct_server_packets" lineno="69213">
8918 <summary>
8919 Send radacct_server packets.
8920 </summary>
8921 @@ -52713,7 +53333,7 @@ Domain allowed access.
8922 </param>
8923 <infoflow type="write" weight="10"/>
8924 </interface>
8925 -<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="68811">
8926 +<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="69232">
8927 <summary>
8928 Do not audit attempts to send radacct_server packets.
8929 </summary>
8930 @@ -52724,7 +53344,7 @@ Domain to not audit.
8931 </param>
8932 <infoflow type="none"/>
8933 </interface>
8934 -<interface name="corenet_receive_radacct_server_packets" lineno="68830">
8935 +<interface name="corenet_receive_radacct_server_packets" lineno="69251">
8936 <summary>
8937 Receive radacct_server packets.
8938 </summary>
8939 @@ -52735,7 +53355,7 @@ Domain allowed access.
8940 </param>
8941 <infoflow type="read" weight="10"/>
8942 </interface>
8943 -<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="68849">
8944 +<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="69270">
8945 <summary>
8946 Do not audit attempts to receive radacct_server packets.
8947 </summary>
8948 @@ -52746,7 +53366,7 @@ Domain allowed access.
8949 </param>
8950 <infoflow type="none"/>
8951 </interface>
8952 -<interface name="corenet_sendrecv_radacct_server_packets" lineno="68868">
8953 +<interface name="corenet_sendrecv_radacct_server_packets" lineno="69289">
8954 <summary>
8955 Send and receive radacct_server packets.
8956 </summary>
8957 @@ -52757,7 +53377,7 @@ Domain allowed access.
8958 </param>
8959 <infoflow type="both" weight="10"/>
8960 </interface>
8961 -<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="68884">
8962 +<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="69305">
8963 <summary>
8964 Do not audit attempts to send and receive radacct_server packets.
8965 </summary>
8966 @@ -52768,7 +53388,7 @@ Domain to not audit.
8967 </param>
8968 <infoflow type="none"/>
8969 </interface>
8970 -<interface name="corenet_relabelto_radacct_server_packets" lineno="68899">
8971 +<interface name="corenet_relabelto_radacct_server_packets" lineno="69320">
8972 <summary>
8973 Relabel packets to radacct_server the packet type.
8974 </summary>
8975 @@ -52778,7 +53398,7 @@ Domain allowed access.
8976 </summary>
8977 </param>
8978 </interface>
8979 -<interface name="corenet_tcp_sendrecv_radius_port" lineno="68921">
8980 +<interface name="corenet_tcp_sendrecv_radius_port" lineno="69342">
8981 <summary>
8982 Send and receive TCP traffic on the radius port.
8983 </summary>
8984 @@ -52789,7 +53409,7 @@ Domain allowed access.
8985 </param>
8986 <infoflow type="both" weight="10"/>
8987 </interface>
8988 -<interface name="corenet_udp_send_radius_port" lineno="68936">
8989 +<interface name="corenet_udp_send_radius_port" lineno="69357">
8990 <summary>
8991 Send UDP traffic on the radius port.
8992 </summary>
8993 @@ -52800,7 +53420,7 @@ Domain allowed access.
8994 </param>
8995 <infoflow type="write" weight="10"/>
8996 </interface>
8997 -<interface name="corenet_dontaudit_udp_send_radius_port" lineno="68951">
8998 +<interface name="corenet_dontaudit_udp_send_radius_port" lineno="69372">
8999 <summary>
9000 Do not audit attempts to send UDP traffic on the radius port.
9001 </summary>
9002 @@ -52811,7 +53431,7 @@ Domain to not audit.
9003 </param>
9004 <infoflow type="none"/>
9005 </interface>
9006 -<interface name="corenet_udp_receive_radius_port" lineno="68966">
9007 +<interface name="corenet_udp_receive_radius_port" lineno="69387">
9008 <summary>
9009 Receive UDP traffic on the radius port.
9010 </summary>
9011 @@ -52822,7 +53442,7 @@ Domain allowed access.
9012 </param>
9013 <infoflow type="read" weight="10"/>
9014 </interface>
9015 -<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="68981">
9016 +<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="69402">
9017 <summary>
9018 Do not audit attempts to receive UDP traffic on the radius port.
9019 </summary>
9020 @@ -52833,7 +53453,7 @@ Domain to not audit.
9021 </param>
9022 <infoflow type="none"/>
9023 </interface>
9024 -<interface name="corenet_udp_sendrecv_radius_port" lineno="68996">
9025 +<interface name="corenet_udp_sendrecv_radius_port" lineno="69417">
9026 <summary>
9027 Send and receive UDP traffic on the radius port.
9028 </summary>
9029 @@ -52844,7 +53464,7 @@ Domain allowed access.
9030 </param>
9031 <infoflow type="both" weight="10"/>
9032 </interface>
9033 -<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="69012">
9034 +<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="69433">
9035 <summary>
9036 Do not audit attempts to send and receive
9037 UDP traffic on the radius port.
9038 @@ -52856,7 +53476,7 @@ Domain to not audit.
9039 </param>
9040 <infoflow type="none"/>
9041 </interface>
9042 -<interface name="corenet_tcp_bind_radius_port" lineno="69027">
9043 +<interface name="corenet_tcp_bind_radius_port" lineno="69448">
9044 <summary>
9045 Bind TCP sockets to the radius port.
9046 </summary>
9047 @@ -52867,7 +53487,7 @@ Domain allowed access.
9048 </param>
9049 <infoflow type="none"/>
9050 </interface>
9051 -<interface name="corenet_udp_bind_radius_port" lineno="69047">
9052 +<interface name="corenet_udp_bind_radius_port" lineno="69468">
9053 <summary>
9054 Bind UDP sockets to the radius port.
9055 </summary>
9056 @@ -52878,7 +53498,7 @@ Domain allowed access.
9057 </param>
9058 <infoflow type="none"/>
9059 </interface>
9060 -<interface name="corenet_tcp_connect_radius_port" lineno="69066">
9061 +<interface name="corenet_tcp_connect_radius_port" lineno="69487">
9062 <summary>
9063 Make a TCP connection to the radius port.
9064 </summary>
9065 @@ -52888,7 +53508,7 @@ Domain allowed access.
9066 </summary>
9067 </param>
9068 </interface>
9069 -<interface name="corenet_send_radius_client_packets" lineno="69086">
9070 +<interface name="corenet_send_radius_client_packets" lineno="69507">
9071 <summary>
9072 Send radius_client packets.
9073 </summary>
9074 @@ -52899,7 +53519,7 @@ Domain allowed access.
9075 </param>
9076 <infoflow type="write" weight="10"/>
9077 </interface>
9078 -<interface name="corenet_dontaudit_send_radius_client_packets" lineno="69105">
9079 +<interface name="corenet_dontaudit_send_radius_client_packets" lineno="69526">
9080 <summary>
9081 Do not audit attempts to send radius_client packets.
9082 </summary>
9083 @@ -52910,7 +53530,7 @@ Domain to not audit.
9084 </param>
9085 <infoflow type="none"/>
9086 </interface>
9087 -<interface name="corenet_receive_radius_client_packets" lineno="69124">
9088 +<interface name="corenet_receive_radius_client_packets" lineno="69545">
9089 <summary>
9090 Receive radius_client packets.
9091 </summary>
9092 @@ -52921,7 +53541,7 @@ Domain allowed access.
9093 </param>
9094 <infoflow type="read" weight="10"/>
9095 </interface>
9096 -<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="69143">
9097 +<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="69564">
9098 <summary>
9099 Do not audit attempts to receive radius_client packets.
9100 </summary>
9101 @@ -52932,7 +53552,7 @@ Domain allowed access.
9102 </param>
9103 <infoflow type="none"/>
9104 </interface>
9105 -<interface name="corenet_sendrecv_radius_client_packets" lineno="69162">
9106 +<interface name="corenet_sendrecv_radius_client_packets" lineno="69583">
9107 <summary>
9108 Send and receive radius_client packets.
9109 </summary>
9110 @@ -52943,7 +53563,7 @@ Domain allowed access.
9111 </param>
9112 <infoflow type="both" weight="10"/>
9113 </interface>
9114 -<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="69178">
9115 +<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="69599">
9116 <summary>
9117 Do not audit attempts to send and receive radius_client packets.
9118 </summary>
9119 @@ -52954,7 +53574,7 @@ Domain to not audit.
9120 </param>
9121 <infoflow type="none"/>
9122 </interface>
9123 -<interface name="corenet_relabelto_radius_client_packets" lineno="69193">
9124 +<interface name="corenet_relabelto_radius_client_packets" lineno="69614">
9125 <summary>
9126 Relabel packets to radius_client the packet type.
9127 </summary>
9128 @@ -52964,7 +53584,7 @@ Domain allowed access.
9129 </summary>
9130 </param>
9131 </interface>
9132 -<interface name="corenet_send_radius_server_packets" lineno="69213">
9133 +<interface name="corenet_send_radius_server_packets" lineno="69634">
9134 <summary>
9135 Send radius_server packets.
9136 </summary>
9137 @@ -52975,7 +53595,7 @@ Domain allowed access.
9138 </param>
9139 <infoflow type="write" weight="10"/>
9140 </interface>
9141 -<interface name="corenet_dontaudit_send_radius_server_packets" lineno="69232">
9142 +<interface name="corenet_dontaudit_send_radius_server_packets" lineno="69653">
9143 <summary>
9144 Do not audit attempts to send radius_server packets.
9145 </summary>
9146 @@ -52986,7 +53606,7 @@ Domain to not audit.
9147 </param>
9148 <infoflow type="none"/>
9149 </interface>
9150 -<interface name="corenet_receive_radius_server_packets" lineno="69251">
9151 +<interface name="corenet_receive_radius_server_packets" lineno="69672">
9152 <summary>
9153 Receive radius_server packets.
9154 </summary>
9155 @@ -52997,7 +53617,7 @@ Domain allowed access.
9156 </param>
9157 <infoflow type="read" weight="10"/>
9158 </interface>
9159 -<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="69270">
9160 +<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="69691">
9161 <summary>
9162 Do not audit attempts to receive radius_server packets.
9163 </summary>
9164 @@ -53008,7 +53628,7 @@ Domain allowed access.
9165 </param>
9166 <infoflow type="none"/>
9167 </interface>
9168 -<interface name="corenet_sendrecv_radius_server_packets" lineno="69289">
9169 +<interface name="corenet_sendrecv_radius_server_packets" lineno="69710">
9170 <summary>
9171 Send and receive radius_server packets.
9172 </summary>
9173 @@ -53019,7 +53639,7 @@ Domain allowed access.
9174 </param>
9175 <infoflow type="both" weight="10"/>
9176 </interface>
9177 -<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="69305">
9178 +<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="69726">
9179 <summary>
9180 Do not audit attempts to send and receive radius_server packets.
9181 </summary>
9182 @@ -53030,7 +53650,7 @@ Domain to not audit.
9183 </param>
9184 <infoflow type="none"/>
9185 </interface>
9186 -<interface name="corenet_relabelto_radius_server_packets" lineno="69320">
9187 +<interface name="corenet_relabelto_radius_server_packets" lineno="69741">
9188 <summary>
9189 Relabel packets to radius_server the packet type.
9190 </summary>
9191 @@ -53040,7 +53660,7 @@ Domain allowed access.
9192 </summary>
9193 </param>
9194 </interface>
9195 -<interface name="corenet_tcp_sendrecv_radsec_port" lineno="69342">
9196 +<interface name="corenet_tcp_sendrecv_radsec_port" lineno="69763">
9197 <summary>
9198 Send and receive TCP traffic on the radsec port.
9199 </summary>
9200 @@ -53051,7 +53671,7 @@ Domain allowed access.
9201 </param>
9202 <infoflow type="both" weight="10"/>
9203 </interface>
9204 -<interface name="corenet_udp_send_radsec_port" lineno="69357">
9205 +<interface name="corenet_udp_send_radsec_port" lineno="69778">
9206 <summary>
9207 Send UDP traffic on the radsec port.
9208 </summary>
9209 @@ -53062,7 +53682,7 @@ Domain allowed access.
9210 </param>
9211 <infoflow type="write" weight="10"/>
9212 </interface>
9213 -<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="69372">
9214 +<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="69793">
9215 <summary>
9216 Do not audit attempts to send UDP traffic on the radsec port.
9217 </summary>
9218 @@ -53073,7 +53693,7 @@ Domain to not audit.
9219 </param>
9220 <infoflow type="none"/>
9221 </interface>
9222 -<interface name="corenet_udp_receive_radsec_port" lineno="69387">
9223 +<interface name="corenet_udp_receive_radsec_port" lineno="69808">
9224 <summary>
9225 Receive UDP traffic on the radsec port.
9226 </summary>
9227 @@ -53084,7 +53704,7 @@ Domain allowed access.
9228 </param>
9229 <infoflow type="read" weight="10"/>
9230 </interface>
9231 -<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="69402">
9232 +<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="69823">
9233 <summary>
9234 Do not audit attempts to receive UDP traffic on the radsec port.
9235 </summary>
9236 @@ -53095,7 +53715,7 @@ Domain to not audit.
9237 </param>
9238 <infoflow type="none"/>
9239 </interface>
9240 -<interface name="corenet_udp_sendrecv_radsec_port" lineno="69417">
9241 +<interface name="corenet_udp_sendrecv_radsec_port" lineno="69838">
9242 <summary>
9243 Send and receive UDP traffic on the radsec port.
9244 </summary>
9245 @@ -53106,7 +53726,7 @@ Domain allowed access.
9246 </param>
9247 <infoflow type="both" weight="10"/>
9248 </interface>
9249 -<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="69433">
9250 +<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="69854">
9251 <summary>
9252 Do not audit attempts to send and receive
9253 UDP traffic on the radsec port.
9254 @@ -53118,7 +53738,7 @@ Domain to not audit.
9255 </param>
9256 <infoflow type="none"/>
9257 </interface>
9258 -<interface name="corenet_tcp_bind_radsec_port" lineno="69448">
9259 +<interface name="corenet_tcp_bind_radsec_port" lineno="69869">
9260 <summary>
9261 Bind TCP sockets to the radsec port.
9262 </summary>
9263 @@ -53129,7 +53749,7 @@ Domain allowed access.
9264 </param>
9265 <infoflow type="none"/>
9266 </interface>
9267 -<interface name="corenet_udp_bind_radsec_port" lineno="69468">
9268 +<interface name="corenet_udp_bind_radsec_port" lineno="69889">
9269 <summary>
9270 Bind UDP sockets to the radsec port.
9271 </summary>
9272 @@ -53140,7 +53760,7 @@ Domain allowed access.
9273 </param>
9274 <infoflow type="none"/>
9275 </interface>
9276 -<interface name="corenet_tcp_connect_radsec_port" lineno="69487">
9277 +<interface name="corenet_tcp_connect_radsec_port" lineno="69908">
9278 <summary>
9279 Make a TCP connection to the radsec port.
9280 </summary>
9281 @@ -53150,7 +53770,7 @@ Domain allowed access.
9282 </summary>
9283 </param>
9284 </interface>
9285 -<interface name="corenet_send_radsec_client_packets" lineno="69507">
9286 +<interface name="corenet_send_radsec_client_packets" lineno="69928">
9287 <summary>
9288 Send radsec_client packets.
9289 </summary>
9290 @@ -53161,7 +53781,7 @@ Domain allowed access.
9291 </param>
9292 <infoflow type="write" weight="10"/>
9293 </interface>
9294 -<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="69526">
9295 +<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="69947">
9296 <summary>
9297 Do not audit attempts to send radsec_client packets.
9298 </summary>
9299 @@ -53172,7 +53792,7 @@ Domain to not audit.
9300 </param>
9301 <infoflow type="none"/>
9302 </interface>
9303 -<interface name="corenet_receive_radsec_client_packets" lineno="69545">
9304 +<interface name="corenet_receive_radsec_client_packets" lineno="69966">
9305 <summary>
9306 Receive radsec_client packets.
9307 </summary>
9308 @@ -53183,7 +53803,7 @@ Domain allowed access.
9309 </param>
9310 <infoflow type="read" weight="10"/>
9311 </interface>
9312 -<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="69564">
9313 +<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="69985">
9314 <summary>
9315 Do not audit attempts to receive radsec_client packets.
9316 </summary>
9317 @@ -53194,7 +53814,7 @@ Domain allowed access.
9318 </param>
9319 <infoflow type="none"/>
9320 </interface>
9321 -<interface name="corenet_sendrecv_radsec_client_packets" lineno="69583">
9322 +<interface name="corenet_sendrecv_radsec_client_packets" lineno="70004">
9323 <summary>
9324 Send and receive radsec_client packets.
9325 </summary>
9326 @@ -53205,7 +53825,7 @@ Domain allowed access.
9327 </param>
9328 <infoflow type="both" weight="10"/>
9329 </interface>
9330 -<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="69599">
9331 +<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="70020">
9332 <summary>
9333 Do not audit attempts to send and receive radsec_client packets.
9334 </summary>
9335 @@ -53216,7 +53836,7 @@ Domain to not audit.
9336 </param>
9337 <infoflow type="none"/>
9338 </interface>
9339 -<interface name="corenet_relabelto_radsec_client_packets" lineno="69614">
9340 +<interface name="corenet_relabelto_radsec_client_packets" lineno="70035">
9341 <summary>
9342 Relabel packets to radsec_client the packet type.
9343 </summary>
9344 @@ -53226,7 +53846,7 @@ Domain allowed access.
9345 </summary>
9346 </param>
9347 </interface>
9348 -<interface name="corenet_send_radsec_server_packets" lineno="69634">
9349 +<interface name="corenet_send_radsec_server_packets" lineno="70055">
9350 <summary>
9351 Send radsec_server packets.
9352 </summary>
9353 @@ -53237,7 +53857,7 @@ Domain allowed access.
9354 </param>
9355 <infoflow type="write" weight="10"/>
9356 </interface>
9357 -<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="69653">
9358 +<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="70074">
9359 <summary>
9360 Do not audit attempts to send radsec_server packets.
9361 </summary>
9362 @@ -53248,7 +53868,7 @@ Domain to not audit.
9363 </param>
9364 <infoflow type="none"/>
9365 </interface>
9366 -<interface name="corenet_receive_radsec_server_packets" lineno="69672">
9367 +<interface name="corenet_receive_radsec_server_packets" lineno="70093">
9368 <summary>
9369 Receive radsec_server packets.
9370 </summary>
9371 @@ -53259,7 +53879,7 @@ Domain allowed access.
9372 </param>
9373 <infoflow type="read" weight="10"/>
9374 </interface>
9375 -<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="69691">
9376 +<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="70112">
9377 <summary>
9378 Do not audit attempts to receive radsec_server packets.
9379 </summary>
9380 @@ -53270,7 +53890,7 @@ Domain allowed access.
9381 </param>
9382 <infoflow type="none"/>
9383 </interface>
9384 -<interface name="corenet_sendrecv_radsec_server_packets" lineno="69710">
9385 +<interface name="corenet_sendrecv_radsec_server_packets" lineno="70131">
9386 <summary>
9387 Send and receive radsec_server packets.
9388 </summary>
9389 @@ -53281,7 +53901,7 @@ Domain allowed access.
9390 </param>
9391 <infoflow type="both" weight="10"/>
9392 </interface>
9393 -<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="69726">
9394 +<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="70147">
9395 <summary>
9396 Do not audit attempts to send and receive radsec_server packets.
9397 </summary>
9398 @@ -53292,7 +53912,7 @@ Domain to not audit.
9399 </param>
9400 <infoflow type="none"/>
9401 </interface>
9402 -<interface name="corenet_relabelto_radsec_server_packets" lineno="69741">
9403 +<interface name="corenet_relabelto_radsec_server_packets" lineno="70162">
9404 <summary>
9405 Relabel packets to radsec_server the packet type.
9406 </summary>
9407 @@ -53302,7 +53922,7 @@ Domain allowed access.
9408 </summary>
9409 </param>
9410 </interface>
9411 -<interface name="corenet_tcp_sendrecv_razor_port" lineno="69763">
9412 +<interface name="corenet_tcp_sendrecv_razor_port" lineno="70184">
9413 <summary>
9414 Send and receive TCP traffic on the razor port.
9415 </summary>
9416 @@ -53313,7 +53933,7 @@ Domain allowed access.
9417 </param>
9418 <infoflow type="both" weight="10"/>
9419 </interface>
9420 -<interface name="corenet_udp_send_razor_port" lineno="69778">
9421 +<interface name="corenet_udp_send_razor_port" lineno="70199">
9422 <summary>
9423 Send UDP traffic on the razor port.
9424 </summary>
9425 @@ -53324,7 +53944,7 @@ Domain allowed access.
9426 </param>
9427 <infoflow type="write" weight="10"/>
9428 </interface>
9429 -<interface name="corenet_dontaudit_udp_send_razor_port" lineno="69793">
9430 +<interface name="corenet_dontaudit_udp_send_razor_port" lineno="70214">
9431 <summary>
9432 Do not audit attempts to send UDP traffic on the razor port.
9433 </summary>
9434 @@ -53335,7 +53955,7 @@ Domain to not audit.
9435 </param>
9436 <infoflow type="none"/>
9437 </interface>
9438 -<interface name="corenet_udp_receive_razor_port" lineno="69808">
9439 +<interface name="corenet_udp_receive_razor_port" lineno="70229">
9440 <summary>
9441 Receive UDP traffic on the razor port.
9442 </summary>
9443 @@ -53346,7 +53966,7 @@ Domain allowed access.
9444 </param>
9445 <infoflow type="read" weight="10"/>
9446 </interface>
9447 -<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="69823">
9448 +<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="70244">
9449 <summary>
9450 Do not audit attempts to receive UDP traffic on the razor port.
9451 </summary>
9452 @@ -53357,7 +53977,7 @@ Domain to not audit.
9453 </param>
9454 <infoflow type="none"/>
9455 </interface>
9456 -<interface name="corenet_udp_sendrecv_razor_port" lineno="69838">
9457 +<interface name="corenet_udp_sendrecv_razor_port" lineno="70259">
9458 <summary>
9459 Send and receive UDP traffic on the razor port.
9460 </summary>
9461 @@ -53368,7 +53988,7 @@ Domain allowed access.
9462 </param>
9463 <infoflow type="both" weight="10"/>
9464 </interface>
9465 -<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="69854">
9466 +<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="70275">
9467 <summary>
9468 Do not audit attempts to send and receive
9469 UDP traffic on the razor port.
9470 @@ -53380,7 +54000,7 @@ Domain to not audit.
9471 </param>
9472 <infoflow type="none"/>
9473 </interface>
9474 -<interface name="corenet_tcp_bind_razor_port" lineno="69869">
9475 +<interface name="corenet_tcp_bind_razor_port" lineno="70290">
9476 <summary>
9477 Bind TCP sockets to the razor port.
9478 </summary>
9479 @@ -53391,7 +54011,7 @@ Domain allowed access.
9480 </param>
9481 <infoflow type="none"/>
9482 </interface>
9483 -<interface name="corenet_udp_bind_razor_port" lineno="69889">
9484 +<interface name="corenet_udp_bind_razor_port" lineno="70310">
9485 <summary>
9486 Bind UDP sockets to the razor port.
9487 </summary>
9488 @@ -53402,7 +54022,7 @@ Domain allowed access.
9489 </param>
9490 <infoflow type="none"/>
9491 </interface>
9492 -<interface name="corenet_tcp_connect_razor_port" lineno="69908">
9493 +<interface name="corenet_tcp_connect_razor_port" lineno="70329">
9494 <summary>
9495 Make a TCP connection to the razor port.
9496 </summary>
9497 @@ -53412,7 +54032,7 @@ Domain allowed access.
9498 </summary>
9499 </param>
9500 </interface>
9501 -<interface name="corenet_send_razor_client_packets" lineno="69928">
9502 +<interface name="corenet_send_razor_client_packets" lineno="70349">
9503 <summary>
9504 Send razor_client packets.
9505 </summary>
9506 @@ -53423,7 +54043,7 @@ Domain allowed access.
9507 </param>
9508 <infoflow type="write" weight="10"/>
9509 </interface>
9510 -<interface name="corenet_dontaudit_send_razor_client_packets" lineno="69947">
9511 +<interface name="corenet_dontaudit_send_razor_client_packets" lineno="70368">
9512 <summary>
9513 Do not audit attempts to send razor_client packets.
9514 </summary>
9515 @@ -53434,7 +54054,7 @@ Domain to not audit.
9516 </param>
9517 <infoflow type="none"/>
9518 </interface>
9519 -<interface name="corenet_receive_razor_client_packets" lineno="69966">
9520 +<interface name="corenet_receive_razor_client_packets" lineno="70387">
9521 <summary>
9522 Receive razor_client packets.
9523 </summary>
9524 @@ -53445,7 +54065,7 @@ Domain allowed access.
9525 </param>
9526 <infoflow type="read" weight="10"/>
9527 </interface>
9528 -<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="69985">
9529 +<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="70406">
9530 <summary>
9531 Do not audit attempts to receive razor_client packets.
9532 </summary>
9533 @@ -53456,7 +54076,7 @@ Domain allowed access.
9534 </param>
9535 <infoflow type="none"/>
9536 </interface>
9537 -<interface name="corenet_sendrecv_razor_client_packets" lineno="70004">
9538 +<interface name="corenet_sendrecv_razor_client_packets" lineno="70425">
9539 <summary>
9540 Send and receive razor_client packets.
9541 </summary>
9542 @@ -53467,7 +54087,7 @@ Domain allowed access.
9543 </param>
9544 <infoflow type="both" weight="10"/>
9545 </interface>
9546 -<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="70020">
9547 +<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="70441">
9548 <summary>
9549 Do not audit attempts to send and receive razor_client packets.
9550 </summary>
9551 @@ -53478,7 +54098,7 @@ Domain to not audit.
9552 </param>
9553 <infoflow type="none"/>
9554 </interface>
9555 -<interface name="corenet_relabelto_razor_client_packets" lineno="70035">
9556 +<interface name="corenet_relabelto_razor_client_packets" lineno="70456">
9557 <summary>
9558 Relabel packets to razor_client the packet type.
9559 </summary>
9560 @@ -53488,7 +54108,7 @@ Domain allowed access.
9561 </summary>
9562 </param>
9563 </interface>
9564 -<interface name="corenet_send_razor_server_packets" lineno="70055">
9565 +<interface name="corenet_send_razor_server_packets" lineno="70476">
9566 <summary>
9567 Send razor_server packets.
9568 </summary>
9569 @@ -53499,7 +54119,7 @@ Domain allowed access.
9570 </param>
9571 <infoflow type="write" weight="10"/>
9572 </interface>
9573 -<interface name="corenet_dontaudit_send_razor_server_packets" lineno="70074">
9574 +<interface name="corenet_dontaudit_send_razor_server_packets" lineno="70495">
9575 <summary>
9576 Do not audit attempts to send razor_server packets.
9577 </summary>
9578 @@ -53510,7 +54130,7 @@ Domain to not audit.
9579 </param>
9580 <infoflow type="none"/>
9581 </interface>
9582 -<interface name="corenet_receive_razor_server_packets" lineno="70093">
9583 +<interface name="corenet_receive_razor_server_packets" lineno="70514">
9584 <summary>
9585 Receive razor_server packets.
9586 </summary>
9587 @@ -53521,7 +54141,7 @@ Domain allowed access.
9588 </param>
9589 <infoflow type="read" weight="10"/>
9590 </interface>
9591 -<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="70112">
9592 +<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="70533">
9593 <summary>
9594 Do not audit attempts to receive razor_server packets.
9595 </summary>
9596 @@ -53532,7 +54152,7 @@ Domain allowed access.
9597 </param>
9598 <infoflow type="none"/>
9599 </interface>
9600 -<interface name="corenet_sendrecv_razor_server_packets" lineno="70131">
9601 +<interface name="corenet_sendrecv_razor_server_packets" lineno="70552">
9602 <summary>
9603 Send and receive razor_server packets.
9604 </summary>
9605 @@ -53543,7 +54163,7 @@ Domain allowed access.
9606 </param>
9607 <infoflow type="both" weight="10"/>
9608 </interface>
9609 -<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="70147">
9610 +<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="70568">
9611 <summary>
9612 Do not audit attempts to send and receive razor_server packets.
9613 </summary>
9614 @@ -53554,7 +54174,7 @@ Domain to not audit.
9615 </param>
9616 <infoflow type="none"/>
9617 </interface>
9618 -<interface name="corenet_relabelto_razor_server_packets" lineno="70162">
9619 +<interface name="corenet_relabelto_razor_server_packets" lineno="70583">
9620 <summary>
9621 Relabel packets to razor_server the packet type.
9622 </summary>
9623 @@ -53564,7 +54184,7 @@ Domain allowed access.
9624 </summary>
9625 </param>
9626 </interface>
9627 -<interface name="corenet_tcp_sendrecv_redis_port" lineno="70184">
9628 +<interface name="corenet_tcp_sendrecv_redis_port" lineno="70605">
9629 <summary>
9630 Send and receive TCP traffic on the redis port.
9631 </summary>
9632 @@ -53575,7 +54195,7 @@ Domain allowed access.
9633 </param>
9634 <infoflow type="both" weight="10"/>
9635 </interface>
9636 -<interface name="corenet_udp_send_redis_port" lineno="70199">
9637 +<interface name="corenet_udp_send_redis_port" lineno="70620">
9638 <summary>
9639 Send UDP traffic on the redis port.
9640 </summary>
9641 @@ -53586,7 +54206,7 @@ Domain allowed access.
9642 </param>
9643 <infoflow type="write" weight="10"/>
9644 </interface>
9645 -<interface name="corenet_dontaudit_udp_send_redis_port" lineno="70214">
9646 +<interface name="corenet_dontaudit_udp_send_redis_port" lineno="70635">
9647 <summary>
9648 Do not audit attempts to send UDP traffic on the redis port.
9649 </summary>
9650 @@ -53597,7 +54217,7 @@ Domain to not audit.
9651 </param>
9652 <infoflow type="none"/>
9653 </interface>
9654 -<interface name="corenet_udp_receive_redis_port" lineno="70229">
9655 +<interface name="corenet_udp_receive_redis_port" lineno="70650">
9656 <summary>
9657 Receive UDP traffic on the redis port.
9658 </summary>
9659 @@ -53608,7 +54228,7 @@ Domain allowed access.
9660 </param>
9661 <infoflow type="read" weight="10"/>
9662 </interface>
9663 -<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="70244">
9664 +<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="70665">
9665 <summary>
9666 Do not audit attempts to receive UDP traffic on the redis port.
9667 </summary>
9668 @@ -53619,7 +54239,7 @@ Domain to not audit.
9669 </param>
9670 <infoflow type="none"/>
9671 </interface>
9672 -<interface name="corenet_udp_sendrecv_redis_port" lineno="70259">
9673 +<interface name="corenet_udp_sendrecv_redis_port" lineno="70680">
9674 <summary>
9675 Send and receive UDP traffic on the redis port.
9676 </summary>
9677 @@ -53630,7 +54250,7 @@ Domain allowed access.
9678 </param>
9679 <infoflow type="both" weight="10"/>
9680 </interface>
9681 -<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="70275">
9682 +<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="70696">
9683 <summary>
9684 Do not audit attempts to send and receive
9685 UDP traffic on the redis port.
9686 @@ -53642,7 +54262,7 @@ Domain to not audit.
9687 </param>
9688 <infoflow type="none"/>
9689 </interface>
9690 -<interface name="corenet_tcp_bind_redis_port" lineno="70290">
9691 +<interface name="corenet_tcp_bind_redis_port" lineno="70711">
9692 <summary>
9693 Bind TCP sockets to the redis port.
9694 </summary>
9695 @@ -53653,7 +54273,7 @@ Domain allowed access.
9696 </param>
9697 <infoflow type="none"/>
9698 </interface>
9699 -<interface name="corenet_udp_bind_redis_port" lineno="70310">
9700 +<interface name="corenet_udp_bind_redis_port" lineno="70731">
9701 <summary>
9702 Bind UDP sockets to the redis port.
9703 </summary>
9704 @@ -53664,7 +54284,7 @@ Domain allowed access.
9705 </param>
9706 <infoflow type="none"/>
9707 </interface>
9708 -<interface name="corenet_tcp_connect_redis_port" lineno="70329">
9709 +<interface name="corenet_tcp_connect_redis_port" lineno="70750">
9710 <summary>
9711 Make a TCP connection to the redis port.
9712 </summary>
9713 @@ -53674,7 +54294,7 @@ Domain allowed access.
9714 </summary>
9715 </param>
9716 </interface>
9717 -<interface name="corenet_send_redis_client_packets" lineno="70349">
9718 +<interface name="corenet_send_redis_client_packets" lineno="70770">
9719 <summary>
9720 Send redis_client packets.
9721 </summary>
9722 @@ -53685,7 +54305,7 @@ Domain allowed access.
9723 </param>
9724 <infoflow type="write" weight="10"/>
9725 </interface>
9726 -<interface name="corenet_dontaudit_send_redis_client_packets" lineno="70368">
9727 +<interface name="corenet_dontaudit_send_redis_client_packets" lineno="70789">
9728 <summary>
9729 Do not audit attempts to send redis_client packets.
9730 </summary>
9731 @@ -53696,7 +54316,7 @@ Domain to not audit.
9732 </param>
9733 <infoflow type="none"/>
9734 </interface>
9735 -<interface name="corenet_receive_redis_client_packets" lineno="70387">
9736 +<interface name="corenet_receive_redis_client_packets" lineno="70808">
9737 <summary>
9738 Receive redis_client packets.
9739 </summary>
9740 @@ -53707,7 +54327,7 @@ Domain allowed access.
9741 </param>
9742 <infoflow type="read" weight="10"/>
9743 </interface>
9744 -<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="70406">
9745 +<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="70827">
9746 <summary>
9747 Do not audit attempts to receive redis_client packets.
9748 </summary>
9749 @@ -53718,7 +54338,7 @@ Domain allowed access.
9750 </param>
9751 <infoflow type="none"/>
9752 </interface>
9753 -<interface name="corenet_sendrecv_redis_client_packets" lineno="70425">
9754 +<interface name="corenet_sendrecv_redis_client_packets" lineno="70846">
9755 <summary>
9756 Send and receive redis_client packets.
9757 </summary>
9758 @@ -53729,7 +54349,7 @@ Domain allowed access.
9759 </param>
9760 <infoflow type="both" weight="10"/>
9761 </interface>
9762 -<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="70441">
9763 +<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="70862">
9764 <summary>
9765 Do not audit attempts to send and receive redis_client packets.
9766 </summary>
9767 @@ -53740,7 +54360,7 @@ Domain to not audit.
9768 </param>
9769 <infoflow type="none"/>
9770 </interface>
9771 -<interface name="corenet_relabelto_redis_client_packets" lineno="70456">
9772 +<interface name="corenet_relabelto_redis_client_packets" lineno="70877">
9773 <summary>
9774 Relabel packets to redis_client the packet type.
9775 </summary>
9776 @@ -53750,7 +54370,7 @@ Domain allowed access.
9777 </summary>
9778 </param>
9779 </interface>
9780 -<interface name="corenet_send_redis_server_packets" lineno="70476">
9781 +<interface name="corenet_send_redis_server_packets" lineno="70897">
9782 <summary>
9783 Send redis_server packets.
9784 </summary>
9785 @@ -53761,7 +54381,7 @@ Domain allowed access.
9786 </param>
9787 <infoflow type="write" weight="10"/>
9788 </interface>
9789 -<interface name="corenet_dontaudit_send_redis_server_packets" lineno="70495">
9790 +<interface name="corenet_dontaudit_send_redis_server_packets" lineno="70916">
9791 <summary>
9792 Do not audit attempts to send redis_server packets.
9793 </summary>
9794 @@ -53772,7 +54392,7 @@ Domain to not audit.
9795 </param>
9796 <infoflow type="none"/>
9797 </interface>
9798 -<interface name="corenet_receive_redis_server_packets" lineno="70514">
9799 +<interface name="corenet_receive_redis_server_packets" lineno="70935">
9800 <summary>
9801 Receive redis_server packets.
9802 </summary>
9803 @@ -53783,7 +54403,7 @@ Domain allowed access.
9804 </param>
9805 <infoflow type="read" weight="10"/>
9806 </interface>
9807 -<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="70533">
9808 +<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="70954">
9809 <summary>
9810 Do not audit attempts to receive redis_server packets.
9811 </summary>
9812 @@ -53794,7 +54414,7 @@ Domain allowed access.
9813 </param>
9814 <infoflow type="none"/>
9815 </interface>
9816 -<interface name="corenet_sendrecv_redis_server_packets" lineno="70552">
9817 +<interface name="corenet_sendrecv_redis_server_packets" lineno="70973">
9818 <summary>
9819 Send and receive redis_server packets.
9820 </summary>
9821 @@ -53805,7 +54425,7 @@ Domain allowed access.
9822 </param>
9823 <infoflow type="both" weight="10"/>
9824 </interface>
9825 -<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="70568">
9826 +<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="70989">
9827 <summary>
9828 Do not audit attempts to send and receive redis_server packets.
9829 </summary>
9830 @@ -53816,7 +54436,7 @@ Domain to not audit.
9831 </param>
9832 <infoflow type="none"/>
9833 </interface>
9834 -<interface name="corenet_relabelto_redis_server_packets" lineno="70583">
9835 +<interface name="corenet_relabelto_redis_server_packets" lineno="71004">
9836 <summary>
9837 Relabel packets to redis_server the packet type.
9838 </summary>
9839 @@ -53826,7 +54446,7 @@ Domain allowed access.
9840 </summary>
9841 </param>
9842 </interface>
9843 -<interface name="corenet_tcp_sendrecv_repository_port" lineno="70605">
9844 +<interface name="corenet_tcp_sendrecv_repository_port" lineno="71026">
9845 <summary>
9846 Send and receive TCP traffic on the repository port.
9847 </summary>
9848 @@ -53837,7 +54457,7 @@ Domain allowed access.
9849 </param>
9850 <infoflow type="both" weight="10"/>
9851 </interface>
9852 -<interface name="corenet_udp_send_repository_port" lineno="70620">
9853 +<interface name="corenet_udp_send_repository_port" lineno="71041">
9854 <summary>
9855 Send UDP traffic on the repository port.
9856 </summary>
9857 @@ -53848,7 +54468,7 @@ Domain allowed access.
9858 </param>
9859 <infoflow type="write" weight="10"/>
9860 </interface>
9861 -<interface name="corenet_dontaudit_udp_send_repository_port" lineno="70635">
9862 +<interface name="corenet_dontaudit_udp_send_repository_port" lineno="71056">
9863 <summary>
9864 Do not audit attempts to send UDP traffic on the repository port.
9865 </summary>
9866 @@ -53859,7 +54479,7 @@ Domain to not audit.
9867 </param>
9868 <infoflow type="none"/>
9869 </interface>
9870 -<interface name="corenet_udp_receive_repository_port" lineno="70650">
9871 +<interface name="corenet_udp_receive_repository_port" lineno="71071">
9872 <summary>
9873 Receive UDP traffic on the repository port.
9874 </summary>
9875 @@ -53870,7 +54490,7 @@ Domain allowed access.
9876 </param>
9877 <infoflow type="read" weight="10"/>
9878 </interface>
9879 -<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="70665">
9880 +<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="71086">
9881 <summary>
9882 Do not audit attempts to receive UDP traffic on the repository port.
9883 </summary>
9884 @@ -53881,7 +54501,7 @@ Domain to not audit.
9885 </param>
9886 <infoflow type="none"/>
9887 </interface>
9888 -<interface name="corenet_udp_sendrecv_repository_port" lineno="70680">
9889 +<interface name="corenet_udp_sendrecv_repository_port" lineno="71101">
9890 <summary>
9891 Send and receive UDP traffic on the repository port.
9892 </summary>
9893 @@ -53892,7 +54512,7 @@ Domain allowed access.
9894 </param>
9895 <infoflow type="both" weight="10"/>
9896 </interface>
9897 -<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="70696">
9898 +<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="71117">
9899 <summary>
9900 Do not audit attempts to send and receive
9901 UDP traffic on the repository port.
9902 @@ -53904,7 +54524,7 @@ Domain to not audit.
9903 </param>
9904 <infoflow type="none"/>
9905 </interface>
9906 -<interface name="corenet_tcp_bind_repository_port" lineno="70711">
9907 +<interface name="corenet_tcp_bind_repository_port" lineno="71132">
9908 <summary>
9909 Bind TCP sockets to the repository port.
9910 </summary>
9911 @@ -53915,7 +54535,7 @@ Domain allowed access.
9912 </param>
9913 <infoflow type="none"/>
9914 </interface>
9915 -<interface name="corenet_udp_bind_repository_port" lineno="70731">
9916 +<interface name="corenet_udp_bind_repository_port" lineno="71152">
9917 <summary>
9918 Bind UDP sockets to the repository port.
9919 </summary>
9920 @@ -53926,7 +54546,7 @@ Domain allowed access.
9921 </param>
9922 <infoflow type="none"/>
9923 </interface>
9924 -<interface name="corenet_tcp_connect_repository_port" lineno="70750">
9925 +<interface name="corenet_tcp_connect_repository_port" lineno="71171">
9926 <summary>
9927 Make a TCP connection to the repository port.
9928 </summary>
9929 @@ -53936,7 +54556,7 @@ Domain allowed access.
9930 </summary>
9931 </param>
9932 </interface>
9933 -<interface name="corenet_send_repository_client_packets" lineno="70770">
9934 +<interface name="corenet_send_repository_client_packets" lineno="71191">
9935 <summary>
9936 Send repository_client packets.
9937 </summary>
9938 @@ -53947,7 +54567,7 @@ Domain allowed access.
9939 </param>
9940 <infoflow type="write" weight="10"/>
9941 </interface>
9942 -<interface name="corenet_dontaudit_send_repository_client_packets" lineno="70789">
9943 +<interface name="corenet_dontaudit_send_repository_client_packets" lineno="71210">
9944 <summary>
9945 Do not audit attempts to send repository_client packets.
9946 </summary>
9947 @@ -53958,7 +54578,7 @@ Domain to not audit.
9948 </param>
9949 <infoflow type="none"/>
9950 </interface>
9951 -<interface name="corenet_receive_repository_client_packets" lineno="70808">
9952 +<interface name="corenet_receive_repository_client_packets" lineno="71229">
9953 <summary>
9954 Receive repository_client packets.
9955 </summary>
9956 @@ -53969,7 +54589,7 @@ Domain allowed access.
9957 </param>
9958 <infoflow type="read" weight="10"/>
9959 </interface>
9960 -<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="70827">
9961 +<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="71248">
9962 <summary>
9963 Do not audit attempts to receive repository_client packets.
9964 </summary>
9965 @@ -53980,7 +54600,7 @@ Domain allowed access.
9966 </param>
9967 <infoflow type="none"/>
9968 </interface>
9969 -<interface name="corenet_sendrecv_repository_client_packets" lineno="70846">
9970 +<interface name="corenet_sendrecv_repository_client_packets" lineno="71267">
9971 <summary>
9972 Send and receive repository_client packets.
9973 </summary>
9974 @@ -53991,7 +54611,7 @@ Domain allowed access.
9975 </param>
9976 <infoflow type="both" weight="10"/>
9977 </interface>
9978 -<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="70862">
9979 +<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="71283">
9980 <summary>
9981 Do not audit attempts to send and receive repository_client packets.
9982 </summary>
9983 @@ -54002,7 +54622,7 @@ Domain to not audit.
9984 </param>
9985 <infoflow type="none"/>
9986 </interface>
9987 -<interface name="corenet_relabelto_repository_client_packets" lineno="70877">
9988 +<interface name="corenet_relabelto_repository_client_packets" lineno="71298">
9989 <summary>
9990 Relabel packets to repository_client the packet type.
9991 </summary>
9992 @@ -54012,7 +54632,7 @@ Domain allowed access.
9993 </summary>
9994 </param>
9995 </interface>
9996 -<interface name="corenet_send_repository_server_packets" lineno="70897">
9997 +<interface name="corenet_send_repository_server_packets" lineno="71318">
9998 <summary>
9999 Send repository_server packets.
10000 </summary>
10001 @@ -54023,7 +54643,7 @@ Domain allowed access.
10002 </param>
10003 <infoflow type="write" weight="10"/>
10004 </interface>
10005 -<interface name="corenet_dontaudit_send_repository_server_packets" lineno="70916">
10006 +<interface name="corenet_dontaudit_send_repository_server_packets" lineno="71337">
10007 <summary>
10008 Do not audit attempts to send repository_server packets.
10009 </summary>
10010 @@ -54034,7 +54654,7 @@ Domain to not audit.
10011 </param>
10012 <infoflow type="none"/>
10013 </interface>
10014 -<interface name="corenet_receive_repository_server_packets" lineno="70935">
10015 +<interface name="corenet_receive_repository_server_packets" lineno="71356">
10016 <summary>
10017 Receive repository_server packets.
10018 </summary>
10019 @@ -54045,7 +54665,7 @@ Domain allowed access.
10020 </param>
10021 <infoflow type="read" weight="10"/>
10022 </interface>
10023 -<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="70954">
10024 +<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="71375">
10025 <summary>
10026 Do not audit attempts to receive repository_server packets.
10027 </summary>
10028 @@ -54056,7 +54676,7 @@ Domain allowed access.
10029 </param>
10030 <infoflow type="none"/>
10031 </interface>
10032 -<interface name="corenet_sendrecv_repository_server_packets" lineno="70973">
10033 +<interface name="corenet_sendrecv_repository_server_packets" lineno="71394">
10034 <summary>
10035 Send and receive repository_server packets.
10036 </summary>
10037 @@ -54067,7 +54687,7 @@ Domain allowed access.
10038 </param>
10039 <infoflow type="both" weight="10"/>
10040 </interface>
10041 -<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="70989">
10042 +<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="71410">
10043 <summary>
10044 Do not audit attempts to send and receive repository_server packets.
10045 </summary>
10046 @@ -54078,7 +54698,7 @@ Domain to not audit.
10047 </param>
10048 <infoflow type="none"/>
10049 </interface>
10050 -<interface name="corenet_relabelto_repository_server_packets" lineno="71004">
10051 +<interface name="corenet_relabelto_repository_server_packets" lineno="71425">
10052 <summary>
10053 Relabel packets to repository_server the packet type.
10054 </summary>
10055 @@ -54088,7 +54708,7 @@ Domain allowed access.
10056 </summary>
10057 </param>
10058 </interface>
10059 -<interface name="corenet_tcp_sendrecv_ricci_port" lineno="71026">
10060 +<interface name="corenet_tcp_sendrecv_ricci_port" lineno="71447">
10061 <summary>
10062 Send and receive TCP traffic on the ricci port.
10063 </summary>
10064 @@ -54099,7 +54719,7 @@ Domain allowed access.
10065 </param>
10066 <infoflow type="both" weight="10"/>
10067 </interface>
10068 -<interface name="corenet_udp_send_ricci_port" lineno="71041">
10069 +<interface name="corenet_udp_send_ricci_port" lineno="71462">
10070 <summary>
10071 Send UDP traffic on the ricci port.
10072 </summary>
10073 @@ -54110,7 +54730,7 @@ Domain allowed access.
10074 </param>
10075 <infoflow type="write" weight="10"/>
10076 </interface>
10077 -<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="71056">
10078 +<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="71477">
10079 <summary>
10080 Do not audit attempts to send UDP traffic on the ricci port.
10081 </summary>
10082 @@ -54121,7 +54741,7 @@ Domain to not audit.
10083 </param>
10084 <infoflow type="none"/>
10085 </interface>
10086 -<interface name="corenet_udp_receive_ricci_port" lineno="71071">
10087 +<interface name="corenet_udp_receive_ricci_port" lineno="71492">
10088 <summary>
10089 Receive UDP traffic on the ricci port.
10090 </summary>
10091 @@ -54132,7 +54752,7 @@ Domain allowed access.
10092 </param>
10093 <infoflow type="read" weight="10"/>
10094 </interface>
10095 -<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="71086">
10096 +<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="71507">
10097 <summary>
10098 Do not audit attempts to receive UDP traffic on the ricci port.
10099 </summary>
10100 @@ -54143,7 +54763,7 @@ Domain to not audit.
10101 </param>
10102 <infoflow type="none"/>
10103 </interface>
10104 -<interface name="corenet_udp_sendrecv_ricci_port" lineno="71101">
10105 +<interface name="corenet_udp_sendrecv_ricci_port" lineno="71522">
10106 <summary>
10107 Send and receive UDP traffic on the ricci port.
10108 </summary>
10109 @@ -54154,7 +54774,7 @@ Domain allowed access.
10110 </param>
10111 <infoflow type="both" weight="10"/>
10112 </interface>
10113 -<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="71117">
10114 +<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="71538">
10115 <summary>
10116 Do not audit attempts to send and receive
10117 UDP traffic on the ricci port.
10118 @@ -54166,7 +54786,7 @@ Domain to not audit.
10119 </param>
10120 <infoflow type="none"/>
10121 </interface>
10122 -<interface name="corenet_tcp_bind_ricci_port" lineno="71132">
10123 +<interface name="corenet_tcp_bind_ricci_port" lineno="71553">
10124 <summary>
10125 Bind TCP sockets to the ricci port.
10126 </summary>
10127 @@ -54177,7 +54797,7 @@ Domain allowed access.
10128 </param>
10129 <infoflow type="none"/>
10130 </interface>
10131 -<interface name="corenet_udp_bind_ricci_port" lineno="71152">
10132 +<interface name="corenet_udp_bind_ricci_port" lineno="71573">
10133 <summary>
10134 Bind UDP sockets to the ricci port.
10135 </summary>
10136 @@ -54188,7 +54808,7 @@ Domain allowed access.
10137 </param>
10138 <infoflow type="none"/>
10139 </interface>
10140 -<interface name="corenet_tcp_connect_ricci_port" lineno="71171">
10141 +<interface name="corenet_tcp_connect_ricci_port" lineno="71592">
10142 <summary>
10143 Make a TCP connection to the ricci port.
10144 </summary>
10145 @@ -54198,7 +54818,7 @@ Domain allowed access.
10146 </summary>
10147 </param>
10148 </interface>
10149 -<interface name="corenet_send_ricci_client_packets" lineno="71191">
10150 +<interface name="corenet_send_ricci_client_packets" lineno="71612">
10151 <summary>
10152 Send ricci_client packets.
10153 </summary>
10154 @@ -54209,7 +54829,7 @@ Domain allowed access.
10155 </param>
10156 <infoflow type="write" weight="10"/>
10157 </interface>
10158 -<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="71210">
10159 +<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="71631">
10160 <summary>
10161 Do not audit attempts to send ricci_client packets.
10162 </summary>
10163 @@ -54220,7 +54840,7 @@ Domain to not audit.
10164 </param>
10165 <infoflow type="none"/>
10166 </interface>
10167 -<interface name="corenet_receive_ricci_client_packets" lineno="71229">
10168 +<interface name="corenet_receive_ricci_client_packets" lineno="71650">
10169 <summary>
10170 Receive ricci_client packets.
10171 </summary>
10172 @@ -54231,7 +54851,7 @@ Domain allowed access.
10173 </param>
10174 <infoflow type="read" weight="10"/>
10175 </interface>
10176 -<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="71248">
10177 +<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="71669">
10178 <summary>
10179 Do not audit attempts to receive ricci_client packets.
10180 </summary>
10181 @@ -54242,7 +54862,7 @@ Domain allowed access.
10182 </param>
10183 <infoflow type="none"/>
10184 </interface>
10185 -<interface name="corenet_sendrecv_ricci_client_packets" lineno="71267">
10186 +<interface name="corenet_sendrecv_ricci_client_packets" lineno="71688">
10187 <summary>
10188 Send and receive ricci_client packets.
10189 </summary>
10190 @@ -54253,7 +54873,7 @@ Domain allowed access.
10191 </param>
10192 <infoflow type="both" weight="10"/>
10193 </interface>
10194 -<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="71283">
10195 +<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="71704">
10196 <summary>
10197 Do not audit attempts to send and receive ricci_client packets.
10198 </summary>
10199 @@ -54264,7 +54884,7 @@ Domain to not audit.
10200 </param>
10201 <infoflow type="none"/>
10202 </interface>
10203 -<interface name="corenet_relabelto_ricci_client_packets" lineno="71298">
10204 +<interface name="corenet_relabelto_ricci_client_packets" lineno="71719">
10205 <summary>
10206 Relabel packets to ricci_client the packet type.
10207 </summary>
10208 @@ -54274,7 +54894,7 @@ Domain allowed access.
10209 </summary>
10210 </param>
10211 </interface>
10212 -<interface name="corenet_send_ricci_server_packets" lineno="71318">
10213 +<interface name="corenet_send_ricci_server_packets" lineno="71739">
10214 <summary>
10215 Send ricci_server packets.
10216 </summary>
10217 @@ -54285,7 +54905,7 @@ Domain allowed access.
10218 </param>
10219 <infoflow type="write" weight="10"/>
10220 </interface>
10221 -<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="71337">
10222 +<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="71758">
10223 <summary>
10224 Do not audit attempts to send ricci_server packets.
10225 </summary>
10226 @@ -54296,7 +54916,7 @@ Domain to not audit.
10227 </param>
10228 <infoflow type="none"/>
10229 </interface>
10230 -<interface name="corenet_receive_ricci_server_packets" lineno="71356">
10231 +<interface name="corenet_receive_ricci_server_packets" lineno="71777">
10232 <summary>
10233 Receive ricci_server packets.
10234 </summary>
10235 @@ -54307,7 +54927,7 @@ Domain allowed access.
10236 </param>
10237 <infoflow type="read" weight="10"/>
10238 </interface>
10239 -<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="71375">
10240 +<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="71796">
10241 <summary>
10242 Do not audit attempts to receive ricci_server packets.
10243 </summary>
10244 @@ -54318,7 +54938,7 @@ Domain allowed access.
10245 </param>
10246 <infoflow type="none"/>
10247 </interface>
10248 -<interface name="corenet_sendrecv_ricci_server_packets" lineno="71394">
10249 +<interface name="corenet_sendrecv_ricci_server_packets" lineno="71815">
10250 <summary>
10251 Send and receive ricci_server packets.
10252 </summary>
10253 @@ -54329,7 +54949,7 @@ Domain allowed access.
10254 </param>
10255 <infoflow type="both" weight="10"/>
10256 </interface>
10257 -<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="71410">
10258 +<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="71831">
10259 <summary>
10260 Do not audit attempts to send and receive ricci_server packets.
10261 </summary>
10262 @@ -54340,7 +54960,7 @@ Domain to not audit.
10263 </param>
10264 <infoflow type="none"/>
10265 </interface>
10266 -<interface name="corenet_relabelto_ricci_server_packets" lineno="71425">
10267 +<interface name="corenet_relabelto_ricci_server_packets" lineno="71846">
10268 <summary>
10269 Relabel packets to ricci_server the packet type.
10270 </summary>
10271 @@ -54350,7 +54970,7 @@ Domain allowed access.
10272 </summary>
10273 </param>
10274 </interface>
10275 -<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="71447">
10276 +<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="71868">
10277 <summary>
10278 Send and receive TCP traffic on the ricci_modcluster port.
10279 </summary>
10280 @@ -54361,7 +54981,7 @@ Domain allowed access.
10281 </param>
10282 <infoflow type="both" weight="10"/>
10283 </interface>
10284 -<interface name="corenet_udp_send_ricci_modcluster_port" lineno="71462">
10285 +<interface name="corenet_udp_send_ricci_modcluster_port" lineno="71883">
10286 <summary>
10287 Send UDP traffic on the ricci_modcluster port.
10288 </summary>
10289 @@ -54372,7 +54992,7 @@ Domain allowed access.
10290 </param>
10291 <infoflow type="write" weight="10"/>
10292 </interface>
10293 -<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="71477">
10294 +<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="71898">
10295 <summary>
10296 Do not audit attempts to send UDP traffic on the ricci_modcluster port.
10297 </summary>
10298 @@ -54383,7 +55003,7 @@ Domain to not audit.
10299 </param>
10300 <infoflow type="none"/>
10301 </interface>
10302 -<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="71492">
10303 +<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="71913">
10304 <summary>
10305 Receive UDP traffic on the ricci_modcluster port.
10306 </summary>
10307 @@ -54394,7 +55014,7 @@ Domain allowed access.
10308 </param>
10309 <infoflow type="read" weight="10"/>
10310 </interface>
10311 -<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="71507">
10312 +<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="71928">
10313 <summary>
10314 Do not audit attempts to receive UDP traffic on the ricci_modcluster port.
10315 </summary>
10316 @@ -54405,7 +55025,7 @@ Domain to not audit.
10317 </param>
10318 <infoflow type="none"/>
10319 </interface>
10320 -<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="71522">
10321 +<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="71943">
10322 <summary>
10323 Send and receive UDP traffic on the ricci_modcluster port.
10324 </summary>
10325 @@ -54416,7 +55036,7 @@ Domain allowed access.
10326 </param>
10327 <infoflow type="both" weight="10"/>
10328 </interface>
10329 -<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="71538">
10330 +<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="71959">
10331 <summary>
10332 Do not audit attempts to send and receive
10333 UDP traffic on the ricci_modcluster port.
10334 @@ -54428,7 +55048,7 @@ Domain to not audit.
10335 </param>
10336 <infoflow type="none"/>
10337 </interface>
10338 -<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="71553">
10339 +<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="71974">
10340 <summary>
10341 Bind TCP sockets to the ricci_modcluster port.
10342 </summary>
10343 @@ -54439,7 +55059,7 @@ Domain allowed access.
10344 </param>
10345 <infoflow type="none"/>
10346 </interface>
10347 -<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="71573">
10348 +<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="71994">
10349 <summary>
10350 Bind UDP sockets to the ricci_modcluster port.
10351 </summary>
10352 @@ -54450,7 +55070,7 @@ Domain allowed access.
10353 </param>
10354 <infoflow type="none"/>
10355 </interface>
10356 -<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="71592">
10357 +<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="72013">
10358 <summary>
10359 Make a TCP connection to the ricci_modcluster port.
10360 </summary>
10361 @@ -54460,7 +55080,7 @@ Domain allowed access.
10362 </summary>
10363 </param>
10364 </interface>
10365 -<interface name="corenet_send_ricci_modcluster_client_packets" lineno="71612">
10366 +<interface name="corenet_send_ricci_modcluster_client_packets" lineno="72033">
10367 <summary>
10368 Send ricci_modcluster_client packets.
10369 </summary>
10370 @@ -54471,7 +55091,7 @@ Domain allowed access.
10371 </param>
10372 <infoflow type="write" weight="10"/>
10373 </interface>
10374 -<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="71631">
10375 +<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="72052">
10376 <summary>
10377 Do not audit attempts to send ricci_modcluster_client packets.
10378 </summary>
10379 @@ -54482,7 +55102,7 @@ Domain to not audit.
10380 </param>
10381 <infoflow type="none"/>
10382 </interface>
10383 -<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="71650">
10384 +<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="72071">
10385 <summary>
10386 Receive ricci_modcluster_client packets.
10387 </summary>
10388 @@ -54493,7 +55113,7 @@ Domain allowed access.
10389 </param>
10390 <infoflow type="read" weight="10"/>
10391 </interface>
10392 -<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="71669">
10393 +<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="72090">
10394 <summary>
10395 Do not audit attempts to receive ricci_modcluster_client packets.
10396 </summary>
10397 @@ -54504,7 +55124,7 @@ Domain allowed access.
10398 </param>
10399 <infoflow type="none"/>
10400 </interface>
10401 -<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="71688">
10402 +<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="72109">
10403 <summary>
10404 Send and receive ricci_modcluster_client packets.
10405 </summary>
10406 @@ -54515,7 +55135,7 @@ Domain allowed access.
10407 </param>
10408 <infoflow type="both" weight="10"/>
10409 </interface>
10410 -<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="71704">
10411 +<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="72125">
10412 <summary>
10413 Do not audit attempts to send and receive ricci_modcluster_client packets.
10414 </summary>
10415 @@ -54526,7 +55146,7 @@ Domain to not audit.
10416 </param>
10417 <infoflow type="none"/>
10418 </interface>
10419 -<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="71719">
10420 +<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="72140">
10421 <summary>
10422 Relabel packets to ricci_modcluster_client the packet type.
10423 </summary>
10424 @@ -54536,7 +55156,7 @@ Domain allowed access.
10425 </summary>
10426 </param>
10427 </interface>
10428 -<interface name="corenet_send_ricci_modcluster_server_packets" lineno="71739">
10429 +<interface name="corenet_send_ricci_modcluster_server_packets" lineno="72160">
10430 <summary>
10431 Send ricci_modcluster_server packets.
10432 </summary>
10433 @@ -54547,7 +55167,7 @@ Domain allowed access.
10434 </param>
10435 <infoflow type="write" weight="10"/>
10436 </interface>
10437 -<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="71758">
10438 +<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="72179">
10439 <summary>
10440 Do not audit attempts to send ricci_modcluster_server packets.
10441 </summary>
10442 @@ -54558,7 +55178,7 @@ Domain to not audit.
10443 </param>
10444 <infoflow type="none"/>
10445 </interface>
10446 -<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="71777">
10447 +<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="72198">
10448 <summary>
10449 Receive ricci_modcluster_server packets.
10450 </summary>
10451 @@ -54569,7 +55189,7 @@ Domain allowed access.
10452 </param>
10453 <infoflow type="read" weight="10"/>
10454 </interface>
10455 -<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="71796">
10456 +<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="72217">
10457 <summary>
10458 Do not audit attempts to receive ricci_modcluster_server packets.
10459 </summary>
10460 @@ -54580,7 +55200,7 @@ Domain allowed access.
10461 </param>
10462 <infoflow type="none"/>
10463 </interface>
10464 -<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="71815">
10465 +<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="72236">
10466 <summary>
10467 Send and receive ricci_modcluster_server packets.
10468 </summary>
10469 @@ -54591,7 +55211,7 @@ Domain allowed access.
10470 </param>
10471 <infoflow type="both" weight="10"/>
10472 </interface>
10473 -<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="71831">
10474 +<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="72252">
10475 <summary>
10476 Do not audit attempts to send and receive ricci_modcluster_server packets.
10477 </summary>
10478 @@ -54602,7 +55222,7 @@ Domain to not audit.
10479 </param>
10480 <infoflow type="none"/>
10481 </interface>
10482 -<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="71846">
10483 +<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="72267">
10484 <summary>
10485 Relabel packets to ricci_modcluster_server the packet type.
10486 </summary>
10487 @@ -54612,7 +55232,7 @@ Domain allowed access.
10488 </summary>
10489 </param>
10490 </interface>
10491 -<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="71868">
10492 +<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="72289">
10493 <summary>
10494 Send and receive TCP traffic on the rlogind port.
10495 </summary>
10496 @@ -54623,7 +55243,7 @@ Domain allowed access.
10497 </param>
10498 <infoflow type="both" weight="10"/>
10499 </interface>
10500 -<interface name="corenet_udp_send_rlogind_port" lineno="71883">
10501 +<interface name="corenet_udp_send_rlogind_port" lineno="72304">
10502 <summary>
10503 Send UDP traffic on the rlogind port.
10504 </summary>
10505 @@ -54634,7 +55254,7 @@ Domain allowed access.
10506 </param>
10507 <infoflow type="write" weight="10"/>
10508 </interface>
10509 -<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="71898">
10510 +<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="72319">
10511 <summary>
10512 Do not audit attempts to send UDP traffic on the rlogind port.
10513 </summary>
10514 @@ -54645,7 +55265,7 @@ Domain to not audit.
10515 </param>
10516 <infoflow type="none"/>
10517 </interface>
10518 -<interface name="corenet_udp_receive_rlogind_port" lineno="71913">
10519 +<interface name="corenet_udp_receive_rlogind_port" lineno="72334">
10520 <summary>
10521 Receive UDP traffic on the rlogind port.
10522 </summary>
10523 @@ -54656,7 +55276,7 @@ Domain allowed access.
10524 </param>
10525 <infoflow type="read" weight="10"/>
10526 </interface>
10527 -<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="71928">
10528 +<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="72349">
10529 <summary>
10530 Do not audit attempts to receive UDP traffic on the rlogind port.
10531 </summary>
10532 @@ -54667,7 +55287,7 @@ Domain to not audit.
10533 </param>
10534 <infoflow type="none"/>
10535 </interface>
10536 -<interface name="corenet_udp_sendrecv_rlogind_port" lineno="71943">
10537 +<interface name="corenet_udp_sendrecv_rlogind_port" lineno="72364">
10538 <summary>
10539 Send and receive UDP traffic on the rlogind port.
10540 </summary>
10541 @@ -54678,7 +55298,7 @@ Domain allowed access.
10542 </param>
10543 <infoflow type="both" weight="10"/>
10544 </interface>
10545 -<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="71959">
10546 +<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="72380">
10547 <summary>
10548 Do not audit attempts to send and receive
10549 UDP traffic on the rlogind port.
10550 @@ -54690,7 +55310,7 @@ Domain to not audit.
10551 </param>
10552 <infoflow type="none"/>
10553 </interface>
10554 -<interface name="corenet_tcp_bind_rlogind_port" lineno="71974">
10555 +<interface name="corenet_tcp_bind_rlogind_port" lineno="72395">
10556 <summary>
10557 Bind TCP sockets to the rlogind port.
10558 </summary>
10559 @@ -54701,7 +55321,7 @@ Domain allowed access.
10560 </param>
10561 <infoflow type="none"/>
10562 </interface>
10563 -<interface name="corenet_udp_bind_rlogind_port" lineno="71994">
10564 +<interface name="corenet_udp_bind_rlogind_port" lineno="72415">
10565 <summary>
10566 Bind UDP sockets to the rlogind port.
10567 </summary>
10568 @@ -54712,7 +55332,7 @@ Domain allowed access.
10569 </param>
10570 <infoflow type="none"/>
10571 </interface>
10572 -<interface name="corenet_tcp_connect_rlogind_port" lineno="72013">
10573 +<interface name="corenet_tcp_connect_rlogind_port" lineno="72434">
10574 <summary>
10575 Make a TCP connection to the rlogind port.
10576 </summary>
10577 @@ -54722,7 +55342,7 @@ Domain allowed access.
10578 </summary>
10579 </param>
10580 </interface>
10581 -<interface name="corenet_send_rlogind_client_packets" lineno="72033">
10582 +<interface name="corenet_send_rlogind_client_packets" lineno="72454">
10583 <summary>
10584 Send rlogind_client packets.
10585 </summary>
10586 @@ -54733,7 +55353,7 @@ Domain allowed access.
10587 </param>
10588 <infoflow type="write" weight="10"/>
10589 </interface>
10590 -<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="72052">
10591 +<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="72473">
10592 <summary>
10593 Do not audit attempts to send rlogind_client packets.
10594 </summary>
10595 @@ -54744,7 +55364,7 @@ Domain to not audit.
10596 </param>
10597 <infoflow type="none"/>
10598 </interface>
10599 -<interface name="corenet_receive_rlogind_client_packets" lineno="72071">
10600 +<interface name="corenet_receive_rlogind_client_packets" lineno="72492">
10601 <summary>
10602 Receive rlogind_client packets.
10603 </summary>
10604 @@ -54755,7 +55375,7 @@ Domain allowed access.
10605 </param>
10606 <infoflow type="read" weight="10"/>
10607 </interface>
10608 -<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="72090">
10609 +<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="72511">
10610 <summary>
10611 Do not audit attempts to receive rlogind_client packets.
10612 </summary>
10613 @@ -54766,7 +55386,7 @@ Domain allowed access.
10614 </param>
10615 <infoflow type="none"/>
10616 </interface>
10617 -<interface name="corenet_sendrecv_rlogind_client_packets" lineno="72109">
10618 +<interface name="corenet_sendrecv_rlogind_client_packets" lineno="72530">
10619 <summary>
10620 Send and receive rlogind_client packets.
10621 </summary>
10622 @@ -54777,7 +55397,7 @@ Domain allowed access.
10623 </param>
10624 <infoflow type="both" weight="10"/>
10625 </interface>
10626 -<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="72125">
10627 +<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="72546">
10628 <summary>
10629 Do not audit attempts to send and receive rlogind_client packets.
10630 </summary>
10631 @@ -54788,7 +55408,7 @@ Domain to not audit.
10632 </param>
10633 <infoflow type="none"/>
10634 </interface>
10635 -<interface name="corenet_relabelto_rlogind_client_packets" lineno="72140">
10636 +<interface name="corenet_relabelto_rlogind_client_packets" lineno="72561">
10637 <summary>
10638 Relabel packets to rlogind_client the packet type.
10639 </summary>
10640 @@ -54798,7 +55418,7 @@ Domain allowed access.
10641 </summary>
10642 </param>
10643 </interface>
10644 -<interface name="corenet_send_rlogind_server_packets" lineno="72160">
10645 +<interface name="corenet_send_rlogind_server_packets" lineno="72581">
10646 <summary>
10647 Send rlogind_server packets.
10648 </summary>
10649 @@ -54809,7 +55429,7 @@ Domain allowed access.
10650 </param>
10651 <infoflow type="write" weight="10"/>
10652 </interface>
10653 -<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="72179">
10654 +<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="72600">
10655 <summary>
10656 Do not audit attempts to send rlogind_server packets.
10657 </summary>
10658 @@ -54820,7 +55440,7 @@ Domain to not audit.
10659 </param>
10660 <infoflow type="none"/>
10661 </interface>
10662 -<interface name="corenet_receive_rlogind_server_packets" lineno="72198">
10663 +<interface name="corenet_receive_rlogind_server_packets" lineno="72619">
10664 <summary>
10665 Receive rlogind_server packets.
10666 </summary>
10667 @@ -54831,7 +55451,7 @@ Domain allowed access.
10668 </param>
10669 <infoflow type="read" weight="10"/>
10670 </interface>
10671 -<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="72217">
10672 +<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="72638">
10673 <summary>
10674 Do not audit attempts to receive rlogind_server packets.
10675 </summary>
10676 @@ -54842,7 +55462,7 @@ Domain allowed access.
10677 </param>
10678 <infoflow type="none"/>
10679 </interface>
10680 -<interface name="corenet_sendrecv_rlogind_server_packets" lineno="72236">
10681 +<interface name="corenet_sendrecv_rlogind_server_packets" lineno="72657">
10682 <summary>
10683 Send and receive rlogind_server packets.
10684 </summary>
10685 @@ -54853,7 +55473,7 @@ Domain allowed access.
10686 </param>
10687 <infoflow type="both" weight="10"/>
10688 </interface>
10689 -<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="72252">
10690 +<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="72673">
10691 <summary>
10692 Do not audit attempts to send and receive rlogind_server packets.
10693 </summary>
10694 @@ -54864,7 +55484,7 @@ Domain to not audit.
10695 </param>
10696 <infoflow type="none"/>
10697 </interface>
10698 -<interface name="corenet_relabelto_rlogind_server_packets" lineno="72267">
10699 +<interface name="corenet_relabelto_rlogind_server_packets" lineno="72688">
10700 <summary>
10701 Relabel packets to rlogind_server the packet type.
10702 </summary>
10703 @@ -54874,7 +55494,7 @@ Domain allowed access.
10704 </summary>
10705 </param>
10706 </interface>
10707 -<interface name="corenet_tcp_sendrecv_rndc_port" lineno="72289">
10708 +<interface name="corenet_tcp_sendrecv_rndc_port" lineno="72710">
10709 <summary>
10710 Send and receive TCP traffic on the rndc port.
10711 </summary>
10712 @@ -54885,7 +55505,7 @@ Domain allowed access.
10713 </param>
10714 <infoflow type="both" weight="10"/>
10715 </interface>
10716 -<interface name="corenet_udp_send_rndc_port" lineno="72304">
10717 +<interface name="corenet_udp_send_rndc_port" lineno="72725">
10718 <summary>
10719 Send UDP traffic on the rndc port.
10720 </summary>
10721 @@ -54896,7 +55516,7 @@ Domain allowed access.
10722 </param>
10723 <infoflow type="write" weight="10"/>
10724 </interface>
10725 -<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="72319">
10726 +<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="72740">
10727 <summary>
10728 Do not audit attempts to send UDP traffic on the rndc port.
10729 </summary>
10730 @@ -54907,7 +55527,7 @@ Domain to not audit.
10731 </param>
10732 <infoflow type="none"/>
10733 </interface>
10734 -<interface name="corenet_udp_receive_rndc_port" lineno="72334">
10735 +<interface name="corenet_udp_receive_rndc_port" lineno="72755">
10736 <summary>
10737 Receive UDP traffic on the rndc port.
10738 </summary>
10739 @@ -54918,7 +55538,7 @@ Domain allowed access.
10740 </param>
10741 <infoflow type="read" weight="10"/>
10742 </interface>
10743 -<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="72349">
10744 +<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="72770">
10745 <summary>
10746 Do not audit attempts to receive UDP traffic on the rndc port.
10747 </summary>
10748 @@ -54929,7 +55549,7 @@ Domain to not audit.
10749 </param>
10750 <infoflow type="none"/>
10751 </interface>
10752 -<interface name="corenet_udp_sendrecv_rndc_port" lineno="72364">
10753 +<interface name="corenet_udp_sendrecv_rndc_port" lineno="72785">
10754 <summary>
10755 Send and receive UDP traffic on the rndc port.
10756 </summary>
10757 @@ -54940,7 +55560,7 @@ Domain allowed access.
10758 </param>
10759 <infoflow type="both" weight="10"/>
10760 </interface>
10761 -<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="72380">
10762 +<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="72801">
10763 <summary>
10764 Do not audit attempts to send and receive
10765 UDP traffic on the rndc port.
10766 @@ -54952,7 +55572,7 @@ Domain to not audit.
10767 </param>
10768 <infoflow type="none"/>
10769 </interface>
10770 -<interface name="corenet_tcp_bind_rndc_port" lineno="72395">
10771 +<interface name="corenet_tcp_bind_rndc_port" lineno="72816">
10772 <summary>
10773 Bind TCP sockets to the rndc port.
10774 </summary>
10775 @@ -54963,7 +55583,7 @@ Domain allowed access.
10776 </param>
10777 <infoflow type="none"/>
10778 </interface>
10779 -<interface name="corenet_udp_bind_rndc_port" lineno="72415">
10780 +<interface name="corenet_udp_bind_rndc_port" lineno="72836">
10781 <summary>
10782 Bind UDP sockets to the rndc port.
10783 </summary>
10784 @@ -54974,7 +55594,7 @@ Domain allowed access.
10785 </param>
10786 <infoflow type="none"/>
10787 </interface>
10788 -<interface name="corenet_tcp_connect_rndc_port" lineno="72434">
10789 +<interface name="corenet_tcp_connect_rndc_port" lineno="72855">
10790 <summary>
10791 Make a TCP connection to the rndc port.
10792 </summary>
10793 @@ -54984,7 +55604,7 @@ Domain allowed access.
10794 </summary>
10795 </param>
10796 </interface>
10797 -<interface name="corenet_send_rndc_client_packets" lineno="72454">
10798 +<interface name="corenet_send_rndc_client_packets" lineno="72875">
10799 <summary>
10800 Send rndc_client packets.
10801 </summary>
10802 @@ -54995,7 +55615,7 @@ Domain allowed access.
10803 </param>
10804 <infoflow type="write" weight="10"/>
10805 </interface>
10806 -<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="72473">
10807 +<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="72894">
10808 <summary>
10809 Do not audit attempts to send rndc_client packets.
10810 </summary>
10811 @@ -55006,7 +55626,7 @@ Domain to not audit.
10812 </param>
10813 <infoflow type="none"/>
10814 </interface>
10815 -<interface name="corenet_receive_rndc_client_packets" lineno="72492">
10816 +<interface name="corenet_receive_rndc_client_packets" lineno="72913">
10817 <summary>
10818 Receive rndc_client packets.
10819 </summary>
10820 @@ -55017,7 +55637,7 @@ Domain allowed access.
10821 </param>
10822 <infoflow type="read" weight="10"/>
10823 </interface>
10824 -<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="72511">
10825 +<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="72932">
10826 <summary>
10827 Do not audit attempts to receive rndc_client packets.
10828 </summary>
10829 @@ -55028,7 +55648,7 @@ Domain allowed access.
10830 </param>
10831 <infoflow type="none"/>
10832 </interface>
10833 -<interface name="corenet_sendrecv_rndc_client_packets" lineno="72530">
10834 +<interface name="corenet_sendrecv_rndc_client_packets" lineno="72951">
10835 <summary>
10836 Send and receive rndc_client packets.
10837 </summary>
10838 @@ -55039,7 +55659,7 @@ Domain allowed access.
10839 </param>
10840 <infoflow type="both" weight="10"/>
10841 </interface>
10842 -<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="72546">
10843 +<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="72967">
10844 <summary>
10845 Do not audit attempts to send and receive rndc_client packets.
10846 </summary>
10847 @@ -55050,7 +55670,7 @@ Domain to not audit.
10848 </param>
10849 <infoflow type="none"/>
10850 </interface>
10851 -<interface name="corenet_relabelto_rndc_client_packets" lineno="72561">
10852 +<interface name="corenet_relabelto_rndc_client_packets" lineno="72982">
10853 <summary>
10854 Relabel packets to rndc_client the packet type.
10855 </summary>
10856 @@ -55060,7 +55680,7 @@ Domain allowed access.
10857 </summary>
10858 </param>
10859 </interface>
10860 -<interface name="corenet_send_rndc_server_packets" lineno="72581">
10861 +<interface name="corenet_send_rndc_server_packets" lineno="73002">
10862 <summary>
10863 Send rndc_server packets.
10864 </summary>
10865 @@ -55071,7 +55691,7 @@ Domain allowed access.
10866 </param>
10867 <infoflow type="write" weight="10"/>
10868 </interface>
10869 -<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="72600">
10870 +<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="73021">
10871 <summary>
10872 Do not audit attempts to send rndc_server packets.
10873 </summary>
10874 @@ -55082,7 +55702,7 @@ Domain to not audit.
10875 </param>
10876 <infoflow type="none"/>
10877 </interface>
10878 -<interface name="corenet_receive_rndc_server_packets" lineno="72619">
10879 +<interface name="corenet_receive_rndc_server_packets" lineno="73040">
10880 <summary>
10881 Receive rndc_server packets.
10882 </summary>
10883 @@ -55093,7 +55713,7 @@ Domain allowed access.
10884 </param>
10885 <infoflow type="read" weight="10"/>
10886 </interface>
10887 -<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="72638">
10888 +<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="73059">
10889 <summary>
10890 Do not audit attempts to receive rndc_server packets.
10891 </summary>
10892 @@ -55104,7 +55724,7 @@ Domain allowed access.
10893 </param>
10894 <infoflow type="none"/>
10895 </interface>
10896 -<interface name="corenet_sendrecv_rndc_server_packets" lineno="72657">
10897 +<interface name="corenet_sendrecv_rndc_server_packets" lineno="73078">
10898 <summary>
10899 Send and receive rndc_server packets.
10900 </summary>
10901 @@ -55115,7 +55735,7 @@ Domain allowed access.
10902 </param>
10903 <infoflow type="both" weight="10"/>
10904 </interface>
10905 -<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="72673">
10906 +<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="73094">
10907 <summary>
10908 Do not audit attempts to send and receive rndc_server packets.
10909 </summary>
10910 @@ -55126,7 +55746,7 @@ Domain to not audit.
10911 </param>
10912 <infoflow type="none"/>
10913 </interface>
10914 -<interface name="corenet_relabelto_rndc_server_packets" lineno="72688">
10915 +<interface name="corenet_relabelto_rndc_server_packets" lineno="73109">
10916 <summary>
10917 Relabel packets to rndc_server the packet type.
10918 </summary>
10919 @@ -55136,7 +55756,7 @@ Domain allowed access.
10920 </summary>
10921 </param>
10922 </interface>
10923 -<interface name="corenet_tcp_sendrecv_router_port" lineno="72710">
10924 +<interface name="corenet_tcp_sendrecv_router_port" lineno="73131">
10925 <summary>
10926 Send and receive TCP traffic on the router port.
10927 </summary>
10928 @@ -55147,7 +55767,7 @@ Domain allowed access.
10929 </param>
10930 <infoflow type="both" weight="10"/>
10931 </interface>
10932 -<interface name="corenet_udp_send_router_port" lineno="72725">
10933 +<interface name="corenet_udp_send_router_port" lineno="73146">
10934 <summary>
10935 Send UDP traffic on the router port.
10936 </summary>
10937 @@ -55158,7 +55778,7 @@ Domain allowed access.
10938 </param>
10939 <infoflow type="write" weight="10"/>
10940 </interface>
10941 -<interface name="corenet_dontaudit_udp_send_router_port" lineno="72740">
10942 +<interface name="corenet_dontaudit_udp_send_router_port" lineno="73161">
10943 <summary>
10944 Do not audit attempts to send UDP traffic on the router port.
10945 </summary>
10946 @@ -55169,7 +55789,7 @@ Domain to not audit.
10947 </param>
10948 <infoflow type="none"/>
10949 </interface>
10950 -<interface name="corenet_udp_receive_router_port" lineno="72755">
10951 +<interface name="corenet_udp_receive_router_port" lineno="73176">
10952 <summary>
10953 Receive UDP traffic on the router port.
10954 </summary>
10955 @@ -55180,7 +55800,7 @@ Domain allowed access.
10956 </param>
10957 <infoflow type="read" weight="10"/>
10958 </interface>
10959 -<interface name="corenet_dontaudit_udp_receive_router_port" lineno="72770">
10960 +<interface name="corenet_dontaudit_udp_receive_router_port" lineno="73191">
10961 <summary>
10962 Do not audit attempts to receive UDP traffic on the router port.
10963 </summary>
10964 @@ -55191,7 +55811,7 @@ Domain to not audit.
10965 </param>
10966 <infoflow type="none"/>
10967 </interface>
10968 -<interface name="corenet_udp_sendrecv_router_port" lineno="72785">
10969 +<interface name="corenet_udp_sendrecv_router_port" lineno="73206">
10970 <summary>
10971 Send and receive UDP traffic on the router port.
10972 </summary>
10973 @@ -55202,7 +55822,7 @@ Domain allowed access.
10974 </param>
10975 <infoflow type="both" weight="10"/>
10976 </interface>
10977 -<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="72801">
10978 +<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="73222">
10979 <summary>
10980 Do not audit attempts to send and receive
10981 UDP traffic on the router port.
10982 @@ -55214,7 +55834,7 @@ Domain to not audit.
10983 </param>
10984 <infoflow type="none"/>
10985 </interface>
10986 -<interface name="corenet_tcp_bind_router_port" lineno="72816">
10987 +<interface name="corenet_tcp_bind_router_port" lineno="73237">
10988 <summary>
10989 Bind TCP sockets to the router port.
10990 </summary>
10991 @@ -55225,7 +55845,7 @@ Domain allowed access.
10992 </param>
10993 <infoflow type="none"/>
10994 </interface>
10995 -<interface name="corenet_udp_bind_router_port" lineno="72836">
10996 +<interface name="corenet_udp_bind_router_port" lineno="73257">
10997 <summary>
10998 Bind UDP sockets to the router port.
10999 </summary>
11000 @@ -55236,7 +55856,7 @@ Domain allowed access.
11001 </param>
11002 <infoflow type="none"/>
11003 </interface>
11004 -<interface name="corenet_tcp_connect_router_port" lineno="72855">
11005 +<interface name="corenet_tcp_connect_router_port" lineno="73276">
11006 <summary>
11007 Make a TCP connection to the router port.
11008 </summary>
11009 @@ -55246,7 +55866,7 @@ Domain allowed access.
11010 </summary>
11011 </param>
11012 </interface>
11013 -<interface name="corenet_send_router_client_packets" lineno="72875">
11014 +<interface name="corenet_send_router_client_packets" lineno="73296">
11015 <summary>
11016 Send router_client packets.
11017 </summary>
11018 @@ -55257,7 +55877,7 @@ Domain allowed access.
11019 </param>
11020 <infoflow type="write" weight="10"/>
11021 </interface>
11022 -<interface name="corenet_dontaudit_send_router_client_packets" lineno="72894">
11023 +<interface name="corenet_dontaudit_send_router_client_packets" lineno="73315">
11024 <summary>
11025 Do not audit attempts to send router_client packets.
11026 </summary>
11027 @@ -55268,7 +55888,7 @@ Domain to not audit.
11028 </param>
11029 <infoflow type="none"/>
11030 </interface>
11031 -<interface name="corenet_receive_router_client_packets" lineno="72913">
11032 +<interface name="corenet_receive_router_client_packets" lineno="73334">
11033 <summary>
11034 Receive router_client packets.
11035 </summary>
11036 @@ -55279,7 +55899,7 @@ Domain allowed access.
11037 </param>
11038 <infoflow type="read" weight="10"/>
11039 </interface>
11040 -<interface name="corenet_dontaudit_receive_router_client_packets" lineno="72932">
11041 +<interface name="corenet_dontaudit_receive_router_client_packets" lineno="73353">
11042 <summary>
11043 Do not audit attempts to receive router_client packets.
11044 </summary>
11045 @@ -55290,7 +55910,7 @@ Domain allowed access.
11046 </param>
11047 <infoflow type="none"/>
11048 </interface>
11049 -<interface name="corenet_sendrecv_router_client_packets" lineno="72951">
11050 +<interface name="corenet_sendrecv_router_client_packets" lineno="73372">
11051 <summary>
11052 Send and receive router_client packets.
11053 </summary>
11054 @@ -55301,7 +55921,7 @@ Domain allowed access.
11055 </param>
11056 <infoflow type="both" weight="10"/>
11057 </interface>
11058 -<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="72967">
11059 +<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="73388">
11060 <summary>
11061 Do not audit attempts to send and receive router_client packets.
11062 </summary>
11063 @@ -55312,7 +55932,7 @@ Domain to not audit.
11064 </param>
11065 <infoflow type="none"/>
11066 </interface>
11067 -<interface name="corenet_relabelto_router_client_packets" lineno="72982">
11068 +<interface name="corenet_relabelto_router_client_packets" lineno="73403">
11069 <summary>
11070 Relabel packets to router_client the packet type.
11071 </summary>
11072 @@ -55322,7 +55942,7 @@ Domain allowed access.
11073 </summary>
11074 </param>
11075 </interface>
11076 -<interface name="corenet_send_router_server_packets" lineno="73002">
11077 +<interface name="corenet_send_router_server_packets" lineno="73423">
11078 <summary>
11079 Send router_server packets.
11080 </summary>
11081 @@ -55333,7 +55953,7 @@ Domain allowed access.
11082 </param>
11083 <infoflow type="write" weight="10"/>
11084 </interface>
11085 -<interface name="corenet_dontaudit_send_router_server_packets" lineno="73021">
11086 +<interface name="corenet_dontaudit_send_router_server_packets" lineno="73442">
11087 <summary>
11088 Do not audit attempts to send router_server packets.
11089 </summary>
11090 @@ -55344,7 +55964,7 @@ Domain to not audit.
11091 </param>
11092 <infoflow type="none"/>
11093 </interface>
11094 -<interface name="corenet_receive_router_server_packets" lineno="73040">
11095 +<interface name="corenet_receive_router_server_packets" lineno="73461">
11096 <summary>
11097 Receive router_server packets.
11098 </summary>
11099 @@ -55355,7 +55975,7 @@ Domain allowed access.
11100 </param>
11101 <infoflow type="read" weight="10"/>
11102 </interface>
11103 -<interface name="corenet_dontaudit_receive_router_server_packets" lineno="73059">
11104 +<interface name="corenet_dontaudit_receive_router_server_packets" lineno="73480">
11105 <summary>
11106 Do not audit attempts to receive router_server packets.
11107 </summary>
11108 @@ -55366,7 +55986,7 @@ Domain allowed access.
11109 </param>
11110 <infoflow type="none"/>
11111 </interface>
11112 -<interface name="corenet_sendrecv_router_server_packets" lineno="73078">
11113 +<interface name="corenet_sendrecv_router_server_packets" lineno="73499">
11114 <summary>
11115 Send and receive router_server packets.
11116 </summary>
11117 @@ -55377,7 +55997,7 @@ Domain allowed access.
11118 </param>
11119 <infoflow type="both" weight="10"/>
11120 </interface>
11121 -<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="73094">
11122 +<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="73515">
11123 <summary>
11124 Do not audit attempts to send and receive router_server packets.
11125 </summary>
11126 @@ -55388,7 +56008,7 @@ Domain to not audit.
11127 </param>
11128 <infoflow type="none"/>
11129 </interface>
11130 -<interface name="corenet_relabelto_router_server_packets" lineno="73109">
11131 +<interface name="corenet_relabelto_router_server_packets" lineno="73530">
11132 <summary>
11133 Relabel packets to router_server the packet type.
11134 </summary>
11135 @@ -55398,7 +56018,7 @@ Domain allowed access.
11136 </summary>
11137 </param>
11138 </interface>
11139 -<interface name="corenet_tcp_sendrecv_rsh_port" lineno="73131">
11140 +<interface name="corenet_tcp_sendrecv_rsh_port" lineno="73552">
11141 <summary>
11142 Send and receive TCP traffic on the rsh port.
11143 </summary>
11144 @@ -55409,7 +56029,7 @@ Domain allowed access.
11145 </param>
11146 <infoflow type="both" weight="10"/>
11147 </interface>
11148 -<interface name="corenet_udp_send_rsh_port" lineno="73146">
11149 +<interface name="corenet_udp_send_rsh_port" lineno="73567">
11150 <summary>
11151 Send UDP traffic on the rsh port.
11152 </summary>
11153 @@ -55420,7 +56040,7 @@ Domain allowed access.
11154 </param>
11155 <infoflow type="write" weight="10"/>
11156 </interface>
11157 -<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="73161">
11158 +<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="73582">
11159 <summary>
11160 Do not audit attempts to send UDP traffic on the rsh port.
11161 </summary>
11162 @@ -55431,7 +56051,7 @@ Domain to not audit.
11163 </param>
11164 <infoflow type="none"/>
11165 </interface>
11166 -<interface name="corenet_udp_receive_rsh_port" lineno="73176">
11167 +<interface name="corenet_udp_receive_rsh_port" lineno="73597">
11168 <summary>
11169 Receive UDP traffic on the rsh port.
11170 </summary>
11171 @@ -55442,7 +56062,7 @@ Domain allowed access.
11172 </param>
11173 <infoflow type="read" weight="10"/>
11174 </interface>
11175 -<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="73191">
11176 +<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="73612">
11177 <summary>
11178 Do not audit attempts to receive UDP traffic on the rsh port.
11179 </summary>
11180 @@ -55453,7 +56073,7 @@ Domain to not audit.
11181 </param>
11182 <infoflow type="none"/>
11183 </interface>
11184 -<interface name="corenet_udp_sendrecv_rsh_port" lineno="73206">
11185 +<interface name="corenet_udp_sendrecv_rsh_port" lineno="73627">
11186 <summary>
11187 Send and receive UDP traffic on the rsh port.
11188 </summary>
11189 @@ -55464,7 +56084,7 @@ Domain allowed access.
11190 </param>
11191 <infoflow type="both" weight="10"/>
11192 </interface>
11193 -<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="73222">
11194 +<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="73643">
11195 <summary>
11196 Do not audit attempts to send and receive
11197 UDP traffic on the rsh port.
11198 @@ -55476,7 +56096,7 @@ Domain to not audit.
11199 </param>
11200 <infoflow type="none"/>
11201 </interface>
11202 -<interface name="corenet_tcp_bind_rsh_port" lineno="73237">
11203 +<interface name="corenet_tcp_bind_rsh_port" lineno="73658">
11204 <summary>
11205 Bind TCP sockets to the rsh port.
11206 </summary>
11207 @@ -55487,7 +56107,7 @@ Domain allowed access.
11208 </param>
11209 <infoflow type="none"/>
11210 </interface>
11211 -<interface name="corenet_udp_bind_rsh_port" lineno="73257">
11212 +<interface name="corenet_udp_bind_rsh_port" lineno="73678">
11213 <summary>
11214 Bind UDP sockets to the rsh port.
11215 </summary>
11216 @@ -55498,7 +56118,7 @@ Domain allowed access.
11217 </param>
11218 <infoflow type="none"/>
11219 </interface>
11220 -<interface name="corenet_tcp_connect_rsh_port" lineno="73276">
11221 +<interface name="corenet_tcp_connect_rsh_port" lineno="73697">
11222 <summary>
11223 Make a TCP connection to the rsh port.
11224 </summary>
11225 @@ -55508,7 +56128,7 @@ Domain allowed access.
11226 </summary>
11227 </param>
11228 </interface>
11229 -<interface name="corenet_send_rsh_client_packets" lineno="73296">
11230 +<interface name="corenet_send_rsh_client_packets" lineno="73717">
11231 <summary>
11232 Send rsh_client packets.
11233 </summary>
11234 @@ -55519,7 +56139,7 @@ Domain allowed access.
11235 </param>
11236 <infoflow type="write" weight="10"/>
11237 </interface>
11238 -<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="73315">
11239 +<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="73736">
11240 <summary>
11241 Do not audit attempts to send rsh_client packets.
11242 </summary>
11243 @@ -55530,7 +56150,7 @@ Domain to not audit.
11244 </param>
11245 <infoflow type="none"/>
11246 </interface>
11247 -<interface name="corenet_receive_rsh_client_packets" lineno="73334">
11248 +<interface name="corenet_receive_rsh_client_packets" lineno="73755">
11249 <summary>
11250 Receive rsh_client packets.
11251 </summary>
11252 @@ -55541,7 +56161,7 @@ Domain allowed access.
11253 </param>
11254 <infoflow type="read" weight="10"/>
11255 </interface>
11256 -<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="73353">
11257 +<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="73774">
11258 <summary>
11259 Do not audit attempts to receive rsh_client packets.
11260 </summary>
11261 @@ -55552,7 +56172,7 @@ Domain allowed access.
11262 </param>
11263 <infoflow type="none"/>
11264 </interface>
11265 -<interface name="corenet_sendrecv_rsh_client_packets" lineno="73372">
11266 +<interface name="corenet_sendrecv_rsh_client_packets" lineno="73793">
11267 <summary>
11268 Send and receive rsh_client packets.
11269 </summary>
11270 @@ -55563,7 +56183,7 @@ Domain allowed access.
11271 </param>
11272 <infoflow type="both" weight="10"/>
11273 </interface>
11274 -<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="73388">
11275 +<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="73809">
11276 <summary>
11277 Do not audit attempts to send and receive rsh_client packets.
11278 </summary>
11279 @@ -55574,7 +56194,7 @@ Domain to not audit.
11280 </param>
11281 <infoflow type="none"/>
11282 </interface>
11283 -<interface name="corenet_relabelto_rsh_client_packets" lineno="73403">
11284 +<interface name="corenet_relabelto_rsh_client_packets" lineno="73824">
11285 <summary>
11286 Relabel packets to rsh_client the packet type.
11287 </summary>
11288 @@ -55584,7 +56204,7 @@ Domain allowed access.
11289 </summary>
11290 </param>
11291 </interface>
11292 -<interface name="corenet_send_rsh_server_packets" lineno="73423">
11293 +<interface name="corenet_send_rsh_server_packets" lineno="73844">
11294 <summary>
11295 Send rsh_server packets.
11296 </summary>
11297 @@ -55595,7 +56215,7 @@ Domain allowed access.
11298 </param>
11299 <infoflow type="write" weight="10"/>
11300 </interface>
11301 -<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="73442">
11302 +<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="73863">
11303 <summary>
11304 Do not audit attempts to send rsh_server packets.
11305 </summary>
11306 @@ -55606,7 +56226,7 @@ Domain to not audit.
11307 </param>
11308 <infoflow type="none"/>
11309 </interface>
11310 -<interface name="corenet_receive_rsh_server_packets" lineno="73461">
11311 +<interface name="corenet_receive_rsh_server_packets" lineno="73882">
11312 <summary>
11313 Receive rsh_server packets.
11314 </summary>
11315 @@ -55617,7 +56237,7 @@ Domain allowed access.
11316 </param>
11317 <infoflow type="read" weight="10"/>
11318 </interface>
11319 -<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="73480">
11320 +<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="73901">
11321 <summary>
11322 Do not audit attempts to receive rsh_server packets.
11323 </summary>
11324 @@ -55628,7 +56248,7 @@ Domain allowed access.
11325 </param>
11326 <infoflow type="none"/>
11327 </interface>
11328 -<interface name="corenet_sendrecv_rsh_server_packets" lineno="73499">
11329 +<interface name="corenet_sendrecv_rsh_server_packets" lineno="73920">
11330 <summary>
11331 Send and receive rsh_server packets.
11332 </summary>
11333 @@ -55639,7 +56259,7 @@ Domain allowed access.
11334 </param>
11335 <infoflow type="both" weight="10"/>
11336 </interface>
11337 -<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="73515">
11338 +<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="73936">
11339 <summary>
11340 Do not audit attempts to send and receive rsh_server packets.
11341 </summary>
11342 @@ -55650,7 +56270,7 @@ Domain to not audit.
11343 </param>
11344 <infoflow type="none"/>
11345 </interface>
11346 -<interface name="corenet_relabelto_rsh_server_packets" lineno="73530">
11347 +<interface name="corenet_relabelto_rsh_server_packets" lineno="73951">
11348 <summary>
11349 Relabel packets to rsh_server the packet type.
11350 </summary>
11351 @@ -55660,7 +56280,7 @@ Domain allowed access.
11352 </summary>
11353 </param>
11354 </interface>
11355 -<interface name="corenet_tcp_sendrecv_rsync_port" lineno="73552">
11356 +<interface name="corenet_tcp_sendrecv_rsync_port" lineno="73973">
11357 <summary>
11358 Send and receive TCP traffic on the rsync port.
11359 </summary>
11360 @@ -55671,7 +56291,7 @@ Domain allowed access.
11361 </param>
11362 <infoflow type="both" weight="10"/>
11363 </interface>
11364 -<interface name="corenet_udp_send_rsync_port" lineno="73567">
11365 +<interface name="corenet_udp_send_rsync_port" lineno="73988">
11366 <summary>
11367 Send UDP traffic on the rsync port.
11368 </summary>
11369 @@ -55682,7 +56302,7 @@ Domain allowed access.
11370 </param>
11371 <infoflow type="write" weight="10"/>
11372 </interface>
11373 -<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="73582">
11374 +<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="74003">
11375 <summary>
11376 Do not audit attempts to send UDP traffic on the rsync port.
11377 </summary>
11378 @@ -55693,7 +56313,7 @@ Domain to not audit.
11379 </param>
11380 <infoflow type="none"/>
11381 </interface>
11382 -<interface name="corenet_udp_receive_rsync_port" lineno="73597">
11383 +<interface name="corenet_udp_receive_rsync_port" lineno="74018">
11384 <summary>
11385 Receive UDP traffic on the rsync port.
11386 </summary>
11387 @@ -55704,7 +56324,7 @@ Domain allowed access.
11388 </param>
11389 <infoflow type="read" weight="10"/>
11390 </interface>
11391 -<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="73612">
11392 +<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="74033">
11393 <summary>
11394 Do not audit attempts to receive UDP traffic on the rsync port.
11395 </summary>
11396 @@ -55715,7 +56335,7 @@ Domain to not audit.
11397 </param>
11398 <infoflow type="none"/>
11399 </interface>
11400 -<interface name="corenet_udp_sendrecv_rsync_port" lineno="73627">
11401 +<interface name="corenet_udp_sendrecv_rsync_port" lineno="74048">
11402 <summary>
11403 Send and receive UDP traffic on the rsync port.
11404 </summary>
11405 @@ -55726,7 +56346,7 @@ Domain allowed access.
11406 </param>
11407 <infoflow type="both" weight="10"/>
11408 </interface>
11409 -<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="73643">
11410 +<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="74064">
11411 <summary>
11412 Do not audit attempts to send and receive
11413 UDP traffic on the rsync port.
11414 @@ -55738,7 +56358,7 @@ Domain to not audit.
11415 </param>
11416 <infoflow type="none"/>
11417 </interface>
11418 -<interface name="corenet_tcp_bind_rsync_port" lineno="73658">
11419 +<interface name="corenet_tcp_bind_rsync_port" lineno="74079">
11420 <summary>
11421 Bind TCP sockets to the rsync port.
11422 </summary>
11423 @@ -55749,7 +56369,7 @@ Domain allowed access.
11424 </param>
11425 <infoflow type="none"/>
11426 </interface>
11427 -<interface name="corenet_udp_bind_rsync_port" lineno="73678">
11428 +<interface name="corenet_udp_bind_rsync_port" lineno="74099">
11429 <summary>
11430 Bind UDP sockets to the rsync port.
11431 </summary>
11432 @@ -55760,7 +56380,7 @@ Domain allowed access.
11433 </param>
11434 <infoflow type="none"/>
11435 </interface>
11436 -<interface name="corenet_tcp_connect_rsync_port" lineno="73697">
11437 +<interface name="corenet_tcp_connect_rsync_port" lineno="74118">
11438 <summary>
11439 Make a TCP connection to the rsync port.
11440 </summary>
11441 @@ -55770,7 +56390,7 @@ Domain allowed access.
11442 </summary>
11443 </param>
11444 </interface>
11445 -<interface name="corenet_send_rsync_client_packets" lineno="73717">
11446 +<interface name="corenet_send_rsync_client_packets" lineno="74138">
11447 <summary>
11448 Send rsync_client packets.
11449 </summary>
11450 @@ -55781,7 +56401,7 @@ Domain allowed access.
11451 </param>
11452 <infoflow type="write" weight="10"/>
11453 </interface>
11454 -<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="73736">
11455 +<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="74157">
11456 <summary>
11457 Do not audit attempts to send rsync_client packets.
11458 </summary>
11459 @@ -55792,7 +56412,7 @@ Domain to not audit.
11460 </param>
11461 <infoflow type="none"/>
11462 </interface>
11463 -<interface name="corenet_receive_rsync_client_packets" lineno="73755">
11464 +<interface name="corenet_receive_rsync_client_packets" lineno="74176">
11465 <summary>
11466 Receive rsync_client packets.
11467 </summary>
11468 @@ -55803,7 +56423,7 @@ Domain allowed access.
11469 </param>
11470 <infoflow type="read" weight="10"/>
11471 </interface>
11472 -<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="73774">
11473 +<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="74195">
11474 <summary>
11475 Do not audit attempts to receive rsync_client packets.
11476 </summary>
11477 @@ -55814,7 +56434,7 @@ Domain allowed access.
11478 </param>
11479 <infoflow type="none"/>
11480 </interface>
11481 -<interface name="corenet_sendrecv_rsync_client_packets" lineno="73793">
11482 +<interface name="corenet_sendrecv_rsync_client_packets" lineno="74214">
11483 <summary>
11484 Send and receive rsync_client packets.
11485 </summary>
11486 @@ -55825,7 +56445,7 @@ Domain allowed access.
11487 </param>
11488 <infoflow type="both" weight="10"/>
11489 </interface>
11490 -<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="73809">
11491 +<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="74230">
11492 <summary>
11493 Do not audit attempts to send and receive rsync_client packets.
11494 </summary>
11495 @@ -55836,7 +56456,7 @@ Domain to not audit.
11496 </param>
11497 <infoflow type="none"/>
11498 </interface>
11499 -<interface name="corenet_relabelto_rsync_client_packets" lineno="73824">
11500 +<interface name="corenet_relabelto_rsync_client_packets" lineno="74245">
11501 <summary>
11502 Relabel packets to rsync_client the packet type.
11503 </summary>
11504 @@ -55846,7 +56466,7 @@ Domain allowed access.
11505 </summary>
11506 </param>
11507 </interface>
11508 -<interface name="corenet_send_rsync_server_packets" lineno="73844">
11509 +<interface name="corenet_send_rsync_server_packets" lineno="74265">
11510 <summary>
11511 Send rsync_server packets.
11512 </summary>
11513 @@ -55857,7 +56477,7 @@ Domain allowed access.
11514 </param>
11515 <infoflow type="write" weight="10"/>
11516 </interface>
11517 -<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="73863">
11518 +<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="74284">
11519 <summary>
11520 Do not audit attempts to send rsync_server packets.
11521 </summary>
11522 @@ -55868,7 +56488,7 @@ Domain to not audit.
11523 </param>
11524 <infoflow type="none"/>
11525 </interface>
11526 -<interface name="corenet_receive_rsync_server_packets" lineno="73882">
11527 +<interface name="corenet_receive_rsync_server_packets" lineno="74303">
11528 <summary>
11529 Receive rsync_server packets.
11530 </summary>
11531 @@ -55879,7 +56499,7 @@ Domain allowed access.
11532 </param>
11533 <infoflow type="read" weight="10"/>
11534 </interface>
11535 -<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="73901">
11536 +<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="74322">
11537 <summary>
11538 Do not audit attempts to receive rsync_server packets.
11539 </summary>
11540 @@ -55890,7 +56510,7 @@ Domain allowed access.
11541 </param>
11542 <infoflow type="none"/>
11543 </interface>
11544 -<interface name="corenet_sendrecv_rsync_server_packets" lineno="73920">
11545 +<interface name="corenet_sendrecv_rsync_server_packets" lineno="74341">
11546 <summary>
11547 Send and receive rsync_server packets.
11548 </summary>
11549 @@ -55901,7 +56521,7 @@ Domain allowed access.
11550 </param>
11551 <infoflow type="both" weight="10"/>
11552 </interface>
11553 -<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="73936">
11554 +<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="74357">
11555 <summary>
11556 Do not audit attempts to send and receive rsync_server packets.
11557 </summary>
11558 @@ -55912,7 +56532,7 @@ Domain to not audit.
11559 </param>
11560 <infoflow type="none"/>
11561 </interface>
11562 -<interface name="corenet_relabelto_rsync_server_packets" lineno="73951">
11563 +<interface name="corenet_relabelto_rsync_server_packets" lineno="74372">
11564 <summary>
11565 Relabel packets to rsync_server the packet type.
11566 </summary>
11567 @@ -55922,7 +56542,7 @@ Domain allowed access.
11568 </summary>
11569 </param>
11570 </interface>
11571 -<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="73973">
11572 +<interface name="corenet_tcp_sendrecv_rtorrent_port" lineno="74394">
11573 <summary>
11574 Send and receive TCP traffic on the rtorrent port.
11575 </summary>
11576 @@ -55933,7 +56553,7 @@ Domain allowed access.
11577 </param>
11578 <infoflow type="both" weight="10"/>
11579 </interface>
11580 -<interface name="corenet_udp_send_rtorrent_port" lineno="73988">
11581 +<interface name="corenet_udp_send_rtorrent_port" lineno="74409">
11582 <summary>
11583 Send UDP traffic on the rtorrent port.
11584 </summary>
11585 @@ -55944,7 +56564,7 @@ Domain allowed access.
11586 </param>
11587 <infoflow type="write" weight="10"/>
11588 </interface>
11589 -<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="74003">
11590 +<interface name="corenet_dontaudit_udp_send_rtorrent_port" lineno="74424">
11591 <summary>
11592 Do not audit attempts to send UDP traffic on the rtorrent port.
11593 </summary>
11594 @@ -55955,7 +56575,7 @@ Domain to not audit.
11595 </param>
11596 <infoflow type="none"/>
11597 </interface>
11598 -<interface name="corenet_udp_receive_rtorrent_port" lineno="74018">
11599 +<interface name="corenet_udp_receive_rtorrent_port" lineno="74439">
11600 <summary>
11601 Receive UDP traffic on the rtorrent port.
11602 </summary>
11603 @@ -55966,7 +56586,7 @@ Domain allowed access.
11604 </param>
11605 <infoflow type="read" weight="10"/>
11606 </interface>
11607 -<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="74033">
11608 +<interface name="corenet_dontaudit_udp_receive_rtorrent_port" lineno="74454">
11609 <summary>
11610 Do not audit attempts to receive UDP traffic on the rtorrent port.
11611 </summary>
11612 @@ -55977,7 +56597,7 @@ Domain to not audit.
11613 </param>
11614 <infoflow type="none"/>
11615 </interface>
11616 -<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="74048">
11617 +<interface name="corenet_udp_sendrecv_rtorrent_port" lineno="74469">
11618 <summary>
11619 Send and receive UDP traffic on the rtorrent port.
11620 </summary>
11621 @@ -55988,7 +56608,7 @@ Domain allowed access.
11622 </param>
11623 <infoflow type="both" weight="10"/>
11624 </interface>
11625 -<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="74064">
11626 +<interface name="corenet_dontaudit_udp_sendrecv_rtorrent_port" lineno="74485">
11627 <summary>
11628 Do not audit attempts to send and receive
11629 UDP traffic on the rtorrent port.
11630 @@ -56000,7 +56620,7 @@ Domain to not audit.
11631 </param>
11632 <infoflow type="none"/>
11633 </interface>
11634 -<interface name="corenet_tcp_bind_rtorrent_port" lineno="74079">
11635 +<interface name="corenet_tcp_bind_rtorrent_port" lineno="74500">
11636 <summary>
11637 Bind TCP sockets to the rtorrent port.
11638 </summary>
11639 @@ -56011,7 +56631,7 @@ Domain allowed access.
11640 </param>
11641 <infoflow type="none"/>
11642 </interface>
11643 -<interface name="corenet_udp_bind_rtorrent_port" lineno="74099">
11644 +<interface name="corenet_udp_bind_rtorrent_port" lineno="74520">
11645 <summary>
11646 Bind UDP sockets to the rtorrent port.
11647 </summary>
11648 @@ -56022,7 +56642,7 @@ Domain allowed access.
11649 </param>
11650 <infoflow type="none"/>
11651 </interface>
11652 -<interface name="corenet_tcp_connect_rtorrent_port" lineno="74118">
11653 +<interface name="corenet_tcp_connect_rtorrent_port" lineno="74539">
11654 <summary>
11655 Make a TCP connection to the rtorrent port.
11656 </summary>
11657 @@ -56032,7 +56652,7 @@ Domain allowed access.
11658 </summary>
11659 </param>
11660 </interface>
11661 -<interface name="corenet_send_rtorrent_client_packets" lineno="74138">
11662 +<interface name="corenet_send_rtorrent_client_packets" lineno="74559">
11663 <summary>
11664 Send rtorrent_client packets.
11665 </summary>
11666 @@ -56043,7 +56663,7 @@ Domain allowed access.
11667 </param>
11668 <infoflow type="write" weight="10"/>
11669 </interface>
11670 -<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="74157">
11671 +<interface name="corenet_dontaudit_send_rtorrent_client_packets" lineno="74578">
11672 <summary>
11673 Do not audit attempts to send rtorrent_client packets.
11674 </summary>
11675 @@ -56054,7 +56674,7 @@ Domain to not audit.
11676 </param>
11677 <infoflow type="none"/>
11678 </interface>
11679 -<interface name="corenet_receive_rtorrent_client_packets" lineno="74176">
11680 +<interface name="corenet_receive_rtorrent_client_packets" lineno="74597">
11681 <summary>
11682 Receive rtorrent_client packets.
11683 </summary>
11684 @@ -56065,7 +56685,7 @@ Domain allowed access.
11685 </param>
11686 <infoflow type="read" weight="10"/>
11687 </interface>
11688 -<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="74195">
11689 +<interface name="corenet_dontaudit_receive_rtorrent_client_packets" lineno="74616">
11690 <summary>
11691 Do not audit attempts to receive rtorrent_client packets.
11692 </summary>
11693 @@ -56076,7 +56696,7 @@ Domain allowed access.
11694 </param>
11695 <infoflow type="none"/>
11696 </interface>
11697 -<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="74214">
11698 +<interface name="corenet_sendrecv_rtorrent_client_packets" lineno="74635">
11699 <summary>
11700 Send and receive rtorrent_client packets.
11701 </summary>
11702 @@ -56087,7 +56707,7 @@ Domain allowed access.
11703 </param>
11704 <infoflow type="both" weight="10"/>
11705 </interface>
11706 -<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="74230">
11707 +<interface name="corenet_dontaudit_sendrecv_rtorrent_client_packets" lineno="74651">
11708 <summary>
11709 Do not audit attempts to send and receive rtorrent_client packets.
11710 </summary>
11711 @@ -56098,7 +56718,7 @@ Domain to not audit.
11712 </param>
11713 <infoflow type="none"/>
11714 </interface>
11715 -<interface name="corenet_relabelto_rtorrent_client_packets" lineno="74245">
11716 +<interface name="corenet_relabelto_rtorrent_client_packets" lineno="74666">
11717 <summary>
11718 Relabel packets to rtorrent_client the packet type.
11719 </summary>
11720 @@ -56108,7 +56728,7 @@ Domain allowed access.
11721 </summary>
11722 </param>
11723 </interface>
11724 -<interface name="corenet_send_rtorrent_server_packets" lineno="74265">
11725 +<interface name="corenet_send_rtorrent_server_packets" lineno="74686">
11726 <summary>
11727 Send rtorrent_server packets.
11728 </summary>
11729 @@ -56119,7 +56739,7 @@ Domain allowed access.
11730 </param>
11731 <infoflow type="write" weight="10"/>
11732 </interface>
11733 -<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="74284">
11734 +<interface name="corenet_dontaudit_send_rtorrent_server_packets" lineno="74705">
11735 <summary>
11736 Do not audit attempts to send rtorrent_server packets.
11737 </summary>
11738 @@ -56130,7 +56750,7 @@ Domain to not audit.
11739 </param>
11740 <infoflow type="none"/>
11741 </interface>
11742 -<interface name="corenet_receive_rtorrent_server_packets" lineno="74303">
11743 +<interface name="corenet_receive_rtorrent_server_packets" lineno="74724">
11744 <summary>
11745 Receive rtorrent_server packets.
11746 </summary>
11747 @@ -56141,7 +56761,7 @@ Domain allowed access.
11748 </param>
11749 <infoflow type="read" weight="10"/>
11750 </interface>
11751 -<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="74322">
11752 +<interface name="corenet_dontaudit_receive_rtorrent_server_packets" lineno="74743">
11753 <summary>
11754 Do not audit attempts to receive rtorrent_server packets.
11755 </summary>
11756 @@ -56152,7 +56772,7 @@ Domain allowed access.
11757 </param>
11758 <infoflow type="none"/>
11759 </interface>
11760 -<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="74341">
11761 +<interface name="corenet_sendrecv_rtorrent_server_packets" lineno="74762">
11762 <summary>
11763 Send and receive rtorrent_server packets.
11764 </summary>
11765 @@ -56163,7 +56783,7 @@ Domain allowed access.
11766 </param>
11767 <infoflow type="both" weight="10"/>
11768 </interface>
11769 -<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="74357">
11770 +<interface name="corenet_dontaudit_sendrecv_rtorrent_server_packets" lineno="74778">
11771 <summary>
11772 Do not audit attempts to send and receive rtorrent_server packets.
11773 </summary>
11774 @@ -56174,7 +56794,7 @@ Domain to not audit.
11775 </param>
11776 <infoflow type="none"/>
11777 </interface>
11778 -<interface name="corenet_relabelto_rtorrent_server_packets" lineno="74372">
11779 +<interface name="corenet_relabelto_rtorrent_server_packets" lineno="74793">
11780 <summary>
11781 Relabel packets to rtorrent_server the packet type.
11782 </summary>
11783 @@ -56184,7 +56804,7 @@ Domain allowed access.
11784 </summary>
11785 </param>
11786 </interface>
11787 -<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="74394">
11788 +<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="74815">
11789 <summary>
11790 Send and receive TCP traffic on the rtsp port.
11791 </summary>
11792 @@ -56195,7 +56815,7 @@ Domain allowed access.
11793 </param>
11794 <infoflow type="both" weight="10"/>
11795 </interface>
11796 -<interface name="corenet_udp_send_rtsp_port" lineno="74409">
11797 +<interface name="corenet_udp_send_rtsp_port" lineno="74830">
11798 <summary>
11799 Send UDP traffic on the rtsp port.
11800 </summary>
11801 @@ -56206,7 +56826,7 @@ Domain allowed access.
11802 </param>
11803 <infoflow type="write" weight="10"/>
11804 </interface>
11805 -<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="74424">
11806 +<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="74845">
11807 <summary>
11808 Do not audit attempts to send UDP traffic on the rtsp port.
11809 </summary>
11810 @@ -56217,7 +56837,7 @@ Domain to not audit.
11811 </param>
11812 <infoflow type="none"/>
11813 </interface>
11814 -<interface name="corenet_udp_receive_rtsp_port" lineno="74439">
11815 +<interface name="corenet_udp_receive_rtsp_port" lineno="74860">
11816 <summary>
11817 Receive UDP traffic on the rtsp port.
11818 </summary>
11819 @@ -56228,7 +56848,7 @@ Domain allowed access.
11820 </param>
11821 <infoflow type="read" weight="10"/>
11822 </interface>
11823 -<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="74454">
11824 +<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="74875">
11825 <summary>
11826 Do not audit attempts to receive UDP traffic on the rtsp port.
11827 </summary>
11828 @@ -56239,7 +56859,7 @@ Domain to not audit.
11829 </param>
11830 <infoflow type="none"/>
11831 </interface>
11832 -<interface name="corenet_udp_sendrecv_rtsp_port" lineno="74469">
11833 +<interface name="corenet_udp_sendrecv_rtsp_port" lineno="74890">
11834 <summary>
11835 Send and receive UDP traffic on the rtsp port.
11836 </summary>
11837 @@ -56250,7 +56870,7 @@ Domain allowed access.
11838 </param>
11839 <infoflow type="both" weight="10"/>
11840 </interface>
11841 -<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="74485">
11842 +<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="74906">
11843 <summary>
11844 Do not audit attempts to send and receive
11845 UDP traffic on the rtsp port.
11846 @@ -56262,7 +56882,7 @@ Domain to not audit.
11847 </param>
11848 <infoflow type="none"/>
11849 </interface>
11850 -<interface name="corenet_tcp_bind_rtsp_port" lineno="74500">
11851 +<interface name="corenet_tcp_bind_rtsp_port" lineno="74921">
11852 <summary>
11853 Bind TCP sockets to the rtsp port.
11854 </summary>
11855 @@ -56273,7 +56893,7 @@ Domain allowed access.
11856 </param>
11857 <infoflow type="none"/>
11858 </interface>
11859 -<interface name="corenet_udp_bind_rtsp_port" lineno="74520">
11860 +<interface name="corenet_udp_bind_rtsp_port" lineno="74941">
11861 <summary>
11862 Bind UDP sockets to the rtsp port.
11863 </summary>
11864 @@ -56284,7 +56904,7 @@ Domain allowed access.
11865 </param>
11866 <infoflow type="none"/>
11867 </interface>
11868 -<interface name="corenet_tcp_connect_rtsp_port" lineno="74539">
11869 +<interface name="corenet_tcp_connect_rtsp_port" lineno="74960">
11870 <summary>
11871 Make a TCP connection to the rtsp port.
11872 </summary>
11873 @@ -56294,7 +56914,7 @@ Domain allowed access.
11874 </summary>
11875 </param>
11876 </interface>
11877 -<interface name="corenet_send_rtsp_client_packets" lineno="74559">
11878 +<interface name="corenet_send_rtsp_client_packets" lineno="74980">
11879 <summary>
11880 Send rtsp_client packets.
11881 </summary>
11882 @@ -56305,7 +56925,7 @@ Domain allowed access.
11883 </param>
11884 <infoflow type="write" weight="10"/>
11885 </interface>
11886 -<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="74578">
11887 +<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="74999">
11888 <summary>
11889 Do not audit attempts to send rtsp_client packets.
11890 </summary>
11891 @@ -56316,7 +56936,7 @@ Domain to not audit.
11892 </param>
11893 <infoflow type="none"/>
11894 </interface>
11895 -<interface name="corenet_receive_rtsp_client_packets" lineno="74597">
11896 +<interface name="corenet_receive_rtsp_client_packets" lineno="75018">
11897 <summary>
11898 Receive rtsp_client packets.
11899 </summary>
11900 @@ -56327,7 +56947,7 @@ Domain allowed access.
11901 </param>
11902 <infoflow type="read" weight="10"/>
11903 </interface>
11904 -<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="74616">
11905 +<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="75037">
11906 <summary>
11907 Do not audit attempts to receive rtsp_client packets.
11908 </summary>
11909 @@ -56338,7 +56958,7 @@ Domain allowed access.
11910 </param>
11911 <infoflow type="none"/>
11912 </interface>
11913 -<interface name="corenet_sendrecv_rtsp_client_packets" lineno="74635">
11914 +<interface name="corenet_sendrecv_rtsp_client_packets" lineno="75056">
11915 <summary>
11916 Send and receive rtsp_client packets.
11917 </summary>
11918 @@ -56349,7 +56969,7 @@ Domain allowed access.
11919 </param>
11920 <infoflow type="both" weight="10"/>
11921 </interface>
11922 -<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="74651">
11923 +<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="75072">
11924 <summary>
11925 Do not audit attempts to send and receive rtsp_client packets.
11926 </summary>
11927 @@ -56360,7 +56980,7 @@ Domain to not audit.
11928 </param>
11929 <infoflow type="none"/>
11930 </interface>
11931 -<interface name="corenet_relabelto_rtsp_client_packets" lineno="74666">
11932 +<interface name="corenet_relabelto_rtsp_client_packets" lineno="75087">
11933 <summary>
11934 Relabel packets to rtsp_client the packet type.
11935 </summary>
11936 @@ -56370,7 +56990,7 @@ Domain allowed access.
11937 </summary>
11938 </param>
11939 </interface>
11940 -<interface name="corenet_send_rtsp_server_packets" lineno="74686">
11941 +<interface name="corenet_send_rtsp_server_packets" lineno="75107">
11942 <summary>
11943 Send rtsp_server packets.
11944 </summary>
11945 @@ -56381,7 +57001,7 @@ Domain allowed access.
11946 </param>
11947 <infoflow type="write" weight="10"/>
11948 </interface>
11949 -<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="74705">
11950 +<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="75126">
11951 <summary>
11952 Do not audit attempts to send rtsp_server packets.
11953 </summary>
11954 @@ -56392,7 +57012,7 @@ Domain to not audit.
11955 </param>
11956 <infoflow type="none"/>
11957 </interface>
11958 -<interface name="corenet_receive_rtsp_server_packets" lineno="74724">
11959 +<interface name="corenet_receive_rtsp_server_packets" lineno="75145">
11960 <summary>
11961 Receive rtsp_server packets.
11962 </summary>
11963 @@ -56403,7 +57023,7 @@ Domain allowed access.
11964 </param>
11965 <infoflow type="read" weight="10"/>
11966 </interface>
11967 -<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="74743">
11968 +<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="75164">
11969 <summary>
11970 Do not audit attempts to receive rtsp_server packets.
11971 </summary>
11972 @@ -56414,7 +57034,7 @@ Domain allowed access.
11973 </param>
11974 <infoflow type="none"/>
11975 </interface>
11976 -<interface name="corenet_sendrecv_rtsp_server_packets" lineno="74762">
11977 +<interface name="corenet_sendrecv_rtsp_server_packets" lineno="75183">
11978 <summary>
11979 Send and receive rtsp_server packets.
11980 </summary>
11981 @@ -56425,7 +57045,7 @@ Domain allowed access.
11982 </param>
11983 <infoflow type="both" weight="10"/>
11984 </interface>
11985 -<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="74778">
11986 +<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="75199">
11987 <summary>
11988 Do not audit attempts to send and receive rtsp_server packets.
11989 </summary>
11990 @@ -56436,7 +57056,7 @@ Domain to not audit.
11991 </param>
11992 <infoflow type="none"/>
11993 </interface>
11994 -<interface name="corenet_relabelto_rtsp_server_packets" lineno="74793">
11995 +<interface name="corenet_relabelto_rtsp_server_packets" lineno="75214">
11996 <summary>
11997 Relabel packets to rtsp_server the packet type.
11998 </summary>
11999 @@ -56446,7 +57066,7 @@ Domain allowed access.
12000 </summary>
12001 </param>
12002 </interface>
12003 -<interface name="corenet_tcp_sendrecv_rwho_port" lineno="74815">
12004 +<interface name="corenet_tcp_sendrecv_rwho_port" lineno="75236">
12005 <summary>
12006 Send and receive TCP traffic on the rwho port.
12007 </summary>
12008 @@ -56457,7 +57077,7 @@ Domain allowed access.
12009 </param>
12010 <infoflow type="both" weight="10"/>
12011 </interface>
12012 -<interface name="corenet_udp_send_rwho_port" lineno="74830">
12013 +<interface name="corenet_udp_send_rwho_port" lineno="75251">
12014 <summary>
12015 Send UDP traffic on the rwho port.
12016 </summary>
12017 @@ -56468,7 +57088,7 @@ Domain allowed access.
12018 </param>
12019 <infoflow type="write" weight="10"/>
12020 </interface>
12021 -<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="74845">
12022 +<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="75266">
12023 <summary>
12024 Do not audit attempts to send UDP traffic on the rwho port.
12025 </summary>
12026 @@ -56479,7 +57099,7 @@ Domain to not audit.
12027 </param>
12028 <infoflow type="none"/>
12029 </interface>
12030 -<interface name="corenet_udp_receive_rwho_port" lineno="74860">
12031 +<interface name="corenet_udp_receive_rwho_port" lineno="75281">
12032 <summary>
12033 Receive UDP traffic on the rwho port.
12034 </summary>
12035 @@ -56490,7 +57110,7 @@ Domain allowed access.
12036 </param>
12037 <infoflow type="read" weight="10"/>
12038 </interface>
12039 -<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="74875">
12040 +<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="75296">
12041 <summary>
12042 Do not audit attempts to receive UDP traffic on the rwho port.
12043 </summary>
12044 @@ -56501,7 +57121,7 @@ Domain to not audit.
12045 </param>
12046 <infoflow type="none"/>
12047 </interface>
12048 -<interface name="corenet_udp_sendrecv_rwho_port" lineno="74890">
12049 +<interface name="corenet_udp_sendrecv_rwho_port" lineno="75311">
12050 <summary>
12051 Send and receive UDP traffic on the rwho port.
12052 </summary>
12053 @@ -56512,7 +57132,7 @@ Domain allowed access.
12054 </param>
12055 <infoflow type="both" weight="10"/>
12056 </interface>
12057 -<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="74906">
12058 +<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="75327">
12059 <summary>
12060 Do not audit attempts to send and receive
12061 UDP traffic on the rwho port.
12062 @@ -56524,7 +57144,7 @@ Domain to not audit.
12063 </param>
12064 <infoflow type="none"/>
12065 </interface>
12066 -<interface name="corenet_tcp_bind_rwho_port" lineno="74921">
12067 +<interface name="corenet_tcp_bind_rwho_port" lineno="75342">
12068 <summary>
12069 Bind TCP sockets to the rwho port.
12070 </summary>
12071 @@ -56535,7 +57155,7 @@ Domain allowed access.
12072 </param>
12073 <infoflow type="none"/>
12074 </interface>
12075 -<interface name="corenet_udp_bind_rwho_port" lineno="74941">
12076 +<interface name="corenet_udp_bind_rwho_port" lineno="75362">
12077 <summary>
12078 Bind UDP sockets to the rwho port.
12079 </summary>
12080 @@ -56546,7 +57166,7 @@ Domain allowed access.
12081 </param>
12082 <infoflow type="none"/>
12083 </interface>
12084 -<interface name="corenet_tcp_connect_rwho_port" lineno="74960">
12085 +<interface name="corenet_tcp_connect_rwho_port" lineno="75381">
12086 <summary>
12087 Make a TCP connection to the rwho port.
12088 </summary>
12089 @@ -56556,7 +57176,7 @@ Domain allowed access.
12090 </summary>
12091 </param>
12092 </interface>
12093 -<interface name="corenet_send_rwho_client_packets" lineno="74980">
12094 +<interface name="corenet_send_rwho_client_packets" lineno="75401">
12095 <summary>
12096 Send rwho_client packets.
12097 </summary>
12098 @@ -56567,7 +57187,7 @@ Domain allowed access.
12099 </param>
12100 <infoflow type="write" weight="10"/>
12101 </interface>
12102 -<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="74999">
12103 +<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="75420">
12104 <summary>
12105 Do not audit attempts to send rwho_client packets.
12106 </summary>
12107 @@ -56578,7 +57198,7 @@ Domain to not audit.
12108 </param>
12109 <infoflow type="none"/>
12110 </interface>
12111 -<interface name="corenet_receive_rwho_client_packets" lineno="75018">
12112 +<interface name="corenet_receive_rwho_client_packets" lineno="75439">
12113 <summary>
12114 Receive rwho_client packets.
12115 </summary>
12116 @@ -56589,7 +57209,7 @@ Domain allowed access.
12117 </param>
12118 <infoflow type="read" weight="10"/>
12119 </interface>
12120 -<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="75037">
12121 +<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="75458">
12122 <summary>
12123 Do not audit attempts to receive rwho_client packets.
12124 </summary>
12125 @@ -56600,7 +57220,7 @@ Domain allowed access.
12126 </param>
12127 <infoflow type="none"/>
12128 </interface>
12129 -<interface name="corenet_sendrecv_rwho_client_packets" lineno="75056">
12130 +<interface name="corenet_sendrecv_rwho_client_packets" lineno="75477">
12131 <summary>
12132 Send and receive rwho_client packets.
12133 </summary>
12134 @@ -56611,7 +57231,7 @@ Domain allowed access.
12135 </param>
12136 <infoflow type="both" weight="10"/>
12137 </interface>
12138 -<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="75072">
12139 +<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="75493">
12140 <summary>
12141 Do not audit attempts to send and receive rwho_client packets.
12142 </summary>
12143 @@ -56622,7 +57242,7 @@ Domain to not audit.
12144 </param>
12145 <infoflow type="none"/>
12146 </interface>
12147 -<interface name="corenet_relabelto_rwho_client_packets" lineno="75087">
12148 +<interface name="corenet_relabelto_rwho_client_packets" lineno="75508">
12149 <summary>
12150 Relabel packets to rwho_client the packet type.
12151 </summary>
12152 @@ -56632,7 +57252,7 @@ Domain allowed access.
12153 </summary>
12154 </param>
12155 </interface>
12156 -<interface name="corenet_send_rwho_server_packets" lineno="75107">
12157 +<interface name="corenet_send_rwho_server_packets" lineno="75528">
12158 <summary>
12159 Send rwho_server packets.
12160 </summary>
12161 @@ -56643,7 +57263,7 @@ Domain allowed access.
12162 </param>
12163 <infoflow type="write" weight="10"/>
12164 </interface>
12165 -<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="75126">
12166 +<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="75547">
12167 <summary>
12168 Do not audit attempts to send rwho_server packets.
12169 </summary>
12170 @@ -56654,7 +57274,7 @@ Domain to not audit.
12171 </param>
12172 <infoflow type="none"/>
12173 </interface>
12174 -<interface name="corenet_receive_rwho_server_packets" lineno="75145">
12175 +<interface name="corenet_receive_rwho_server_packets" lineno="75566">
12176 <summary>
12177 Receive rwho_server packets.
12178 </summary>
12179 @@ -56665,7 +57285,7 @@ Domain allowed access.
12180 </param>
12181 <infoflow type="read" weight="10"/>
12182 </interface>
12183 -<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="75164">
12184 +<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="75585">
12185 <summary>
12186 Do not audit attempts to receive rwho_server packets.
12187 </summary>
12188 @@ -56676,7 +57296,7 @@ Domain allowed access.
12189 </param>
12190 <infoflow type="none"/>
12191 </interface>
12192 -<interface name="corenet_sendrecv_rwho_server_packets" lineno="75183">
12193 +<interface name="corenet_sendrecv_rwho_server_packets" lineno="75604">
12194 <summary>
12195 Send and receive rwho_server packets.
12196 </summary>
12197 @@ -56687,7 +57307,7 @@ Domain allowed access.
12198 </param>
12199 <infoflow type="both" weight="10"/>
12200 </interface>
12201 -<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="75199">
12202 +<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="75620">
12203 <summary>
12204 Do not audit attempts to send and receive rwho_server packets.
12205 </summary>
12206 @@ -56698,7 +57318,7 @@ Domain to not audit.
12207 </param>
12208 <infoflow type="none"/>
12209 </interface>
12210 -<interface name="corenet_relabelto_rwho_server_packets" lineno="75214">
12211 +<interface name="corenet_relabelto_rwho_server_packets" lineno="75635">
12212 <summary>
12213 Relabel packets to rwho_server the packet type.
12214 </summary>
12215 @@ -56708,7 +57328,7 @@ Domain allowed access.
12216 </summary>
12217 </param>
12218 </interface>
12219 -<interface name="corenet_tcp_sendrecv_salt_port" lineno="75236">
12220 +<interface name="corenet_tcp_sendrecv_salt_port" lineno="75657">
12221 <summary>
12222 Send and receive TCP traffic on the salt port.
12223 </summary>
12224 @@ -56719,7 +57339,7 @@ Domain allowed access.
12225 </param>
12226 <infoflow type="both" weight="10"/>
12227 </interface>
12228 -<interface name="corenet_udp_send_salt_port" lineno="75251">
12229 +<interface name="corenet_udp_send_salt_port" lineno="75672">
12230 <summary>
12231 Send UDP traffic on the salt port.
12232 </summary>
12233 @@ -56730,7 +57350,7 @@ Domain allowed access.
12234 </param>
12235 <infoflow type="write" weight="10"/>
12236 </interface>
12237 -<interface name="corenet_dontaudit_udp_send_salt_port" lineno="75266">
12238 +<interface name="corenet_dontaudit_udp_send_salt_port" lineno="75687">
12239 <summary>
12240 Do not audit attempts to send UDP traffic on the salt port.
12241 </summary>
12242 @@ -56741,7 +57361,7 @@ Domain to not audit.
12243 </param>
12244 <infoflow type="none"/>
12245 </interface>
12246 -<interface name="corenet_udp_receive_salt_port" lineno="75281">
12247 +<interface name="corenet_udp_receive_salt_port" lineno="75702">
12248 <summary>
12249 Receive UDP traffic on the salt port.
12250 </summary>
12251 @@ -56752,7 +57372,7 @@ Domain allowed access.
12252 </param>
12253 <infoflow type="read" weight="10"/>
12254 </interface>
12255 -<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="75296">
12256 +<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="75717">
12257 <summary>
12258 Do not audit attempts to receive UDP traffic on the salt port.
12259 </summary>
12260 @@ -56763,7 +57383,7 @@ Domain to not audit.
12261 </param>
12262 <infoflow type="none"/>
12263 </interface>
12264 -<interface name="corenet_udp_sendrecv_salt_port" lineno="75311">
12265 +<interface name="corenet_udp_sendrecv_salt_port" lineno="75732">
12266 <summary>
12267 Send and receive UDP traffic on the salt port.
12268 </summary>
12269 @@ -56774,7 +57394,7 @@ Domain allowed access.
12270 </param>
12271 <infoflow type="both" weight="10"/>
12272 </interface>
12273 -<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="75327">
12274 +<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="75748">
12275 <summary>
12276 Do not audit attempts to send and receive
12277 UDP traffic on the salt port.
12278 @@ -56786,7 +57406,7 @@ Domain to not audit.
12279 </param>
12280 <infoflow type="none"/>
12281 </interface>
12282 -<interface name="corenet_tcp_bind_salt_port" lineno="75342">
12283 +<interface name="corenet_tcp_bind_salt_port" lineno="75763">
12284 <summary>
12285 Bind TCP sockets to the salt port.
12286 </summary>
12287 @@ -56797,7 +57417,7 @@ Domain allowed access.
12288 </param>
12289 <infoflow type="none"/>
12290 </interface>
12291 -<interface name="corenet_udp_bind_salt_port" lineno="75362">
12292 +<interface name="corenet_udp_bind_salt_port" lineno="75783">
12293 <summary>
12294 Bind UDP sockets to the salt port.
12295 </summary>
12296 @@ -56808,7 +57428,7 @@ Domain allowed access.
12297 </param>
12298 <infoflow type="none"/>
12299 </interface>
12300 -<interface name="corenet_tcp_connect_salt_port" lineno="75381">
12301 +<interface name="corenet_tcp_connect_salt_port" lineno="75802">
12302 <summary>
12303 Make a TCP connection to the salt port.
12304 </summary>
12305 @@ -56818,7 +57438,7 @@ Domain allowed access.
12306 </summary>
12307 </param>
12308 </interface>
12309 -<interface name="corenet_send_salt_client_packets" lineno="75401">
12310 +<interface name="corenet_send_salt_client_packets" lineno="75822">
12311 <summary>
12312 Send salt_client packets.
12313 </summary>
12314 @@ -56829,7 +57449,7 @@ Domain allowed access.
12315 </param>
12316 <infoflow type="write" weight="10"/>
12317 </interface>
12318 -<interface name="corenet_dontaudit_send_salt_client_packets" lineno="75420">
12319 +<interface name="corenet_dontaudit_send_salt_client_packets" lineno="75841">
12320 <summary>
12321 Do not audit attempts to send salt_client packets.
12322 </summary>
12323 @@ -56840,7 +57460,7 @@ Domain to not audit.
12324 </param>
12325 <infoflow type="none"/>
12326 </interface>
12327 -<interface name="corenet_receive_salt_client_packets" lineno="75439">
12328 +<interface name="corenet_receive_salt_client_packets" lineno="75860">
12329 <summary>
12330 Receive salt_client packets.
12331 </summary>
12332 @@ -56851,7 +57471,7 @@ Domain allowed access.
12333 </param>
12334 <infoflow type="read" weight="10"/>
12335 </interface>
12336 -<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="75458">
12337 +<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="75879">
12338 <summary>
12339 Do not audit attempts to receive salt_client packets.
12340 </summary>
12341 @@ -56862,7 +57482,7 @@ Domain allowed access.
12342 </param>
12343 <infoflow type="none"/>
12344 </interface>
12345 -<interface name="corenet_sendrecv_salt_client_packets" lineno="75477">
12346 +<interface name="corenet_sendrecv_salt_client_packets" lineno="75898">
12347 <summary>
12348 Send and receive salt_client packets.
12349 </summary>
12350 @@ -56873,7 +57493,7 @@ Domain allowed access.
12351 </param>
12352 <infoflow type="both" weight="10"/>
12353 </interface>
12354 -<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="75493">
12355 +<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="75914">
12356 <summary>
12357 Do not audit attempts to send and receive salt_client packets.
12358 </summary>
12359 @@ -56884,7 +57504,7 @@ Domain to not audit.
12360 </param>
12361 <infoflow type="none"/>
12362 </interface>
12363 -<interface name="corenet_relabelto_salt_client_packets" lineno="75508">
12364 +<interface name="corenet_relabelto_salt_client_packets" lineno="75929">
12365 <summary>
12366 Relabel packets to salt_client the packet type.
12367 </summary>
12368 @@ -56894,7 +57514,7 @@ Domain allowed access.
12369 </summary>
12370 </param>
12371 </interface>
12372 -<interface name="corenet_send_salt_server_packets" lineno="75528">
12373 +<interface name="corenet_send_salt_server_packets" lineno="75949">
12374 <summary>
12375 Send salt_server packets.
12376 </summary>
12377 @@ -56905,7 +57525,7 @@ Domain allowed access.
12378 </param>
12379 <infoflow type="write" weight="10"/>
12380 </interface>
12381 -<interface name="corenet_dontaudit_send_salt_server_packets" lineno="75547">
12382 +<interface name="corenet_dontaudit_send_salt_server_packets" lineno="75968">
12383 <summary>
12384 Do not audit attempts to send salt_server packets.
12385 </summary>
12386 @@ -56916,7 +57536,7 @@ Domain to not audit.
12387 </param>
12388 <infoflow type="none"/>
12389 </interface>
12390 -<interface name="corenet_receive_salt_server_packets" lineno="75566">
12391 +<interface name="corenet_receive_salt_server_packets" lineno="75987">
12392 <summary>
12393 Receive salt_server packets.
12394 </summary>
12395 @@ -56927,7 +57547,7 @@ Domain allowed access.
12396 </param>
12397 <infoflow type="read" weight="10"/>
12398 </interface>
12399 -<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="75585">
12400 +<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="76006">
12401 <summary>
12402 Do not audit attempts to receive salt_server packets.
12403 </summary>
12404 @@ -56938,7 +57558,7 @@ Domain allowed access.
12405 </param>
12406 <infoflow type="none"/>
12407 </interface>
12408 -<interface name="corenet_sendrecv_salt_server_packets" lineno="75604">
12409 +<interface name="corenet_sendrecv_salt_server_packets" lineno="76025">
12410 <summary>
12411 Send and receive salt_server packets.
12412 </summary>
12413 @@ -56949,7 +57569,7 @@ Domain allowed access.
12414 </param>
12415 <infoflow type="both" weight="10"/>
12416 </interface>
12417 -<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="75620">
12418 +<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="76041">
12419 <summary>
12420 Do not audit attempts to send and receive salt_server packets.
12421 </summary>
12422 @@ -56960,7 +57580,7 @@ Domain to not audit.
12423 </param>
12424 <infoflow type="none"/>
12425 </interface>
12426 -<interface name="corenet_relabelto_salt_server_packets" lineno="75635">
12427 +<interface name="corenet_relabelto_salt_server_packets" lineno="76056">
12428 <summary>
12429 Relabel packets to salt_server the packet type.
12430 </summary>
12431 @@ -56970,7 +57590,7 @@ Domain allowed access.
12432 </summary>
12433 </param>
12434 </interface>
12435 -<interface name="corenet_tcp_sendrecv_sap_port" lineno="75657">
12436 +<interface name="corenet_tcp_sendrecv_sap_port" lineno="76078">
12437 <summary>
12438 Send and receive TCP traffic on the sap port.
12439 </summary>
12440 @@ -56981,7 +57601,7 @@ Domain allowed access.
12441 </param>
12442 <infoflow type="both" weight="10"/>
12443 </interface>
12444 -<interface name="corenet_udp_send_sap_port" lineno="75672">
12445 +<interface name="corenet_udp_send_sap_port" lineno="76093">
12446 <summary>
12447 Send UDP traffic on the sap port.
12448 </summary>
12449 @@ -56992,7 +57612,7 @@ Domain allowed access.
12450 </param>
12451 <infoflow type="write" weight="10"/>
12452 </interface>
12453 -<interface name="corenet_dontaudit_udp_send_sap_port" lineno="75687">
12454 +<interface name="corenet_dontaudit_udp_send_sap_port" lineno="76108">
12455 <summary>
12456 Do not audit attempts to send UDP traffic on the sap port.
12457 </summary>
12458 @@ -57003,7 +57623,7 @@ Domain to not audit.
12459 </param>
12460 <infoflow type="none"/>
12461 </interface>
12462 -<interface name="corenet_udp_receive_sap_port" lineno="75702">
12463 +<interface name="corenet_udp_receive_sap_port" lineno="76123">
12464 <summary>
12465 Receive UDP traffic on the sap port.
12466 </summary>
12467 @@ -57014,7 +57634,7 @@ Domain allowed access.
12468 </param>
12469 <infoflow type="read" weight="10"/>
12470 </interface>
12471 -<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="75717">
12472 +<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="76138">
12473 <summary>
12474 Do not audit attempts to receive UDP traffic on the sap port.
12475 </summary>
12476 @@ -57025,7 +57645,7 @@ Domain to not audit.
12477 </param>
12478 <infoflow type="none"/>
12479 </interface>
12480 -<interface name="corenet_udp_sendrecv_sap_port" lineno="75732">
12481 +<interface name="corenet_udp_sendrecv_sap_port" lineno="76153">
12482 <summary>
12483 Send and receive UDP traffic on the sap port.
12484 </summary>
12485 @@ -57036,7 +57656,7 @@ Domain allowed access.
12486 </param>
12487 <infoflow type="both" weight="10"/>
12488 </interface>
12489 -<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="75748">
12490 +<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="76169">
12491 <summary>
12492 Do not audit attempts to send and receive
12493 UDP traffic on the sap port.
12494 @@ -57048,7 +57668,7 @@ Domain to not audit.
12495 </param>
12496 <infoflow type="none"/>
12497 </interface>
12498 -<interface name="corenet_tcp_bind_sap_port" lineno="75763">
12499 +<interface name="corenet_tcp_bind_sap_port" lineno="76184">
12500 <summary>
12501 Bind TCP sockets to the sap port.
12502 </summary>
12503 @@ -57059,7 +57679,7 @@ Domain allowed access.
12504 </param>
12505 <infoflow type="none"/>
12506 </interface>
12507 -<interface name="corenet_udp_bind_sap_port" lineno="75783">
12508 +<interface name="corenet_udp_bind_sap_port" lineno="76204">
12509 <summary>
12510 Bind UDP sockets to the sap port.
12511 </summary>
12512 @@ -57070,7 +57690,7 @@ Domain allowed access.
12513 </param>
12514 <infoflow type="none"/>
12515 </interface>
12516 -<interface name="corenet_tcp_connect_sap_port" lineno="75802">
12517 +<interface name="corenet_tcp_connect_sap_port" lineno="76223">
12518 <summary>
12519 Make a TCP connection to the sap port.
12520 </summary>
12521 @@ -57080,7 +57700,7 @@ Domain allowed access.
12522 </summary>
12523 </param>
12524 </interface>
12525 -<interface name="corenet_send_sap_client_packets" lineno="75822">
12526 +<interface name="corenet_send_sap_client_packets" lineno="76243">
12527 <summary>
12528 Send sap_client packets.
12529 </summary>
12530 @@ -57091,7 +57711,7 @@ Domain allowed access.
12531 </param>
12532 <infoflow type="write" weight="10"/>
12533 </interface>
12534 -<interface name="corenet_dontaudit_send_sap_client_packets" lineno="75841">
12535 +<interface name="corenet_dontaudit_send_sap_client_packets" lineno="76262">
12536 <summary>
12537 Do not audit attempts to send sap_client packets.
12538 </summary>
12539 @@ -57102,7 +57722,7 @@ Domain to not audit.
12540 </param>
12541 <infoflow type="none"/>
12542 </interface>
12543 -<interface name="corenet_receive_sap_client_packets" lineno="75860">
12544 +<interface name="corenet_receive_sap_client_packets" lineno="76281">
12545 <summary>
12546 Receive sap_client packets.
12547 </summary>
12548 @@ -57113,7 +57733,7 @@ Domain allowed access.
12549 </param>
12550 <infoflow type="read" weight="10"/>
12551 </interface>
12552 -<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="75879">
12553 +<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="76300">
12554 <summary>
12555 Do not audit attempts to receive sap_client packets.
12556 </summary>
12557 @@ -57124,7 +57744,7 @@ Domain allowed access.
12558 </param>
12559 <infoflow type="none"/>
12560 </interface>
12561 -<interface name="corenet_sendrecv_sap_client_packets" lineno="75898">
12562 +<interface name="corenet_sendrecv_sap_client_packets" lineno="76319">
12563 <summary>
12564 Send and receive sap_client packets.
12565 </summary>
12566 @@ -57135,7 +57755,7 @@ Domain allowed access.
12567 </param>
12568 <infoflow type="both" weight="10"/>
12569 </interface>
12570 -<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="75914">
12571 +<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="76335">
12572 <summary>
12573 Do not audit attempts to send and receive sap_client packets.
12574 </summary>
12575 @@ -57146,7 +57766,7 @@ Domain to not audit.
12576 </param>
12577 <infoflow type="none"/>
12578 </interface>
12579 -<interface name="corenet_relabelto_sap_client_packets" lineno="75929">
12580 +<interface name="corenet_relabelto_sap_client_packets" lineno="76350">
12581 <summary>
12582 Relabel packets to sap_client the packet type.
12583 </summary>
12584 @@ -57156,7 +57776,7 @@ Domain allowed access.
12585 </summary>
12586 </param>
12587 </interface>
12588 -<interface name="corenet_send_sap_server_packets" lineno="75949">
12589 +<interface name="corenet_send_sap_server_packets" lineno="76370">
12590 <summary>
12591 Send sap_server packets.
12592 </summary>
12593 @@ -57167,7 +57787,7 @@ Domain allowed access.
12594 </param>
12595 <infoflow type="write" weight="10"/>
12596 </interface>
12597 -<interface name="corenet_dontaudit_send_sap_server_packets" lineno="75968">
12598 +<interface name="corenet_dontaudit_send_sap_server_packets" lineno="76389">
12599 <summary>
12600 Do not audit attempts to send sap_server packets.
12601 </summary>
12602 @@ -57178,7 +57798,7 @@ Domain to not audit.
12603 </param>
12604 <infoflow type="none"/>
12605 </interface>
12606 -<interface name="corenet_receive_sap_server_packets" lineno="75987">
12607 +<interface name="corenet_receive_sap_server_packets" lineno="76408">
12608 <summary>
12609 Receive sap_server packets.
12610 </summary>
12611 @@ -57189,7 +57809,7 @@ Domain allowed access.
12612 </param>
12613 <infoflow type="read" weight="10"/>
12614 </interface>
12615 -<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="76006">
12616 +<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="76427">
12617 <summary>
12618 Do not audit attempts to receive sap_server packets.
12619 </summary>
12620 @@ -57200,7 +57820,7 @@ Domain allowed access.
12621 </param>
12622 <infoflow type="none"/>
12623 </interface>
12624 -<interface name="corenet_sendrecv_sap_server_packets" lineno="76025">
12625 +<interface name="corenet_sendrecv_sap_server_packets" lineno="76446">
12626 <summary>
12627 Send and receive sap_server packets.
12628 </summary>
12629 @@ -57211,7 +57831,7 @@ Domain allowed access.
12630 </param>
12631 <infoflow type="both" weight="10"/>
12632 </interface>
12633 -<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="76041">
12634 +<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="76462">
12635 <summary>
12636 Do not audit attempts to send and receive sap_server packets.
12637 </summary>
12638 @@ -57222,7 +57842,7 @@ Domain to not audit.
12639 </param>
12640 <infoflow type="none"/>
12641 </interface>
12642 -<interface name="corenet_relabelto_sap_server_packets" lineno="76056">
12643 +<interface name="corenet_relabelto_sap_server_packets" lineno="76477">
12644 <summary>
12645 Relabel packets to sap_server the packet type.
12646 </summary>
12647 @@ -57232,7 +57852,7 @@ Domain allowed access.
12648 </summary>
12649 </param>
12650 </interface>
12651 -<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="76078">
12652 +<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="76499">
12653 <summary>
12654 Send and receive TCP traffic on the servistaitsm port.
12655 </summary>
12656 @@ -57243,7 +57863,7 @@ Domain allowed access.
12657 </param>
12658 <infoflow type="both" weight="10"/>
12659 </interface>
12660 -<interface name="corenet_udp_send_servistaitsm_port" lineno="76093">
12661 +<interface name="corenet_udp_send_servistaitsm_port" lineno="76514">
12662 <summary>
12663 Send UDP traffic on the servistaitsm port.
12664 </summary>
12665 @@ -57254,7 +57874,7 @@ Domain allowed access.
12666 </param>
12667 <infoflow type="write" weight="10"/>
12668 </interface>
12669 -<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="76108">
12670 +<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="76529">
12671 <summary>
12672 Do not audit attempts to send UDP traffic on the servistaitsm port.
12673 </summary>
12674 @@ -57265,7 +57885,7 @@ Domain to not audit.
12675 </param>
12676 <infoflow type="none"/>
12677 </interface>
12678 -<interface name="corenet_udp_receive_servistaitsm_port" lineno="76123">
12679 +<interface name="corenet_udp_receive_servistaitsm_port" lineno="76544">
12680 <summary>
12681 Receive UDP traffic on the servistaitsm port.
12682 </summary>
12683 @@ -57276,7 +57896,7 @@ Domain allowed access.
12684 </param>
12685 <infoflow type="read" weight="10"/>
12686 </interface>
12687 -<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="76138">
12688 +<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="76559">
12689 <summary>
12690 Do not audit attempts to receive UDP traffic on the servistaitsm port.
12691 </summary>
12692 @@ -57287,7 +57907,7 @@ Domain to not audit.
12693 </param>
12694 <infoflow type="none"/>
12695 </interface>
12696 -<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="76153">
12697 +<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="76574">
12698 <summary>
12699 Send and receive UDP traffic on the servistaitsm port.
12700 </summary>
12701 @@ -57298,7 +57918,7 @@ Domain allowed access.
12702 </param>
12703 <infoflow type="both" weight="10"/>
12704 </interface>
12705 -<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="76169">
12706 +<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="76590">
12707 <summary>
12708 Do not audit attempts to send and receive
12709 UDP traffic on the servistaitsm port.
12710 @@ -57310,7 +57930,7 @@ Domain to not audit.
12711 </param>
12712 <infoflow type="none"/>
12713 </interface>
12714 -<interface name="corenet_tcp_bind_servistaitsm_port" lineno="76184">
12715 +<interface name="corenet_tcp_bind_servistaitsm_port" lineno="76605">
12716 <summary>
12717 Bind TCP sockets to the servistaitsm port.
12718 </summary>
12719 @@ -57321,7 +57941,7 @@ Domain allowed access.
12720 </param>
12721 <infoflow type="none"/>
12722 </interface>
12723 -<interface name="corenet_udp_bind_servistaitsm_port" lineno="76204">
12724 +<interface name="corenet_udp_bind_servistaitsm_port" lineno="76625">
12725 <summary>
12726 Bind UDP sockets to the servistaitsm port.
12727 </summary>
12728 @@ -57332,7 +57952,7 @@ Domain allowed access.
12729 </param>
12730 <infoflow type="none"/>
12731 </interface>
12732 -<interface name="corenet_tcp_connect_servistaitsm_port" lineno="76223">
12733 +<interface name="corenet_tcp_connect_servistaitsm_port" lineno="76644">
12734 <summary>
12735 Make a TCP connection to the servistaitsm port.
12736 </summary>
12737 @@ -57342,7 +57962,7 @@ Domain allowed access.
12738 </summary>
12739 </param>
12740 </interface>
12741 -<interface name="corenet_send_servistaitsm_client_packets" lineno="76243">
12742 +<interface name="corenet_send_servistaitsm_client_packets" lineno="76664">
12743 <summary>
12744 Send servistaitsm_client packets.
12745 </summary>
12746 @@ -57353,7 +57973,7 @@ Domain allowed access.
12747 </param>
12748 <infoflow type="write" weight="10"/>
12749 </interface>
12750 -<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="76262">
12751 +<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="76683">
12752 <summary>
12753 Do not audit attempts to send servistaitsm_client packets.
12754 </summary>
12755 @@ -57364,7 +57984,7 @@ Domain to not audit.
12756 </param>
12757 <infoflow type="none"/>
12758 </interface>
12759 -<interface name="corenet_receive_servistaitsm_client_packets" lineno="76281">
12760 +<interface name="corenet_receive_servistaitsm_client_packets" lineno="76702">
12761 <summary>
12762 Receive servistaitsm_client packets.
12763 </summary>
12764 @@ -57375,7 +57995,7 @@ Domain allowed access.
12765 </param>
12766 <infoflow type="read" weight="10"/>
12767 </interface>
12768 -<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="76300">
12769 +<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="76721">
12770 <summary>
12771 Do not audit attempts to receive servistaitsm_client packets.
12772 </summary>
12773 @@ -57386,7 +58006,7 @@ Domain allowed access.
12774 </param>
12775 <infoflow type="none"/>
12776 </interface>
12777 -<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="76319">
12778 +<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="76740">
12779 <summary>
12780 Send and receive servistaitsm_client packets.
12781 </summary>
12782 @@ -57397,7 +58017,7 @@ Domain allowed access.
12783 </param>
12784 <infoflow type="both" weight="10"/>
12785 </interface>
12786 -<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="76335">
12787 +<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="76756">
12788 <summary>
12789 Do not audit attempts to send and receive servistaitsm_client packets.
12790 </summary>
12791 @@ -57408,7 +58028,7 @@ Domain to not audit.
12792 </param>
12793 <infoflow type="none"/>
12794 </interface>
12795 -<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="76350">
12796 +<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="76771">
12797 <summary>
12798 Relabel packets to servistaitsm_client the packet type.
12799 </summary>
12800 @@ -57418,7 +58038,7 @@ Domain allowed access.
12801 </summary>
12802 </param>
12803 </interface>
12804 -<interface name="corenet_send_servistaitsm_server_packets" lineno="76370">
12805 +<interface name="corenet_send_servistaitsm_server_packets" lineno="76791">
12806 <summary>
12807 Send servistaitsm_server packets.
12808 </summary>
12809 @@ -57429,7 +58049,7 @@ Domain allowed access.
12810 </param>
12811 <infoflow type="write" weight="10"/>
12812 </interface>
12813 -<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="76389">
12814 +<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="76810">
12815 <summary>
12816 Do not audit attempts to send servistaitsm_server packets.
12817 </summary>
12818 @@ -57440,7 +58060,7 @@ Domain to not audit.
12819 </param>
12820 <infoflow type="none"/>
12821 </interface>
12822 -<interface name="corenet_receive_servistaitsm_server_packets" lineno="76408">
12823 +<interface name="corenet_receive_servistaitsm_server_packets" lineno="76829">
12824 <summary>
12825 Receive servistaitsm_server packets.
12826 </summary>
12827 @@ -57451,7 +58071,7 @@ Domain allowed access.
12828 </param>
12829 <infoflow type="read" weight="10"/>
12830 </interface>
12831 -<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="76427">
12832 +<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="76848">
12833 <summary>
12834 Do not audit attempts to receive servistaitsm_server packets.
12835 </summary>
12836 @@ -57462,7 +58082,7 @@ Domain allowed access.
12837 </param>
12838 <infoflow type="none"/>
12839 </interface>
12840 -<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="76446">
12841 +<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="76867">
12842 <summary>
12843 Send and receive servistaitsm_server packets.
12844 </summary>
12845 @@ -57473,7 +58093,7 @@ Domain allowed access.
12846 </param>
12847 <infoflow type="both" weight="10"/>
12848 </interface>
12849 -<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="76462">
12850 +<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="76883">
12851 <summary>
12852 Do not audit attempts to send and receive servistaitsm_server packets.
12853 </summary>
12854 @@ -57484,7 +58104,7 @@ Domain to not audit.
12855 </param>
12856 <infoflow type="none"/>
12857 </interface>
12858 -<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="76477">
12859 +<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="76898">
12860 <summary>
12861 Relabel packets to servistaitsm_server the packet type.
12862 </summary>
12863 @@ -57494,7 +58114,7 @@ Domain allowed access.
12864 </summary>
12865 </param>
12866 </interface>
12867 -<interface name="corenet_tcp_sendrecv_sieve_port" lineno="76499">
12868 +<interface name="corenet_tcp_sendrecv_sieve_port" lineno="76920">
12869 <summary>
12870 Send and receive TCP traffic on the sieve port.
12871 </summary>
12872 @@ -57505,7 +58125,7 @@ Domain allowed access.
12873 </param>
12874 <infoflow type="both" weight="10"/>
12875 </interface>
12876 -<interface name="corenet_udp_send_sieve_port" lineno="76514">
12877 +<interface name="corenet_udp_send_sieve_port" lineno="76935">
12878 <summary>
12879 Send UDP traffic on the sieve port.
12880 </summary>
12881 @@ -57516,7 +58136,7 @@ Domain allowed access.
12882 </param>
12883 <infoflow type="write" weight="10"/>
12884 </interface>
12885 -<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="76529">
12886 +<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="76950">
12887 <summary>
12888 Do not audit attempts to send UDP traffic on the sieve port.
12889 </summary>
12890 @@ -57527,7 +58147,7 @@ Domain to not audit.
12891 </param>
12892 <infoflow type="none"/>
12893 </interface>
12894 -<interface name="corenet_udp_receive_sieve_port" lineno="76544">
12895 +<interface name="corenet_udp_receive_sieve_port" lineno="76965">
12896 <summary>
12897 Receive UDP traffic on the sieve port.
12898 </summary>
12899 @@ -57538,7 +58158,7 @@ Domain allowed access.
12900 </param>
12901 <infoflow type="read" weight="10"/>
12902 </interface>
12903 -<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="76559">
12904 +<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="76980">
12905 <summary>
12906 Do not audit attempts to receive UDP traffic on the sieve port.
12907 </summary>
12908 @@ -57549,7 +58169,7 @@ Domain to not audit.
12909 </param>
12910 <infoflow type="none"/>
12911 </interface>
12912 -<interface name="corenet_udp_sendrecv_sieve_port" lineno="76574">
12913 +<interface name="corenet_udp_sendrecv_sieve_port" lineno="76995">
12914 <summary>
12915 Send and receive UDP traffic on the sieve port.
12916 </summary>
12917 @@ -57560,7 +58180,7 @@ Domain allowed access.
12918 </param>
12919 <infoflow type="both" weight="10"/>
12920 </interface>
12921 -<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="76590">
12922 +<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="77011">
12923 <summary>
12924 Do not audit attempts to send and receive
12925 UDP traffic on the sieve port.
12926 @@ -57572,7 +58192,7 @@ Domain to not audit.
12927 </param>
12928 <infoflow type="none"/>
12929 </interface>
12930 -<interface name="corenet_tcp_bind_sieve_port" lineno="76605">
12931 +<interface name="corenet_tcp_bind_sieve_port" lineno="77026">
12932 <summary>
12933 Bind TCP sockets to the sieve port.
12934 </summary>
12935 @@ -57583,7 +58203,7 @@ Domain allowed access.
12936 </param>
12937 <infoflow type="none"/>
12938 </interface>
12939 -<interface name="corenet_udp_bind_sieve_port" lineno="76625">
12940 +<interface name="corenet_udp_bind_sieve_port" lineno="77046">
12941 <summary>
12942 Bind UDP sockets to the sieve port.
12943 </summary>
12944 @@ -57594,7 +58214,7 @@ Domain allowed access.
12945 </param>
12946 <infoflow type="none"/>
12947 </interface>
12948 -<interface name="corenet_tcp_connect_sieve_port" lineno="76644">
12949 +<interface name="corenet_tcp_connect_sieve_port" lineno="77065">
12950 <summary>
12951 Make a TCP connection to the sieve port.
12952 </summary>
12953 @@ -57604,7 +58224,7 @@ Domain allowed access.
12954 </summary>
12955 </param>
12956 </interface>
12957 -<interface name="corenet_send_sieve_client_packets" lineno="76664">
12958 +<interface name="corenet_send_sieve_client_packets" lineno="77085">
12959 <summary>
12960 Send sieve_client packets.
12961 </summary>
12962 @@ -57615,7 +58235,7 @@ Domain allowed access.
12963 </param>
12964 <infoflow type="write" weight="10"/>
12965 </interface>
12966 -<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="76683">
12967 +<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="77104">
12968 <summary>
12969 Do not audit attempts to send sieve_client packets.
12970 </summary>
12971 @@ -57626,7 +58246,7 @@ Domain to not audit.
12972 </param>
12973 <infoflow type="none"/>
12974 </interface>
12975 -<interface name="corenet_receive_sieve_client_packets" lineno="76702">
12976 +<interface name="corenet_receive_sieve_client_packets" lineno="77123">
12977 <summary>
12978 Receive sieve_client packets.
12979 </summary>
12980 @@ -57637,7 +58257,7 @@ Domain allowed access.
12981 </param>
12982 <infoflow type="read" weight="10"/>
12983 </interface>
12984 -<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="76721">
12985 +<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="77142">
12986 <summary>
12987 Do not audit attempts to receive sieve_client packets.
12988 </summary>
12989 @@ -57648,7 +58268,7 @@ Domain allowed access.
12990 </param>
12991 <infoflow type="none"/>
12992 </interface>
12993 -<interface name="corenet_sendrecv_sieve_client_packets" lineno="76740">
12994 +<interface name="corenet_sendrecv_sieve_client_packets" lineno="77161">
12995 <summary>
12996 Send and receive sieve_client packets.
12997 </summary>
12998 @@ -57659,7 +58279,7 @@ Domain allowed access.
12999 </param>
13000 <infoflow type="both" weight="10"/>
13001 </interface>
13002 -<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="76756">
13003 +<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="77177">
13004 <summary>
13005 Do not audit attempts to send and receive sieve_client packets.
13006 </summary>
13007 @@ -57670,7 +58290,7 @@ Domain to not audit.
13008 </param>
13009 <infoflow type="none"/>
13010 </interface>
13011 -<interface name="corenet_relabelto_sieve_client_packets" lineno="76771">
13012 +<interface name="corenet_relabelto_sieve_client_packets" lineno="77192">
13013 <summary>
13014 Relabel packets to sieve_client the packet type.
13015 </summary>
13016 @@ -57680,7 +58300,7 @@ Domain allowed access.
13017 </summary>
13018 </param>
13019 </interface>
13020 -<interface name="corenet_send_sieve_server_packets" lineno="76791">
13021 +<interface name="corenet_send_sieve_server_packets" lineno="77212">
13022 <summary>
13023 Send sieve_server packets.
13024 </summary>
13025 @@ -57691,7 +58311,7 @@ Domain allowed access.
13026 </param>
13027 <infoflow type="write" weight="10"/>
13028 </interface>
13029 -<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="76810">
13030 +<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="77231">
13031 <summary>
13032 Do not audit attempts to send sieve_server packets.
13033 </summary>
13034 @@ -57702,7 +58322,7 @@ Domain to not audit.
13035 </param>
13036 <infoflow type="none"/>
13037 </interface>
13038 -<interface name="corenet_receive_sieve_server_packets" lineno="76829">
13039 +<interface name="corenet_receive_sieve_server_packets" lineno="77250">
13040 <summary>
13041 Receive sieve_server packets.
13042 </summary>
13043 @@ -57713,7 +58333,7 @@ Domain allowed access.
13044 </param>
13045 <infoflow type="read" weight="10"/>
13046 </interface>
13047 -<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="76848">
13048 +<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="77269">
13049 <summary>
13050 Do not audit attempts to receive sieve_server packets.
13051 </summary>
13052 @@ -57724,7 +58344,7 @@ Domain allowed access.
13053 </param>
13054 <infoflow type="none"/>
13055 </interface>
13056 -<interface name="corenet_sendrecv_sieve_server_packets" lineno="76867">
13057 +<interface name="corenet_sendrecv_sieve_server_packets" lineno="77288">
13058 <summary>
13059 Send and receive sieve_server packets.
13060 </summary>
13061 @@ -57735,7 +58355,7 @@ Domain allowed access.
13062 </param>
13063 <infoflow type="both" weight="10"/>
13064 </interface>
13065 -<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="76883">
13066 +<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="77304">
13067 <summary>
13068 Do not audit attempts to send and receive sieve_server packets.
13069 </summary>
13070 @@ -57746,7 +58366,7 @@ Domain to not audit.
13071 </param>
13072 <infoflow type="none"/>
13073 </interface>
13074 -<interface name="corenet_relabelto_sieve_server_packets" lineno="76898">
13075 +<interface name="corenet_relabelto_sieve_server_packets" lineno="77319">
13076 <summary>
13077 Relabel packets to sieve_server the packet type.
13078 </summary>
13079 @@ -57756,7 +58376,7 @@ Domain allowed access.
13080 </summary>
13081 </param>
13082 </interface>
13083 -<interface name="corenet_tcp_sendrecv_sip_port" lineno="76920">
13084 +<interface name="corenet_tcp_sendrecv_sip_port" lineno="77341">
13085 <summary>
13086 Send and receive TCP traffic on the sip port.
13087 </summary>
13088 @@ -57767,7 +58387,7 @@ Domain allowed access.
13089 </param>
13090 <infoflow type="both" weight="10"/>
13091 </interface>
13092 -<interface name="corenet_udp_send_sip_port" lineno="76935">
13093 +<interface name="corenet_udp_send_sip_port" lineno="77356">
13094 <summary>
13095 Send UDP traffic on the sip port.
13096 </summary>
13097 @@ -57778,7 +58398,7 @@ Domain allowed access.
13098 </param>
13099 <infoflow type="write" weight="10"/>
13100 </interface>
13101 -<interface name="corenet_dontaudit_udp_send_sip_port" lineno="76950">
13102 +<interface name="corenet_dontaudit_udp_send_sip_port" lineno="77371">
13103 <summary>
13104 Do not audit attempts to send UDP traffic on the sip port.
13105 </summary>
13106 @@ -57789,7 +58409,7 @@ Domain to not audit.
13107 </param>
13108 <infoflow type="none"/>
13109 </interface>
13110 -<interface name="corenet_udp_receive_sip_port" lineno="76965">
13111 +<interface name="corenet_udp_receive_sip_port" lineno="77386">
13112 <summary>
13113 Receive UDP traffic on the sip port.
13114 </summary>
13115 @@ -57800,7 +58420,7 @@ Domain allowed access.
13116 </param>
13117 <infoflow type="read" weight="10"/>
13118 </interface>
13119 -<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="76980">
13120 +<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="77401">
13121 <summary>
13122 Do not audit attempts to receive UDP traffic on the sip port.
13123 </summary>
13124 @@ -57811,7 +58431,7 @@ Domain to not audit.
13125 </param>
13126 <infoflow type="none"/>
13127 </interface>
13128 -<interface name="corenet_udp_sendrecv_sip_port" lineno="76995">
13129 +<interface name="corenet_udp_sendrecv_sip_port" lineno="77416">
13130 <summary>
13131 Send and receive UDP traffic on the sip port.
13132 </summary>
13133 @@ -57822,7 +58442,7 @@ Domain allowed access.
13134 </param>
13135 <infoflow type="both" weight="10"/>
13136 </interface>
13137 -<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="77011">
13138 +<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="77432">
13139 <summary>
13140 Do not audit attempts to send and receive
13141 UDP traffic on the sip port.
13142 @@ -57834,7 +58454,7 @@ Domain to not audit.
13143 </param>
13144 <infoflow type="none"/>
13145 </interface>
13146 -<interface name="corenet_tcp_bind_sip_port" lineno="77026">
13147 +<interface name="corenet_tcp_bind_sip_port" lineno="77447">
13148 <summary>
13149 Bind TCP sockets to the sip port.
13150 </summary>
13151 @@ -57845,7 +58465,7 @@ Domain allowed access.
13152 </param>
13153 <infoflow type="none"/>
13154 </interface>
13155 -<interface name="corenet_udp_bind_sip_port" lineno="77046">
13156 +<interface name="corenet_udp_bind_sip_port" lineno="77467">
13157 <summary>
13158 Bind UDP sockets to the sip port.
13159 </summary>
13160 @@ -57856,7 +58476,7 @@ Domain allowed access.
13161 </param>
13162 <infoflow type="none"/>
13163 </interface>
13164 -<interface name="corenet_tcp_connect_sip_port" lineno="77065">
13165 +<interface name="corenet_tcp_connect_sip_port" lineno="77486">
13166 <summary>
13167 Make a TCP connection to the sip port.
13168 </summary>
13169 @@ -57866,7 +58486,7 @@ Domain allowed access.
13170 </summary>
13171 </param>
13172 </interface>
13173 -<interface name="corenet_send_sip_client_packets" lineno="77085">
13174 +<interface name="corenet_send_sip_client_packets" lineno="77506">
13175 <summary>
13176 Send sip_client packets.
13177 </summary>
13178 @@ -57877,7 +58497,7 @@ Domain allowed access.
13179 </param>
13180 <infoflow type="write" weight="10"/>
13181 </interface>
13182 -<interface name="corenet_dontaudit_send_sip_client_packets" lineno="77104">
13183 +<interface name="corenet_dontaudit_send_sip_client_packets" lineno="77525">
13184 <summary>
13185 Do not audit attempts to send sip_client packets.
13186 </summary>
13187 @@ -57888,7 +58508,7 @@ Domain to not audit.
13188 </param>
13189 <infoflow type="none"/>
13190 </interface>
13191 -<interface name="corenet_receive_sip_client_packets" lineno="77123">
13192 +<interface name="corenet_receive_sip_client_packets" lineno="77544">
13193 <summary>
13194 Receive sip_client packets.
13195 </summary>
13196 @@ -57899,7 +58519,7 @@ Domain allowed access.
13197 </param>
13198 <infoflow type="read" weight="10"/>
13199 </interface>
13200 -<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="77142">
13201 +<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="77563">
13202 <summary>
13203 Do not audit attempts to receive sip_client packets.
13204 </summary>
13205 @@ -57910,7 +58530,7 @@ Domain allowed access.
13206 </param>
13207 <infoflow type="none"/>
13208 </interface>
13209 -<interface name="corenet_sendrecv_sip_client_packets" lineno="77161">
13210 +<interface name="corenet_sendrecv_sip_client_packets" lineno="77582">
13211 <summary>
13212 Send and receive sip_client packets.
13213 </summary>
13214 @@ -57921,7 +58541,7 @@ Domain allowed access.
13215 </param>
13216 <infoflow type="both" weight="10"/>
13217 </interface>
13218 -<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="77177">
13219 +<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="77598">
13220 <summary>
13221 Do not audit attempts to send and receive sip_client packets.
13222 </summary>
13223 @@ -57932,7 +58552,7 @@ Domain to not audit.
13224 </param>
13225 <infoflow type="none"/>
13226 </interface>
13227 -<interface name="corenet_relabelto_sip_client_packets" lineno="77192">
13228 +<interface name="corenet_relabelto_sip_client_packets" lineno="77613">
13229 <summary>
13230 Relabel packets to sip_client the packet type.
13231 </summary>
13232 @@ -57942,7 +58562,7 @@ Domain allowed access.
13233 </summary>
13234 </param>
13235 </interface>
13236 -<interface name="corenet_send_sip_server_packets" lineno="77212">
13237 +<interface name="corenet_send_sip_server_packets" lineno="77633">
13238 <summary>
13239 Send sip_server packets.
13240 </summary>
13241 @@ -57953,7 +58573,7 @@ Domain allowed access.
13242 </param>
13243 <infoflow type="write" weight="10"/>
13244 </interface>
13245 -<interface name="corenet_dontaudit_send_sip_server_packets" lineno="77231">
13246 +<interface name="corenet_dontaudit_send_sip_server_packets" lineno="77652">
13247 <summary>
13248 Do not audit attempts to send sip_server packets.
13249 </summary>
13250 @@ -57964,7 +58584,7 @@ Domain to not audit.
13251 </param>
13252 <infoflow type="none"/>
13253 </interface>
13254 -<interface name="corenet_receive_sip_server_packets" lineno="77250">
13255 +<interface name="corenet_receive_sip_server_packets" lineno="77671">
13256 <summary>
13257 Receive sip_server packets.
13258 </summary>
13259 @@ -57975,7 +58595,7 @@ Domain allowed access.
13260 </param>
13261 <infoflow type="read" weight="10"/>
13262 </interface>
13263 -<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="77269">
13264 +<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="77690">
13265 <summary>
13266 Do not audit attempts to receive sip_server packets.
13267 </summary>
13268 @@ -57986,7 +58606,7 @@ Domain allowed access.
13269 </param>
13270 <infoflow type="none"/>
13271 </interface>
13272 -<interface name="corenet_sendrecv_sip_server_packets" lineno="77288">
13273 +<interface name="corenet_sendrecv_sip_server_packets" lineno="77709">
13274 <summary>
13275 Send and receive sip_server packets.
13276 </summary>
13277 @@ -57997,7 +58617,7 @@ Domain allowed access.
13278 </param>
13279 <infoflow type="both" weight="10"/>
13280 </interface>
13281 -<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="77304">
13282 +<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="77725">
13283 <summary>
13284 Do not audit attempts to send and receive sip_server packets.
13285 </summary>
13286 @@ -58008,7 +58628,7 @@ Domain to not audit.
13287 </param>
13288 <infoflow type="none"/>
13289 </interface>
13290 -<interface name="corenet_relabelto_sip_server_packets" lineno="77319">
13291 +<interface name="corenet_relabelto_sip_server_packets" lineno="77740">
13292 <summary>
13293 Relabel packets to sip_server the packet type.
13294 </summary>
13295 @@ -58018,7 +58638,7 @@ Domain allowed access.
13296 </summary>
13297 </param>
13298 </interface>
13299 -<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="77341">
13300 +<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="77762">
13301 <summary>
13302 Send and receive TCP traffic on the sixxsconfig port.
13303 </summary>
13304 @@ -58029,7 +58649,7 @@ Domain allowed access.
13305 </param>
13306 <infoflow type="both" weight="10"/>
13307 </interface>
13308 -<interface name="corenet_udp_send_sixxsconfig_port" lineno="77356">
13309 +<interface name="corenet_udp_send_sixxsconfig_port" lineno="77777">
13310 <summary>
13311 Send UDP traffic on the sixxsconfig port.
13312 </summary>
13313 @@ -58040,7 +58660,7 @@ Domain allowed access.
13314 </param>
13315 <infoflow type="write" weight="10"/>
13316 </interface>
13317 -<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="77371">
13318 +<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="77792">
13319 <summary>
13320 Do not audit attempts to send UDP traffic on the sixxsconfig port.
13321 </summary>
13322 @@ -58051,7 +58671,7 @@ Domain to not audit.
13323 </param>
13324 <infoflow type="none"/>
13325 </interface>
13326 -<interface name="corenet_udp_receive_sixxsconfig_port" lineno="77386">
13327 +<interface name="corenet_udp_receive_sixxsconfig_port" lineno="77807">
13328 <summary>
13329 Receive UDP traffic on the sixxsconfig port.
13330 </summary>
13331 @@ -58062,7 +58682,7 @@ Domain allowed access.
13332 </param>
13333 <infoflow type="read" weight="10"/>
13334 </interface>
13335 -<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="77401">
13336 +<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="77822">
13337 <summary>
13338 Do not audit attempts to receive UDP traffic on the sixxsconfig port.
13339 </summary>
13340 @@ -58073,7 +58693,7 @@ Domain to not audit.
13341 </param>
13342 <infoflow type="none"/>
13343 </interface>
13344 -<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="77416">
13345 +<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="77837">
13346 <summary>
13347 Send and receive UDP traffic on the sixxsconfig port.
13348 </summary>
13349 @@ -58084,7 +58704,7 @@ Domain allowed access.
13350 </param>
13351 <infoflow type="both" weight="10"/>
13352 </interface>
13353 -<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="77432">
13354 +<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="77853">
13355 <summary>
13356 Do not audit attempts to send and receive
13357 UDP traffic on the sixxsconfig port.
13358 @@ -58096,7 +58716,7 @@ Domain to not audit.
13359 </param>
13360 <infoflow type="none"/>
13361 </interface>
13362 -<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="77447">
13363 +<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="77868">
13364 <summary>
13365 Bind TCP sockets to the sixxsconfig port.
13366 </summary>
13367 @@ -58107,7 +58727,7 @@ Domain allowed access.
13368 </param>
13369 <infoflow type="none"/>
13370 </interface>
13371 -<interface name="corenet_udp_bind_sixxsconfig_port" lineno="77467">
13372 +<interface name="corenet_udp_bind_sixxsconfig_port" lineno="77888">
13373 <summary>
13374 Bind UDP sockets to the sixxsconfig port.
13375 </summary>
13376 @@ -58118,7 +58738,7 @@ Domain allowed access.
13377 </param>
13378 <infoflow type="none"/>
13379 </interface>
13380 -<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="77486">
13381 +<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="77907">
13382 <summary>
13383 Make a TCP connection to the sixxsconfig port.
13384 </summary>
13385 @@ -58128,7 +58748,7 @@ Domain allowed access.
13386 </summary>
13387 </param>
13388 </interface>
13389 -<interface name="corenet_send_sixxsconfig_client_packets" lineno="77506">
13390 +<interface name="corenet_send_sixxsconfig_client_packets" lineno="77927">
13391 <summary>
13392 Send sixxsconfig_client packets.
13393 </summary>
13394 @@ -58139,7 +58759,7 @@ Domain allowed access.
13395 </param>
13396 <infoflow type="write" weight="10"/>
13397 </interface>
13398 -<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="77525">
13399 +<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="77946">
13400 <summary>
13401 Do not audit attempts to send sixxsconfig_client packets.
13402 </summary>
13403 @@ -58150,7 +58770,7 @@ Domain to not audit.
13404 </param>
13405 <infoflow type="none"/>
13406 </interface>
13407 -<interface name="corenet_receive_sixxsconfig_client_packets" lineno="77544">
13408 +<interface name="corenet_receive_sixxsconfig_client_packets" lineno="77965">
13409 <summary>
13410 Receive sixxsconfig_client packets.
13411 </summary>
13412 @@ -58161,7 +58781,7 @@ Domain allowed access.
13413 </param>
13414 <infoflow type="read" weight="10"/>
13415 </interface>
13416 -<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="77563">
13417 +<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="77984">
13418 <summary>
13419 Do not audit attempts to receive sixxsconfig_client packets.
13420 </summary>
13421 @@ -58172,7 +58792,7 @@ Domain allowed access.
13422 </param>
13423 <infoflow type="none"/>
13424 </interface>
13425 -<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="77582">
13426 +<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="78003">
13427 <summary>
13428 Send and receive sixxsconfig_client packets.
13429 </summary>
13430 @@ -58183,7 +58803,7 @@ Domain allowed access.
13431 </param>
13432 <infoflow type="both" weight="10"/>
13433 </interface>
13434 -<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="77598">
13435 +<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="78019">
13436 <summary>
13437 Do not audit attempts to send and receive sixxsconfig_client packets.
13438 </summary>
13439 @@ -58194,7 +58814,7 @@ Domain to not audit.
13440 </param>
13441 <infoflow type="none"/>
13442 </interface>
13443 -<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="77613">
13444 +<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="78034">
13445 <summary>
13446 Relabel packets to sixxsconfig_client the packet type.
13447 </summary>
13448 @@ -58204,7 +58824,7 @@ Domain allowed access.
13449 </summary>
13450 </param>
13451 </interface>
13452 -<interface name="corenet_send_sixxsconfig_server_packets" lineno="77633">
13453 +<interface name="corenet_send_sixxsconfig_server_packets" lineno="78054">
13454 <summary>
13455 Send sixxsconfig_server packets.
13456 </summary>
13457 @@ -58215,7 +58835,7 @@ Domain allowed access.
13458 </param>
13459 <infoflow type="write" weight="10"/>
13460 </interface>
13461 -<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="77652">
13462 +<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="78073">
13463 <summary>
13464 Do not audit attempts to send sixxsconfig_server packets.
13465 </summary>
13466 @@ -58226,7 +58846,7 @@ Domain to not audit.
13467 </param>
13468 <infoflow type="none"/>
13469 </interface>
13470 -<interface name="corenet_receive_sixxsconfig_server_packets" lineno="77671">
13471 +<interface name="corenet_receive_sixxsconfig_server_packets" lineno="78092">
13472 <summary>
13473 Receive sixxsconfig_server packets.
13474 </summary>
13475 @@ -58237,7 +58857,7 @@ Domain allowed access.
13476 </param>
13477 <infoflow type="read" weight="10"/>
13478 </interface>
13479 -<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="77690">
13480 +<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="78111">
13481 <summary>
13482 Do not audit attempts to receive sixxsconfig_server packets.
13483 </summary>
13484 @@ -58248,7 +58868,7 @@ Domain allowed access.
13485 </param>
13486 <infoflow type="none"/>
13487 </interface>
13488 -<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="77709">
13489 +<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="78130">
13490 <summary>
13491 Send and receive sixxsconfig_server packets.
13492 </summary>
13493 @@ -58259,7 +58879,7 @@ Domain allowed access.
13494 </param>
13495 <infoflow type="both" weight="10"/>
13496 </interface>
13497 -<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="77725">
13498 +<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="78146">
13499 <summary>
13500 Do not audit attempts to send and receive sixxsconfig_server packets.
13501 </summary>
13502 @@ -58270,7 +58890,7 @@ Domain to not audit.
13503 </param>
13504 <infoflow type="none"/>
13505 </interface>
13506 -<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="77740">
13507 +<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="78161">
13508 <summary>
13509 Relabel packets to sixxsconfig_server the packet type.
13510 </summary>
13511 @@ -58280,7 +58900,7 @@ Domain allowed access.
13512 </summary>
13513 </param>
13514 </interface>
13515 -<interface name="corenet_tcp_sendrecv_smbd_port" lineno="77762">
13516 +<interface name="corenet_tcp_sendrecv_smbd_port" lineno="78183">
13517 <summary>
13518 Send and receive TCP traffic on the smbd port.
13519 </summary>
13520 @@ -58291,7 +58911,7 @@ Domain allowed access.
13521 </param>
13522 <infoflow type="both" weight="10"/>
13523 </interface>
13524 -<interface name="corenet_udp_send_smbd_port" lineno="77777">
13525 +<interface name="corenet_udp_send_smbd_port" lineno="78198">
13526 <summary>
13527 Send UDP traffic on the smbd port.
13528 </summary>
13529 @@ -58302,7 +58922,7 @@ Domain allowed access.
13530 </param>
13531 <infoflow type="write" weight="10"/>
13532 </interface>
13533 -<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="77792">
13534 +<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="78213">
13535 <summary>
13536 Do not audit attempts to send UDP traffic on the smbd port.
13537 </summary>
13538 @@ -58313,7 +58933,7 @@ Domain to not audit.
13539 </param>
13540 <infoflow type="none"/>
13541 </interface>
13542 -<interface name="corenet_udp_receive_smbd_port" lineno="77807">
13543 +<interface name="corenet_udp_receive_smbd_port" lineno="78228">
13544 <summary>
13545 Receive UDP traffic on the smbd port.
13546 </summary>
13547 @@ -58324,7 +58944,7 @@ Domain allowed access.
13548 </param>
13549 <infoflow type="read" weight="10"/>
13550 </interface>
13551 -<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="77822">
13552 +<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="78243">
13553 <summary>
13554 Do not audit attempts to receive UDP traffic on the smbd port.
13555 </summary>
13556 @@ -58335,7 +58955,7 @@ Domain to not audit.
13557 </param>
13558 <infoflow type="none"/>
13559 </interface>
13560 -<interface name="corenet_udp_sendrecv_smbd_port" lineno="77837">
13561 +<interface name="corenet_udp_sendrecv_smbd_port" lineno="78258">
13562 <summary>
13563 Send and receive UDP traffic on the smbd port.
13564 </summary>
13565 @@ -58346,7 +58966,7 @@ Domain allowed access.
13566 </param>
13567 <infoflow type="both" weight="10"/>
13568 </interface>
13569 -<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="77853">
13570 +<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="78274">
13571 <summary>
13572 Do not audit attempts to send and receive
13573 UDP traffic on the smbd port.
13574 @@ -58358,7 +58978,7 @@ Domain to not audit.
13575 </param>
13576 <infoflow type="none"/>
13577 </interface>
13578 -<interface name="corenet_tcp_bind_smbd_port" lineno="77868">
13579 +<interface name="corenet_tcp_bind_smbd_port" lineno="78289">
13580 <summary>
13581 Bind TCP sockets to the smbd port.
13582 </summary>
13583 @@ -58369,7 +58989,7 @@ Domain allowed access.
13584 </param>
13585 <infoflow type="none"/>
13586 </interface>
13587 -<interface name="corenet_udp_bind_smbd_port" lineno="77888">
13588 +<interface name="corenet_udp_bind_smbd_port" lineno="78309">
13589 <summary>
13590 Bind UDP sockets to the smbd port.
13591 </summary>
13592 @@ -58380,7 +59000,7 @@ Domain allowed access.
13593 </param>
13594 <infoflow type="none"/>
13595 </interface>
13596 -<interface name="corenet_tcp_connect_smbd_port" lineno="77907">
13597 +<interface name="corenet_tcp_connect_smbd_port" lineno="78328">
13598 <summary>
13599 Make a TCP connection to the smbd port.
13600 </summary>
13601 @@ -58390,7 +59010,7 @@ Domain allowed access.
13602 </summary>
13603 </param>
13604 </interface>
13605 -<interface name="corenet_send_smbd_client_packets" lineno="77927">
13606 +<interface name="corenet_send_smbd_client_packets" lineno="78348">
13607 <summary>
13608 Send smbd_client packets.
13609 </summary>
13610 @@ -58401,7 +59021,7 @@ Domain allowed access.
13611 </param>
13612 <infoflow type="write" weight="10"/>
13613 </interface>
13614 -<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="77946">
13615 +<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="78367">
13616 <summary>
13617 Do not audit attempts to send smbd_client packets.
13618 </summary>
13619 @@ -58412,7 +59032,7 @@ Domain to not audit.
13620 </param>
13621 <infoflow type="none"/>
13622 </interface>
13623 -<interface name="corenet_receive_smbd_client_packets" lineno="77965">
13624 +<interface name="corenet_receive_smbd_client_packets" lineno="78386">
13625 <summary>
13626 Receive smbd_client packets.
13627 </summary>
13628 @@ -58423,7 +59043,7 @@ Domain allowed access.
13629 </param>
13630 <infoflow type="read" weight="10"/>
13631 </interface>
13632 -<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="77984">
13633 +<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="78405">
13634 <summary>
13635 Do not audit attempts to receive smbd_client packets.
13636 </summary>
13637 @@ -58434,7 +59054,7 @@ Domain allowed access.
13638 </param>
13639 <infoflow type="none"/>
13640 </interface>
13641 -<interface name="corenet_sendrecv_smbd_client_packets" lineno="78003">
13642 +<interface name="corenet_sendrecv_smbd_client_packets" lineno="78424">
13643 <summary>
13644 Send and receive smbd_client packets.
13645 </summary>
13646 @@ -58445,7 +59065,7 @@ Domain allowed access.
13647 </param>
13648 <infoflow type="both" weight="10"/>
13649 </interface>
13650 -<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="78019">
13651 +<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="78440">
13652 <summary>
13653 Do not audit attempts to send and receive smbd_client packets.
13654 </summary>
13655 @@ -58456,7 +59076,7 @@ Domain to not audit.
13656 </param>
13657 <infoflow type="none"/>
13658 </interface>
13659 -<interface name="corenet_relabelto_smbd_client_packets" lineno="78034">
13660 +<interface name="corenet_relabelto_smbd_client_packets" lineno="78455">
13661 <summary>
13662 Relabel packets to smbd_client the packet type.
13663 </summary>
13664 @@ -58466,7 +59086,7 @@ Domain allowed access.
13665 </summary>
13666 </param>
13667 </interface>
13668 -<interface name="corenet_send_smbd_server_packets" lineno="78054">
13669 +<interface name="corenet_send_smbd_server_packets" lineno="78475">
13670 <summary>
13671 Send smbd_server packets.
13672 </summary>
13673 @@ -58477,7 +59097,7 @@ Domain allowed access.
13674 </param>
13675 <infoflow type="write" weight="10"/>
13676 </interface>
13677 -<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="78073">
13678 +<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="78494">
13679 <summary>
13680 Do not audit attempts to send smbd_server packets.
13681 </summary>
13682 @@ -58488,7 +59108,7 @@ Domain to not audit.
13683 </param>
13684 <infoflow type="none"/>
13685 </interface>
13686 -<interface name="corenet_receive_smbd_server_packets" lineno="78092">
13687 +<interface name="corenet_receive_smbd_server_packets" lineno="78513">
13688 <summary>
13689 Receive smbd_server packets.
13690 </summary>
13691 @@ -58499,7 +59119,7 @@ Domain allowed access.
13692 </param>
13693 <infoflow type="read" weight="10"/>
13694 </interface>
13695 -<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="78111">
13696 +<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="78532">
13697 <summary>
13698 Do not audit attempts to receive smbd_server packets.
13699 </summary>
13700 @@ -58510,7 +59130,7 @@ Domain allowed access.
13701 </param>
13702 <infoflow type="none"/>
13703 </interface>
13704 -<interface name="corenet_sendrecv_smbd_server_packets" lineno="78130">
13705 +<interface name="corenet_sendrecv_smbd_server_packets" lineno="78551">
13706 <summary>
13707 Send and receive smbd_server packets.
13708 </summary>
13709 @@ -58521,7 +59141,7 @@ Domain allowed access.
13710 </param>
13711 <infoflow type="both" weight="10"/>
13712 </interface>
13713 -<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="78146">
13714 +<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="78567">
13715 <summary>
13716 Do not audit attempts to send and receive smbd_server packets.
13717 </summary>
13718 @@ -58532,7 +59152,7 @@ Domain to not audit.
13719 </param>
13720 <infoflow type="none"/>
13721 </interface>
13722 -<interface name="corenet_relabelto_smbd_server_packets" lineno="78161">
13723 +<interface name="corenet_relabelto_smbd_server_packets" lineno="78582">
13724 <summary>
13725 Relabel packets to smbd_server the packet type.
13726 </summary>
13727 @@ -58542,7 +59162,7 @@ Domain allowed access.
13728 </summary>
13729 </param>
13730 </interface>
13731 -<interface name="corenet_tcp_sendrecv_smtp_port" lineno="78183">
13732 +<interface name="corenet_tcp_sendrecv_smtp_port" lineno="78604">
13733 <summary>
13734 Send and receive TCP traffic on the smtp port.
13735 </summary>
13736 @@ -58553,7 +59173,7 @@ Domain allowed access.
13737 </param>
13738 <infoflow type="both" weight="10"/>
13739 </interface>
13740 -<interface name="corenet_udp_send_smtp_port" lineno="78198">
13741 +<interface name="corenet_udp_send_smtp_port" lineno="78619">
13742 <summary>
13743 Send UDP traffic on the smtp port.
13744 </summary>
13745 @@ -58564,7 +59184,7 @@ Domain allowed access.
13746 </param>
13747 <infoflow type="write" weight="10"/>
13748 </interface>
13749 -<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="78213">
13750 +<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="78634">
13751 <summary>
13752 Do not audit attempts to send UDP traffic on the smtp port.
13753 </summary>
13754 @@ -58575,7 +59195,7 @@ Domain to not audit.
13755 </param>
13756 <infoflow type="none"/>
13757 </interface>
13758 -<interface name="corenet_udp_receive_smtp_port" lineno="78228">
13759 +<interface name="corenet_udp_receive_smtp_port" lineno="78649">
13760 <summary>
13761 Receive UDP traffic on the smtp port.
13762 </summary>
13763 @@ -58586,7 +59206,7 @@ Domain allowed access.
13764 </param>
13765 <infoflow type="read" weight="10"/>
13766 </interface>
13767 -<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="78243">
13768 +<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="78664">
13769 <summary>
13770 Do not audit attempts to receive UDP traffic on the smtp port.
13771 </summary>
13772 @@ -58597,7 +59217,7 @@ Domain to not audit.
13773 </param>
13774 <infoflow type="none"/>
13775 </interface>
13776 -<interface name="corenet_udp_sendrecv_smtp_port" lineno="78258">
13777 +<interface name="corenet_udp_sendrecv_smtp_port" lineno="78679">
13778 <summary>
13779 Send and receive UDP traffic on the smtp port.
13780 </summary>
13781 @@ -58608,7 +59228,7 @@ Domain allowed access.
13782 </param>
13783 <infoflow type="both" weight="10"/>
13784 </interface>
13785 -<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="78274">
13786 +<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="78695">
13787 <summary>
13788 Do not audit attempts to send and receive
13789 UDP traffic on the smtp port.
13790 @@ -58620,7 +59240,7 @@ Domain to not audit.
13791 </param>
13792 <infoflow type="none"/>
13793 </interface>
13794 -<interface name="corenet_tcp_bind_smtp_port" lineno="78289">
13795 +<interface name="corenet_tcp_bind_smtp_port" lineno="78710">
13796 <summary>
13797 Bind TCP sockets to the smtp port.
13798 </summary>
13799 @@ -58631,7 +59251,7 @@ Domain allowed access.
13800 </param>
13801 <infoflow type="none"/>
13802 </interface>
13803 -<interface name="corenet_udp_bind_smtp_port" lineno="78309">
13804 +<interface name="corenet_udp_bind_smtp_port" lineno="78730">
13805 <summary>
13806 Bind UDP sockets to the smtp port.
13807 </summary>
13808 @@ -58642,7 +59262,7 @@ Domain allowed access.
13809 </param>
13810 <infoflow type="none"/>
13811 </interface>
13812 -<interface name="corenet_tcp_connect_smtp_port" lineno="78328">
13813 +<interface name="corenet_tcp_connect_smtp_port" lineno="78749">
13814 <summary>
13815 Make a TCP connection to the smtp port.
13816 </summary>
13817 @@ -58652,7 +59272,7 @@ Domain allowed access.
13818 </summary>
13819 </param>
13820 </interface>
13821 -<interface name="corenet_send_smtp_client_packets" lineno="78348">
13822 +<interface name="corenet_send_smtp_client_packets" lineno="78769">
13823 <summary>
13824 Send smtp_client packets.
13825 </summary>
13826 @@ -58663,7 +59283,7 @@ Domain allowed access.
13827 </param>
13828 <infoflow type="write" weight="10"/>
13829 </interface>
13830 -<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="78367">
13831 +<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="78788">
13832 <summary>
13833 Do not audit attempts to send smtp_client packets.
13834 </summary>
13835 @@ -58674,7 +59294,7 @@ Domain to not audit.
13836 </param>
13837 <infoflow type="none"/>
13838 </interface>
13839 -<interface name="corenet_receive_smtp_client_packets" lineno="78386">
13840 +<interface name="corenet_receive_smtp_client_packets" lineno="78807">
13841 <summary>
13842 Receive smtp_client packets.
13843 </summary>
13844 @@ -58685,7 +59305,7 @@ Domain allowed access.
13845 </param>
13846 <infoflow type="read" weight="10"/>
13847 </interface>
13848 -<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="78405">
13849 +<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="78826">
13850 <summary>
13851 Do not audit attempts to receive smtp_client packets.
13852 </summary>
13853 @@ -58696,7 +59316,7 @@ Domain allowed access.
13854 </param>
13855 <infoflow type="none"/>
13856 </interface>
13857 -<interface name="corenet_sendrecv_smtp_client_packets" lineno="78424">
13858 +<interface name="corenet_sendrecv_smtp_client_packets" lineno="78845">
13859 <summary>
13860 Send and receive smtp_client packets.
13861 </summary>
13862 @@ -58707,7 +59327,7 @@ Domain allowed access.
13863 </param>
13864 <infoflow type="both" weight="10"/>
13865 </interface>
13866 -<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="78440">
13867 +<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="78861">
13868 <summary>
13869 Do not audit attempts to send and receive smtp_client packets.
13870 </summary>
13871 @@ -58718,7 +59338,7 @@ Domain to not audit.
13872 </param>
13873 <infoflow type="none"/>
13874 </interface>
13875 -<interface name="corenet_relabelto_smtp_client_packets" lineno="78455">
13876 +<interface name="corenet_relabelto_smtp_client_packets" lineno="78876">
13877 <summary>
13878 Relabel packets to smtp_client the packet type.
13879 </summary>
13880 @@ -58728,7 +59348,7 @@ Domain allowed access.
13881 </summary>
13882 </param>
13883 </interface>
13884 -<interface name="corenet_send_smtp_server_packets" lineno="78475">
13885 +<interface name="corenet_send_smtp_server_packets" lineno="78896">
13886 <summary>
13887 Send smtp_server packets.
13888 </summary>
13889 @@ -58739,7 +59359,7 @@ Domain allowed access.
13890 </param>
13891 <infoflow type="write" weight="10"/>
13892 </interface>
13893 -<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="78494">
13894 +<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="78915">
13895 <summary>
13896 Do not audit attempts to send smtp_server packets.
13897 </summary>
13898 @@ -58750,7 +59370,7 @@ Domain to not audit.
13899 </param>
13900 <infoflow type="none"/>
13901 </interface>
13902 -<interface name="corenet_receive_smtp_server_packets" lineno="78513">
13903 +<interface name="corenet_receive_smtp_server_packets" lineno="78934">
13904 <summary>
13905 Receive smtp_server packets.
13906 </summary>
13907 @@ -58761,7 +59381,7 @@ Domain allowed access.
13908 </param>
13909 <infoflow type="read" weight="10"/>
13910 </interface>
13911 -<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="78532">
13912 +<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="78953">
13913 <summary>
13914 Do not audit attempts to receive smtp_server packets.
13915 </summary>
13916 @@ -58772,7 +59392,7 @@ Domain allowed access.
13917 </param>
13918 <infoflow type="none"/>
13919 </interface>
13920 -<interface name="corenet_sendrecv_smtp_server_packets" lineno="78551">
13921 +<interface name="corenet_sendrecv_smtp_server_packets" lineno="78972">
13922 <summary>
13923 Send and receive smtp_server packets.
13924 </summary>
13925 @@ -58783,7 +59403,7 @@ Domain allowed access.
13926 </param>
13927 <infoflow type="both" weight="10"/>
13928 </interface>
13929 -<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="78567">
13930 +<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="78988">
13931 <summary>
13932 Do not audit attempts to send and receive smtp_server packets.
13933 </summary>
13934 @@ -58794,7 +59414,7 @@ Domain to not audit.
13935 </param>
13936 <infoflow type="none"/>
13937 </interface>
13938 -<interface name="corenet_relabelto_smtp_server_packets" lineno="78582">
13939 +<interface name="corenet_relabelto_smtp_server_packets" lineno="79003">
13940 <summary>
13941 Relabel packets to smtp_server the packet type.
13942 </summary>
13943 @@ -58804,7 +59424,7 @@ Domain allowed access.
13944 </summary>
13945 </param>
13946 </interface>
13947 -<interface name="corenet_tcp_sendrecv_snmp_port" lineno="78604">
13948 +<interface name="corenet_tcp_sendrecv_snmp_port" lineno="79025">
13949 <summary>
13950 Send and receive TCP traffic on the snmp port.
13951 </summary>
13952 @@ -58815,7 +59435,7 @@ Domain allowed access.
13953 </param>
13954 <infoflow type="both" weight="10"/>
13955 </interface>
13956 -<interface name="corenet_udp_send_snmp_port" lineno="78619">
13957 +<interface name="corenet_udp_send_snmp_port" lineno="79040">
13958 <summary>
13959 Send UDP traffic on the snmp port.
13960 </summary>
13961 @@ -58826,7 +59446,7 @@ Domain allowed access.
13962 </param>
13963 <infoflow type="write" weight="10"/>
13964 </interface>
13965 -<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="78634">
13966 +<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="79055">
13967 <summary>
13968 Do not audit attempts to send UDP traffic on the snmp port.
13969 </summary>
13970 @@ -58837,7 +59457,7 @@ Domain to not audit.
13971 </param>
13972 <infoflow type="none"/>
13973 </interface>
13974 -<interface name="corenet_udp_receive_snmp_port" lineno="78649">
13975 +<interface name="corenet_udp_receive_snmp_port" lineno="79070">
13976 <summary>
13977 Receive UDP traffic on the snmp port.
13978 </summary>
13979 @@ -58848,7 +59468,7 @@ Domain allowed access.
13980 </param>
13981 <infoflow type="read" weight="10"/>
13982 </interface>
13983 -<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="78664">
13984 +<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="79085">
13985 <summary>
13986 Do not audit attempts to receive UDP traffic on the snmp port.
13987 </summary>
13988 @@ -58859,7 +59479,7 @@ Domain to not audit.
13989 </param>
13990 <infoflow type="none"/>
13991 </interface>
13992 -<interface name="corenet_udp_sendrecv_snmp_port" lineno="78679">
13993 +<interface name="corenet_udp_sendrecv_snmp_port" lineno="79100">
13994 <summary>
13995 Send and receive UDP traffic on the snmp port.
13996 </summary>
13997 @@ -58870,7 +59490,7 @@ Domain allowed access.
13998 </param>
13999 <infoflow type="both" weight="10"/>
14000 </interface>
14001 -<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="78695">
14002 +<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="79116">
14003 <summary>
14004 Do not audit attempts to send and receive
14005 UDP traffic on the snmp port.
14006 @@ -58882,7 +59502,7 @@ Domain to not audit.
14007 </param>
14008 <infoflow type="none"/>
14009 </interface>
14010 -<interface name="corenet_tcp_bind_snmp_port" lineno="78710">
14011 +<interface name="corenet_tcp_bind_snmp_port" lineno="79131">
14012 <summary>
14013 Bind TCP sockets to the snmp port.
14014 </summary>
14015 @@ -58893,7 +59513,7 @@ Domain allowed access.
14016 </param>
14017 <infoflow type="none"/>
14018 </interface>
14019 -<interface name="corenet_udp_bind_snmp_port" lineno="78730">
14020 +<interface name="corenet_udp_bind_snmp_port" lineno="79151">
14021 <summary>
14022 Bind UDP sockets to the snmp port.
14023 </summary>
14024 @@ -58904,7 +59524,7 @@ Domain allowed access.
14025 </param>
14026 <infoflow type="none"/>
14027 </interface>
14028 -<interface name="corenet_tcp_connect_snmp_port" lineno="78749">
14029 +<interface name="corenet_tcp_connect_snmp_port" lineno="79170">
14030 <summary>
14031 Make a TCP connection to the snmp port.
14032 </summary>
14033 @@ -58914,7 +59534,7 @@ Domain allowed access.
14034 </summary>
14035 </param>
14036 </interface>
14037 -<interface name="corenet_send_snmp_client_packets" lineno="78769">
14038 +<interface name="corenet_send_snmp_client_packets" lineno="79190">
14039 <summary>
14040 Send snmp_client packets.
14041 </summary>
14042 @@ -58925,7 +59545,7 @@ Domain allowed access.
14043 </param>
14044 <infoflow type="write" weight="10"/>
14045 </interface>
14046 -<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="78788">
14047 +<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="79209">
14048 <summary>
14049 Do not audit attempts to send snmp_client packets.
14050 </summary>
14051 @@ -58936,7 +59556,7 @@ Domain to not audit.
14052 </param>
14053 <infoflow type="none"/>
14054 </interface>
14055 -<interface name="corenet_receive_snmp_client_packets" lineno="78807">
14056 +<interface name="corenet_receive_snmp_client_packets" lineno="79228">
14057 <summary>
14058 Receive snmp_client packets.
14059 </summary>
14060 @@ -58947,7 +59567,7 @@ Domain allowed access.
14061 </param>
14062 <infoflow type="read" weight="10"/>
14063 </interface>
14064 -<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="78826">
14065 +<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="79247">
14066 <summary>
14067 Do not audit attempts to receive snmp_client packets.
14068 </summary>
14069 @@ -58958,7 +59578,7 @@ Domain allowed access.
14070 </param>
14071 <infoflow type="none"/>
14072 </interface>
14073 -<interface name="corenet_sendrecv_snmp_client_packets" lineno="78845">
14074 +<interface name="corenet_sendrecv_snmp_client_packets" lineno="79266">
14075 <summary>
14076 Send and receive snmp_client packets.
14077 </summary>
14078 @@ -58969,7 +59589,7 @@ Domain allowed access.
14079 </param>
14080 <infoflow type="both" weight="10"/>
14081 </interface>
14082 -<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="78861">
14083 +<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="79282">
14084 <summary>
14085 Do not audit attempts to send and receive snmp_client packets.
14086 </summary>
14087 @@ -58980,7 +59600,7 @@ Domain to not audit.
14088 </param>
14089 <infoflow type="none"/>
14090 </interface>
14091 -<interface name="corenet_relabelto_snmp_client_packets" lineno="78876">
14092 +<interface name="corenet_relabelto_snmp_client_packets" lineno="79297">
14093 <summary>
14094 Relabel packets to snmp_client the packet type.
14095 </summary>
14096 @@ -58990,7 +59610,7 @@ Domain allowed access.
14097 </summary>
14098 </param>
14099 </interface>
14100 -<interface name="corenet_send_snmp_server_packets" lineno="78896">
14101 +<interface name="corenet_send_snmp_server_packets" lineno="79317">
14102 <summary>
14103 Send snmp_server packets.
14104 </summary>
14105 @@ -59001,7 +59621,7 @@ Domain allowed access.
14106 </param>
14107 <infoflow type="write" weight="10"/>
14108 </interface>
14109 -<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="78915">
14110 +<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="79336">
14111 <summary>
14112 Do not audit attempts to send snmp_server packets.
14113 </summary>
14114 @@ -59012,7 +59632,7 @@ Domain to not audit.
14115 </param>
14116 <infoflow type="none"/>
14117 </interface>
14118 -<interface name="corenet_receive_snmp_server_packets" lineno="78934">
14119 +<interface name="corenet_receive_snmp_server_packets" lineno="79355">
14120 <summary>
14121 Receive snmp_server packets.
14122 </summary>
14123 @@ -59023,7 +59643,7 @@ Domain allowed access.
14124 </param>
14125 <infoflow type="read" weight="10"/>
14126 </interface>
14127 -<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="78953">
14128 +<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="79374">
14129 <summary>
14130 Do not audit attempts to receive snmp_server packets.
14131 </summary>
14132 @@ -59034,7 +59654,7 @@ Domain allowed access.
14133 </param>
14134 <infoflow type="none"/>
14135 </interface>
14136 -<interface name="corenet_sendrecv_snmp_server_packets" lineno="78972">
14137 +<interface name="corenet_sendrecv_snmp_server_packets" lineno="79393">
14138 <summary>
14139 Send and receive snmp_server packets.
14140 </summary>
14141 @@ -59045,7 +59665,7 @@ Domain allowed access.
14142 </param>
14143 <infoflow type="both" weight="10"/>
14144 </interface>
14145 -<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="78988">
14146 +<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="79409">
14147 <summary>
14148 Do not audit attempts to send and receive snmp_server packets.
14149 </summary>
14150 @@ -59056,7 +59676,7 @@ Domain to not audit.
14151 </param>
14152 <infoflow type="none"/>
14153 </interface>
14154 -<interface name="corenet_relabelto_snmp_server_packets" lineno="79003">
14155 +<interface name="corenet_relabelto_snmp_server_packets" lineno="79424">
14156 <summary>
14157 Relabel packets to snmp_server the packet type.
14158 </summary>
14159 @@ -59066,7 +59686,7 @@ Domain allowed access.
14160 </summary>
14161 </param>
14162 </interface>
14163 -<interface name="corenet_tcp_sendrecv_socks_port" lineno="79025">
14164 +<interface name="corenet_tcp_sendrecv_socks_port" lineno="79446">
14165 <summary>
14166 Send and receive TCP traffic on the socks port.
14167 </summary>
14168 @@ -59077,7 +59697,7 @@ Domain allowed access.
14169 </param>
14170 <infoflow type="both" weight="10"/>
14171 </interface>
14172 -<interface name="corenet_udp_send_socks_port" lineno="79040">
14173 +<interface name="corenet_udp_send_socks_port" lineno="79461">
14174 <summary>
14175 Send UDP traffic on the socks port.
14176 </summary>
14177 @@ -59088,7 +59708,7 @@ Domain allowed access.
14178 </param>
14179 <infoflow type="write" weight="10"/>
14180 </interface>
14181 -<interface name="corenet_dontaudit_udp_send_socks_port" lineno="79055">
14182 +<interface name="corenet_dontaudit_udp_send_socks_port" lineno="79476">
14183 <summary>
14184 Do not audit attempts to send UDP traffic on the socks port.
14185 </summary>
14186 @@ -59099,7 +59719,7 @@ Domain to not audit.
14187 </param>
14188 <infoflow type="none"/>
14189 </interface>
14190 -<interface name="corenet_udp_receive_socks_port" lineno="79070">
14191 +<interface name="corenet_udp_receive_socks_port" lineno="79491">
14192 <summary>
14193 Receive UDP traffic on the socks port.
14194 </summary>
14195 @@ -59110,7 +59730,7 @@ Domain allowed access.
14196 </param>
14197 <infoflow type="read" weight="10"/>
14198 </interface>
14199 -<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="79085">
14200 +<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="79506">
14201 <summary>
14202 Do not audit attempts to receive UDP traffic on the socks port.
14203 </summary>
14204 @@ -59121,7 +59741,7 @@ Domain to not audit.
14205 </param>
14206 <infoflow type="none"/>
14207 </interface>
14208 -<interface name="corenet_udp_sendrecv_socks_port" lineno="79100">
14209 +<interface name="corenet_udp_sendrecv_socks_port" lineno="79521">
14210 <summary>
14211 Send and receive UDP traffic on the socks port.
14212 </summary>
14213 @@ -59132,7 +59752,7 @@ Domain allowed access.
14214 </param>
14215 <infoflow type="both" weight="10"/>
14216 </interface>
14217 -<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="79116">
14218 +<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="79537">
14219 <summary>
14220 Do not audit attempts to send and receive
14221 UDP traffic on the socks port.
14222 @@ -59144,7 +59764,7 @@ Domain to not audit.
14223 </param>
14224 <infoflow type="none"/>
14225 </interface>
14226 -<interface name="corenet_tcp_bind_socks_port" lineno="79131">
14227 +<interface name="corenet_tcp_bind_socks_port" lineno="79552">
14228 <summary>
14229 Bind TCP sockets to the socks port.
14230 </summary>
14231 @@ -59155,7 +59775,7 @@ Domain allowed access.
14232 </param>
14233 <infoflow type="none"/>
14234 </interface>
14235 -<interface name="corenet_udp_bind_socks_port" lineno="79151">
14236 +<interface name="corenet_udp_bind_socks_port" lineno="79572">
14237 <summary>
14238 Bind UDP sockets to the socks port.
14239 </summary>
14240 @@ -59166,7 +59786,7 @@ Domain allowed access.
14241 </param>
14242 <infoflow type="none"/>
14243 </interface>
14244 -<interface name="corenet_tcp_connect_socks_port" lineno="79170">
14245 +<interface name="corenet_tcp_connect_socks_port" lineno="79591">
14246 <summary>
14247 Make a TCP connection to the socks port.
14248 </summary>
14249 @@ -59176,7 +59796,7 @@ Domain allowed access.
14250 </summary>
14251 </param>
14252 </interface>
14253 -<interface name="corenet_send_socks_client_packets" lineno="79190">
14254 +<interface name="corenet_send_socks_client_packets" lineno="79611">
14255 <summary>
14256 Send socks_client packets.
14257 </summary>
14258 @@ -59187,7 +59807,7 @@ Domain allowed access.
14259 </param>
14260 <infoflow type="write" weight="10"/>
14261 </interface>
14262 -<interface name="corenet_dontaudit_send_socks_client_packets" lineno="79209">
14263 +<interface name="corenet_dontaudit_send_socks_client_packets" lineno="79630">
14264 <summary>
14265 Do not audit attempts to send socks_client packets.
14266 </summary>
14267 @@ -59198,7 +59818,7 @@ Domain to not audit.
14268 </param>
14269 <infoflow type="none"/>
14270 </interface>
14271 -<interface name="corenet_receive_socks_client_packets" lineno="79228">
14272 +<interface name="corenet_receive_socks_client_packets" lineno="79649">
14273 <summary>
14274 Receive socks_client packets.
14275 </summary>
14276 @@ -59209,7 +59829,7 @@ Domain allowed access.
14277 </param>
14278 <infoflow type="read" weight="10"/>
14279 </interface>
14280 -<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="79247">
14281 +<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="79668">
14282 <summary>
14283 Do not audit attempts to receive socks_client packets.
14284 </summary>
14285 @@ -59220,7 +59840,7 @@ Domain allowed access.
14286 </param>
14287 <infoflow type="none"/>
14288 </interface>
14289 -<interface name="corenet_sendrecv_socks_client_packets" lineno="79266">
14290 +<interface name="corenet_sendrecv_socks_client_packets" lineno="79687">
14291 <summary>
14292 Send and receive socks_client packets.
14293 </summary>
14294 @@ -59231,7 +59851,7 @@ Domain allowed access.
14295 </param>
14296 <infoflow type="both" weight="10"/>
14297 </interface>
14298 -<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="79282">
14299 +<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="79703">
14300 <summary>
14301 Do not audit attempts to send and receive socks_client packets.
14302 </summary>
14303 @@ -59242,7 +59862,7 @@ Domain to not audit.
14304 </param>
14305 <infoflow type="none"/>
14306 </interface>
14307 -<interface name="corenet_relabelto_socks_client_packets" lineno="79297">
14308 +<interface name="corenet_relabelto_socks_client_packets" lineno="79718">
14309 <summary>
14310 Relabel packets to socks_client the packet type.
14311 </summary>
14312 @@ -59252,7 +59872,7 @@ Domain allowed access.
14313 </summary>
14314 </param>
14315 </interface>
14316 -<interface name="corenet_send_socks_server_packets" lineno="79317">
14317 +<interface name="corenet_send_socks_server_packets" lineno="79738">
14318 <summary>
14319 Send socks_server packets.
14320 </summary>
14321 @@ -59263,7 +59883,7 @@ Domain allowed access.
14322 </param>
14323 <infoflow type="write" weight="10"/>
14324 </interface>
14325 -<interface name="corenet_dontaudit_send_socks_server_packets" lineno="79336">
14326 +<interface name="corenet_dontaudit_send_socks_server_packets" lineno="79757">
14327 <summary>
14328 Do not audit attempts to send socks_server packets.
14329 </summary>
14330 @@ -59274,7 +59894,7 @@ Domain to not audit.
14331 </param>
14332 <infoflow type="none"/>
14333 </interface>
14334 -<interface name="corenet_receive_socks_server_packets" lineno="79355">
14335 +<interface name="corenet_receive_socks_server_packets" lineno="79776">
14336 <summary>
14337 Receive socks_server packets.
14338 </summary>
14339 @@ -59285,7 +59905,7 @@ Domain allowed access.
14340 </param>
14341 <infoflow type="read" weight="10"/>
14342 </interface>
14343 -<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="79374">
14344 +<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="79795">
14345 <summary>
14346 Do not audit attempts to receive socks_server packets.
14347 </summary>
14348 @@ -59296,7 +59916,7 @@ Domain allowed access.
14349 </param>
14350 <infoflow type="none"/>
14351 </interface>
14352 -<interface name="corenet_sendrecv_socks_server_packets" lineno="79393">
14353 +<interface name="corenet_sendrecv_socks_server_packets" lineno="79814">
14354 <summary>
14355 Send and receive socks_server packets.
14356 </summary>
14357 @@ -59307,7 +59927,7 @@ Domain allowed access.
14358 </param>
14359 <infoflow type="both" weight="10"/>
14360 </interface>
14361 -<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="79409">
14362 +<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="79830">
14363 <summary>
14364 Do not audit attempts to send and receive socks_server packets.
14365 </summary>
14366 @@ -59318,7 +59938,7 @@ Domain to not audit.
14367 </param>
14368 <infoflow type="none"/>
14369 </interface>
14370 -<interface name="corenet_relabelto_socks_server_packets" lineno="79424">
14371 +<interface name="corenet_relabelto_socks_server_packets" lineno="79845">
14372 <summary>
14373 Relabel packets to socks_server the packet type.
14374 </summary>
14375 @@ -59328,7 +59948,7 @@ Domain allowed access.
14376 </summary>
14377 </param>
14378 </interface>
14379 -<interface name="corenet_tcp_sendrecv_soundd_port" lineno="79446">
14380 +<interface name="corenet_tcp_sendrecv_soundd_port" lineno="79867">
14381 <summary>
14382 Send and receive TCP traffic on the soundd port.
14383 </summary>
14384 @@ -59339,7 +59959,7 @@ Domain allowed access.
14385 </param>
14386 <infoflow type="both" weight="10"/>
14387 </interface>
14388 -<interface name="corenet_udp_send_soundd_port" lineno="79461">
14389 +<interface name="corenet_udp_send_soundd_port" lineno="79882">
14390 <summary>
14391 Send UDP traffic on the soundd port.
14392 </summary>
14393 @@ -59350,7 +59970,7 @@ Domain allowed access.
14394 </param>
14395 <infoflow type="write" weight="10"/>
14396 </interface>
14397 -<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="79476">
14398 +<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="79897">
14399 <summary>
14400 Do not audit attempts to send UDP traffic on the soundd port.
14401 </summary>
14402 @@ -59361,7 +59981,7 @@ Domain to not audit.
14403 </param>
14404 <infoflow type="none"/>
14405 </interface>
14406 -<interface name="corenet_udp_receive_soundd_port" lineno="79491">
14407 +<interface name="corenet_udp_receive_soundd_port" lineno="79912">
14408 <summary>
14409 Receive UDP traffic on the soundd port.
14410 </summary>
14411 @@ -59372,7 +59992,7 @@ Domain allowed access.
14412 </param>
14413 <infoflow type="read" weight="10"/>
14414 </interface>
14415 -<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="79506">
14416 +<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="79927">
14417 <summary>
14418 Do not audit attempts to receive UDP traffic on the soundd port.
14419 </summary>
14420 @@ -59383,7 +60003,7 @@ Domain to not audit.
14421 </param>
14422 <infoflow type="none"/>
14423 </interface>
14424 -<interface name="corenet_udp_sendrecv_soundd_port" lineno="79521">
14425 +<interface name="corenet_udp_sendrecv_soundd_port" lineno="79942">
14426 <summary>
14427 Send and receive UDP traffic on the soundd port.
14428 </summary>
14429 @@ -59394,7 +60014,7 @@ Domain allowed access.
14430 </param>
14431 <infoflow type="both" weight="10"/>
14432 </interface>
14433 -<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="79537">
14434 +<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="79958">
14435 <summary>
14436 Do not audit attempts to send and receive
14437 UDP traffic on the soundd port.
14438 @@ -59406,7 +60026,7 @@ Domain to not audit.
14439 </param>
14440 <infoflow type="none"/>
14441 </interface>
14442 -<interface name="corenet_tcp_bind_soundd_port" lineno="79552">
14443 +<interface name="corenet_tcp_bind_soundd_port" lineno="79973">
14444 <summary>
14445 Bind TCP sockets to the soundd port.
14446 </summary>
14447 @@ -59417,7 +60037,7 @@ Domain allowed access.
14448 </param>
14449 <infoflow type="none"/>
14450 </interface>
14451 -<interface name="corenet_udp_bind_soundd_port" lineno="79572">
14452 +<interface name="corenet_udp_bind_soundd_port" lineno="79993">
14453 <summary>
14454 Bind UDP sockets to the soundd port.
14455 </summary>
14456 @@ -59428,7 +60048,7 @@ Domain allowed access.
14457 </param>
14458 <infoflow type="none"/>
14459 </interface>
14460 -<interface name="corenet_tcp_connect_soundd_port" lineno="79591">
14461 +<interface name="corenet_tcp_connect_soundd_port" lineno="80012">
14462 <summary>
14463 Make a TCP connection to the soundd port.
14464 </summary>
14465 @@ -59438,7 +60058,7 @@ Domain allowed access.
14466 </summary>
14467 </param>
14468 </interface>
14469 -<interface name="corenet_send_soundd_client_packets" lineno="79611">
14470 +<interface name="corenet_send_soundd_client_packets" lineno="80032">
14471 <summary>
14472 Send soundd_client packets.
14473 </summary>
14474 @@ -59449,7 +60069,7 @@ Domain allowed access.
14475 </param>
14476 <infoflow type="write" weight="10"/>
14477 </interface>
14478 -<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="79630">
14479 +<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="80051">
14480 <summary>
14481 Do not audit attempts to send soundd_client packets.
14482 </summary>
14483 @@ -59460,7 +60080,7 @@ Domain to not audit.
14484 </param>
14485 <infoflow type="none"/>
14486 </interface>
14487 -<interface name="corenet_receive_soundd_client_packets" lineno="79649">
14488 +<interface name="corenet_receive_soundd_client_packets" lineno="80070">
14489 <summary>
14490 Receive soundd_client packets.
14491 </summary>
14492 @@ -59471,7 +60091,7 @@ Domain allowed access.
14493 </param>
14494 <infoflow type="read" weight="10"/>
14495 </interface>
14496 -<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="79668">
14497 +<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="80089">
14498 <summary>
14499 Do not audit attempts to receive soundd_client packets.
14500 </summary>
14501 @@ -59482,7 +60102,7 @@ Domain allowed access.
14502 </param>
14503 <infoflow type="none"/>
14504 </interface>
14505 -<interface name="corenet_sendrecv_soundd_client_packets" lineno="79687">
14506 +<interface name="corenet_sendrecv_soundd_client_packets" lineno="80108">
14507 <summary>
14508 Send and receive soundd_client packets.
14509 </summary>
14510 @@ -59493,7 +60113,7 @@ Domain allowed access.
14511 </param>
14512 <infoflow type="both" weight="10"/>
14513 </interface>
14514 -<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="79703">
14515 +<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="80124">
14516 <summary>
14517 Do not audit attempts to send and receive soundd_client packets.
14518 </summary>
14519 @@ -59504,7 +60124,7 @@ Domain to not audit.
14520 </param>
14521 <infoflow type="none"/>
14522 </interface>
14523 -<interface name="corenet_relabelto_soundd_client_packets" lineno="79718">
14524 +<interface name="corenet_relabelto_soundd_client_packets" lineno="80139">
14525 <summary>
14526 Relabel packets to soundd_client the packet type.
14527 </summary>
14528 @@ -59514,7 +60134,7 @@ Domain allowed access.
14529 </summary>
14530 </param>
14531 </interface>
14532 -<interface name="corenet_send_soundd_server_packets" lineno="79738">
14533 +<interface name="corenet_send_soundd_server_packets" lineno="80159">
14534 <summary>
14535 Send soundd_server packets.
14536 </summary>
14537 @@ -59525,7 +60145,7 @@ Domain allowed access.
14538 </param>
14539 <infoflow type="write" weight="10"/>
14540 </interface>
14541 -<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="79757">
14542 +<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="80178">
14543 <summary>
14544 Do not audit attempts to send soundd_server packets.
14545 </summary>
14546 @@ -59536,7 +60156,7 @@ Domain to not audit.
14547 </param>
14548 <infoflow type="none"/>
14549 </interface>
14550 -<interface name="corenet_receive_soundd_server_packets" lineno="79776">
14551 +<interface name="corenet_receive_soundd_server_packets" lineno="80197">
14552 <summary>
14553 Receive soundd_server packets.
14554 </summary>
14555 @@ -59547,7 +60167,7 @@ Domain allowed access.
14556 </param>
14557 <infoflow type="read" weight="10"/>
14558 </interface>
14559 -<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="79795">
14560 +<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="80216">
14561 <summary>
14562 Do not audit attempts to receive soundd_server packets.
14563 </summary>
14564 @@ -59558,7 +60178,7 @@ Domain allowed access.
14565 </param>
14566 <infoflow type="none"/>
14567 </interface>
14568 -<interface name="corenet_sendrecv_soundd_server_packets" lineno="79814">
14569 +<interface name="corenet_sendrecv_soundd_server_packets" lineno="80235">
14570 <summary>
14571 Send and receive soundd_server packets.
14572 </summary>
14573 @@ -59569,7 +60189,7 @@ Domain allowed access.
14574 </param>
14575 <infoflow type="both" weight="10"/>
14576 </interface>
14577 -<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="79830">
14578 +<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="80251">
14579 <summary>
14580 Do not audit attempts to send and receive soundd_server packets.
14581 </summary>
14582 @@ -59580,7 +60200,7 @@ Domain to not audit.
14583 </param>
14584 <infoflow type="none"/>
14585 </interface>
14586 -<interface name="corenet_relabelto_soundd_server_packets" lineno="79845">
14587 +<interface name="corenet_relabelto_soundd_server_packets" lineno="80266">
14588 <summary>
14589 Relabel packets to soundd_server the packet type.
14590 </summary>
14591 @@ -59590,7 +60210,7 @@ Domain allowed access.
14592 </summary>
14593 </param>
14594 </interface>
14595 -<interface name="corenet_tcp_sendrecv_spamd_port" lineno="79867">
14596 +<interface name="corenet_tcp_sendrecv_spamd_port" lineno="80288">
14597 <summary>
14598 Send and receive TCP traffic on the spamd port.
14599 </summary>
14600 @@ -59601,7 +60221,7 @@ Domain allowed access.
14601 </param>
14602 <infoflow type="both" weight="10"/>
14603 </interface>
14604 -<interface name="corenet_udp_send_spamd_port" lineno="79882">
14605 +<interface name="corenet_udp_send_spamd_port" lineno="80303">
14606 <summary>
14607 Send UDP traffic on the spamd port.
14608 </summary>
14609 @@ -59612,7 +60232,7 @@ Domain allowed access.
14610 </param>
14611 <infoflow type="write" weight="10"/>
14612 </interface>
14613 -<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="79897">
14614 +<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="80318">
14615 <summary>
14616 Do not audit attempts to send UDP traffic on the spamd port.
14617 </summary>
14618 @@ -59623,7 +60243,7 @@ Domain to not audit.
14619 </param>
14620 <infoflow type="none"/>
14621 </interface>
14622 -<interface name="corenet_udp_receive_spamd_port" lineno="79912">
14623 +<interface name="corenet_udp_receive_spamd_port" lineno="80333">
14624 <summary>
14625 Receive UDP traffic on the spamd port.
14626 </summary>
14627 @@ -59634,7 +60254,7 @@ Domain allowed access.
14628 </param>
14629 <infoflow type="read" weight="10"/>
14630 </interface>
14631 -<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="79927">
14632 +<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="80348">
14633 <summary>
14634 Do not audit attempts to receive UDP traffic on the spamd port.
14635 </summary>
14636 @@ -59645,7 +60265,7 @@ Domain to not audit.
14637 </param>
14638 <infoflow type="none"/>
14639 </interface>
14640 -<interface name="corenet_udp_sendrecv_spamd_port" lineno="79942">
14641 +<interface name="corenet_udp_sendrecv_spamd_port" lineno="80363">
14642 <summary>
14643 Send and receive UDP traffic on the spamd port.
14644 </summary>
14645 @@ -59656,7 +60276,7 @@ Domain allowed access.
14646 </param>
14647 <infoflow type="both" weight="10"/>
14648 </interface>
14649 -<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="79958">
14650 +<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="80379">
14651 <summary>
14652 Do not audit attempts to send and receive
14653 UDP traffic on the spamd port.
14654 @@ -59668,7 +60288,7 @@ Domain to not audit.
14655 </param>
14656 <infoflow type="none"/>
14657 </interface>
14658 -<interface name="corenet_tcp_bind_spamd_port" lineno="79973">
14659 +<interface name="corenet_tcp_bind_spamd_port" lineno="80394">
14660 <summary>
14661 Bind TCP sockets to the spamd port.
14662 </summary>
14663 @@ -59679,7 +60299,7 @@ Domain allowed access.
14664 </param>
14665 <infoflow type="none"/>
14666 </interface>
14667 -<interface name="corenet_udp_bind_spamd_port" lineno="79993">
14668 +<interface name="corenet_udp_bind_spamd_port" lineno="80414">
14669 <summary>
14670 Bind UDP sockets to the spamd port.
14671 </summary>
14672 @@ -59690,7 +60310,7 @@ Domain allowed access.
14673 </param>
14674 <infoflow type="none"/>
14675 </interface>
14676 -<interface name="corenet_tcp_connect_spamd_port" lineno="80012">
14677 +<interface name="corenet_tcp_connect_spamd_port" lineno="80433">
14678 <summary>
14679 Make a TCP connection to the spamd port.
14680 </summary>
14681 @@ -59700,7 +60320,7 @@ Domain allowed access.
14682 </summary>
14683 </param>
14684 </interface>
14685 -<interface name="corenet_send_spamd_client_packets" lineno="80032">
14686 +<interface name="corenet_send_spamd_client_packets" lineno="80453">
14687 <summary>
14688 Send spamd_client packets.
14689 </summary>
14690 @@ -59711,7 +60331,7 @@ Domain allowed access.
14691 </param>
14692 <infoflow type="write" weight="10"/>
14693 </interface>
14694 -<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="80051">
14695 +<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="80472">
14696 <summary>
14697 Do not audit attempts to send spamd_client packets.
14698 </summary>
14699 @@ -59722,7 +60342,7 @@ Domain to not audit.
14700 </param>
14701 <infoflow type="none"/>
14702 </interface>
14703 -<interface name="corenet_receive_spamd_client_packets" lineno="80070">
14704 +<interface name="corenet_receive_spamd_client_packets" lineno="80491">
14705 <summary>
14706 Receive spamd_client packets.
14707 </summary>
14708 @@ -59733,7 +60353,7 @@ Domain allowed access.
14709 </param>
14710 <infoflow type="read" weight="10"/>
14711 </interface>
14712 -<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="80089">
14713 +<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="80510">
14714 <summary>
14715 Do not audit attempts to receive spamd_client packets.
14716 </summary>
14717 @@ -59744,7 +60364,7 @@ Domain allowed access.
14718 </param>
14719 <infoflow type="none"/>
14720 </interface>
14721 -<interface name="corenet_sendrecv_spamd_client_packets" lineno="80108">
14722 +<interface name="corenet_sendrecv_spamd_client_packets" lineno="80529">
14723 <summary>
14724 Send and receive spamd_client packets.
14725 </summary>
14726 @@ -59755,7 +60375,7 @@ Domain allowed access.
14727 </param>
14728 <infoflow type="both" weight="10"/>
14729 </interface>
14730 -<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="80124">
14731 +<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="80545">
14732 <summary>
14733 Do not audit attempts to send and receive spamd_client packets.
14734 </summary>
14735 @@ -59766,7 +60386,7 @@ Domain to not audit.
14736 </param>
14737 <infoflow type="none"/>
14738 </interface>
14739 -<interface name="corenet_relabelto_spamd_client_packets" lineno="80139">
14740 +<interface name="corenet_relabelto_spamd_client_packets" lineno="80560">
14741 <summary>
14742 Relabel packets to spamd_client the packet type.
14743 </summary>
14744 @@ -59776,7 +60396,7 @@ Domain allowed access.
14745 </summary>
14746 </param>
14747 </interface>
14748 -<interface name="corenet_send_spamd_server_packets" lineno="80159">
14749 +<interface name="corenet_send_spamd_server_packets" lineno="80580">
14750 <summary>
14751 Send spamd_server packets.
14752 </summary>
14753 @@ -59787,7 +60407,7 @@ Domain allowed access.
14754 </param>
14755 <infoflow type="write" weight="10"/>
14756 </interface>
14757 -<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="80178">
14758 +<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="80599">
14759 <summary>
14760 Do not audit attempts to send spamd_server packets.
14761 </summary>
14762 @@ -59798,7 +60418,7 @@ Domain to not audit.
14763 </param>
14764 <infoflow type="none"/>
14765 </interface>
14766 -<interface name="corenet_receive_spamd_server_packets" lineno="80197">
14767 +<interface name="corenet_receive_spamd_server_packets" lineno="80618">
14768 <summary>
14769 Receive spamd_server packets.
14770 </summary>
14771 @@ -59809,7 +60429,7 @@ Domain allowed access.
14772 </param>
14773 <infoflow type="read" weight="10"/>
14774 </interface>
14775 -<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="80216">
14776 +<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="80637">
14777 <summary>
14778 Do not audit attempts to receive spamd_server packets.
14779 </summary>
14780 @@ -59820,7 +60440,7 @@ Domain allowed access.
14781 </param>
14782 <infoflow type="none"/>
14783 </interface>
14784 -<interface name="corenet_sendrecv_spamd_server_packets" lineno="80235">
14785 +<interface name="corenet_sendrecv_spamd_server_packets" lineno="80656">
14786 <summary>
14787 Send and receive spamd_server packets.
14788 </summary>
14789 @@ -59831,7 +60451,7 @@ Domain allowed access.
14790 </param>
14791 <infoflow type="both" weight="10"/>
14792 </interface>
14793 -<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="80251">
14794 +<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="80672">
14795 <summary>
14796 Do not audit attempts to send and receive spamd_server packets.
14797 </summary>
14798 @@ -59842,7 +60462,7 @@ Domain to not audit.
14799 </param>
14800 <infoflow type="none"/>
14801 </interface>
14802 -<interface name="corenet_relabelto_spamd_server_packets" lineno="80266">
14803 +<interface name="corenet_relabelto_spamd_server_packets" lineno="80687">
14804 <summary>
14805 Relabel packets to spamd_server the packet type.
14806 </summary>
14807 @@ -59852,7 +60472,7 @@ Domain allowed access.
14808 </summary>
14809 </param>
14810 </interface>
14811 -<interface name="corenet_tcp_sendrecv_speech_port" lineno="80288">
14812 +<interface name="corenet_tcp_sendrecv_speech_port" lineno="80709">
14813 <summary>
14814 Send and receive TCP traffic on the speech port.
14815 </summary>
14816 @@ -59863,7 +60483,7 @@ Domain allowed access.
14817 </param>
14818 <infoflow type="both" weight="10"/>
14819 </interface>
14820 -<interface name="corenet_udp_send_speech_port" lineno="80303">
14821 +<interface name="corenet_udp_send_speech_port" lineno="80724">
14822 <summary>
14823 Send UDP traffic on the speech port.
14824 </summary>
14825 @@ -59874,7 +60494,7 @@ Domain allowed access.
14826 </param>
14827 <infoflow type="write" weight="10"/>
14828 </interface>
14829 -<interface name="corenet_dontaudit_udp_send_speech_port" lineno="80318">
14830 +<interface name="corenet_dontaudit_udp_send_speech_port" lineno="80739">
14831 <summary>
14832 Do not audit attempts to send UDP traffic on the speech port.
14833 </summary>
14834 @@ -59885,7 +60505,7 @@ Domain to not audit.
14835 </param>
14836 <infoflow type="none"/>
14837 </interface>
14838 -<interface name="corenet_udp_receive_speech_port" lineno="80333">
14839 +<interface name="corenet_udp_receive_speech_port" lineno="80754">
14840 <summary>
14841 Receive UDP traffic on the speech port.
14842 </summary>
14843 @@ -59896,7 +60516,7 @@ Domain allowed access.
14844 </param>
14845 <infoflow type="read" weight="10"/>
14846 </interface>
14847 -<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="80348">
14848 +<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="80769">
14849 <summary>
14850 Do not audit attempts to receive UDP traffic on the speech port.
14851 </summary>
14852 @@ -59907,7 +60527,7 @@ Domain to not audit.
14853 </param>
14854 <infoflow type="none"/>
14855 </interface>
14856 -<interface name="corenet_udp_sendrecv_speech_port" lineno="80363">
14857 +<interface name="corenet_udp_sendrecv_speech_port" lineno="80784">
14858 <summary>
14859 Send and receive UDP traffic on the speech port.
14860 </summary>
14861 @@ -59918,7 +60538,7 @@ Domain allowed access.
14862 </param>
14863 <infoflow type="both" weight="10"/>
14864 </interface>
14865 -<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="80379">
14866 +<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="80800">
14867 <summary>
14868 Do not audit attempts to send and receive
14869 UDP traffic on the speech port.
14870 @@ -59930,7 +60550,7 @@ Domain to not audit.
14871 </param>
14872 <infoflow type="none"/>
14873 </interface>
14874 -<interface name="corenet_tcp_bind_speech_port" lineno="80394">
14875 +<interface name="corenet_tcp_bind_speech_port" lineno="80815">
14876 <summary>
14877 Bind TCP sockets to the speech port.
14878 </summary>
14879 @@ -59941,7 +60561,7 @@ Domain allowed access.
14880 </param>
14881 <infoflow type="none"/>
14882 </interface>
14883 -<interface name="corenet_udp_bind_speech_port" lineno="80414">
14884 +<interface name="corenet_udp_bind_speech_port" lineno="80835">
14885 <summary>
14886 Bind UDP sockets to the speech port.
14887 </summary>
14888 @@ -59952,7 +60572,7 @@ Domain allowed access.
14889 </param>
14890 <infoflow type="none"/>
14891 </interface>
14892 -<interface name="corenet_tcp_connect_speech_port" lineno="80433">
14893 +<interface name="corenet_tcp_connect_speech_port" lineno="80854">
14894 <summary>
14895 Make a TCP connection to the speech port.
14896 </summary>
14897 @@ -59962,7 +60582,7 @@ Domain allowed access.
14898 </summary>
14899 </param>
14900 </interface>
14901 -<interface name="corenet_send_speech_client_packets" lineno="80453">
14902 +<interface name="corenet_send_speech_client_packets" lineno="80874">
14903 <summary>
14904 Send speech_client packets.
14905 </summary>
14906 @@ -59973,7 +60593,7 @@ Domain allowed access.
14907 </param>
14908 <infoflow type="write" weight="10"/>
14909 </interface>
14910 -<interface name="corenet_dontaudit_send_speech_client_packets" lineno="80472">
14911 +<interface name="corenet_dontaudit_send_speech_client_packets" lineno="80893">
14912 <summary>
14913 Do not audit attempts to send speech_client packets.
14914 </summary>
14915 @@ -59984,7 +60604,7 @@ Domain to not audit.
14916 </param>
14917 <infoflow type="none"/>
14918 </interface>
14919 -<interface name="corenet_receive_speech_client_packets" lineno="80491">
14920 +<interface name="corenet_receive_speech_client_packets" lineno="80912">
14921 <summary>
14922 Receive speech_client packets.
14923 </summary>
14924 @@ -59995,7 +60615,7 @@ Domain allowed access.
14925 </param>
14926 <infoflow type="read" weight="10"/>
14927 </interface>
14928 -<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="80510">
14929 +<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="80931">
14930 <summary>
14931 Do not audit attempts to receive speech_client packets.
14932 </summary>
14933 @@ -60006,7 +60626,7 @@ Domain allowed access.
14934 </param>
14935 <infoflow type="none"/>
14936 </interface>
14937 -<interface name="corenet_sendrecv_speech_client_packets" lineno="80529">
14938 +<interface name="corenet_sendrecv_speech_client_packets" lineno="80950">
14939 <summary>
14940 Send and receive speech_client packets.
14941 </summary>
14942 @@ -60017,7 +60637,7 @@ Domain allowed access.
14943 </param>
14944 <infoflow type="both" weight="10"/>
14945 </interface>
14946 -<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="80545">
14947 +<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="80966">
14948 <summary>
14949 Do not audit attempts to send and receive speech_client packets.
14950 </summary>
14951 @@ -60028,7 +60648,7 @@ Domain to not audit.
14952 </param>
14953 <infoflow type="none"/>
14954 </interface>
14955 -<interface name="corenet_relabelto_speech_client_packets" lineno="80560">
14956 +<interface name="corenet_relabelto_speech_client_packets" lineno="80981">
14957 <summary>
14958 Relabel packets to speech_client the packet type.
14959 </summary>
14960 @@ -60038,7 +60658,7 @@ Domain allowed access.
14961 </summary>
14962 </param>
14963 </interface>
14964 -<interface name="corenet_send_speech_server_packets" lineno="80580">
14965 +<interface name="corenet_send_speech_server_packets" lineno="81001">
14966 <summary>
14967 Send speech_server packets.
14968 </summary>
14969 @@ -60049,7 +60669,7 @@ Domain allowed access.
14970 </param>
14971 <infoflow type="write" weight="10"/>
14972 </interface>
14973 -<interface name="corenet_dontaudit_send_speech_server_packets" lineno="80599">
14974 +<interface name="corenet_dontaudit_send_speech_server_packets" lineno="81020">
14975 <summary>
14976 Do not audit attempts to send speech_server packets.
14977 </summary>
14978 @@ -60060,7 +60680,7 @@ Domain to not audit.
14979 </param>
14980 <infoflow type="none"/>
14981 </interface>
14982 -<interface name="corenet_receive_speech_server_packets" lineno="80618">
14983 +<interface name="corenet_receive_speech_server_packets" lineno="81039">
14984 <summary>
14985 Receive speech_server packets.
14986 </summary>
14987 @@ -60071,7 +60691,7 @@ Domain allowed access.
14988 </param>
14989 <infoflow type="read" weight="10"/>
14990 </interface>
14991 -<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="80637">
14992 +<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="81058">
14993 <summary>
14994 Do not audit attempts to receive speech_server packets.
14995 </summary>
14996 @@ -60082,7 +60702,7 @@ Domain allowed access.
14997 </param>
14998 <infoflow type="none"/>
14999 </interface>
15000 -<interface name="corenet_sendrecv_speech_server_packets" lineno="80656">
15001 +<interface name="corenet_sendrecv_speech_server_packets" lineno="81077">
15002 <summary>
15003 Send and receive speech_server packets.
15004 </summary>
15005 @@ -60093,7 +60713,7 @@ Domain allowed access.
15006 </param>
15007 <infoflow type="both" weight="10"/>
15008 </interface>
15009 -<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="80672">
15010 +<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="81093">
15011 <summary>
15012 Do not audit attempts to send and receive speech_server packets.
15013 </summary>
15014 @@ -60104,7 +60724,7 @@ Domain to not audit.
15015 </param>
15016 <infoflow type="none"/>
15017 </interface>
15018 -<interface name="corenet_relabelto_speech_server_packets" lineno="80687">
15019 +<interface name="corenet_relabelto_speech_server_packets" lineno="81108">
15020 <summary>
15021 Relabel packets to speech_server the packet type.
15022 </summary>
15023 @@ -60114,7 +60734,7 @@ Domain allowed access.
15024 </summary>
15025 </param>
15026 </interface>
15027 -<interface name="corenet_tcp_sendrecv_squid_port" lineno="80709">
15028 +<interface name="corenet_tcp_sendrecv_squid_port" lineno="81130">
15029 <summary>
15030 Send and receive TCP traffic on the squid port.
15031 </summary>
15032 @@ -60125,7 +60745,7 @@ Domain allowed access.
15033 </param>
15034 <infoflow type="both" weight="10"/>
15035 </interface>
15036 -<interface name="corenet_udp_send_squid_port" lineno="80724">
15037 +<interface name="corenet_udp_send_squid_port" lineno="81145">
15038 <summary>
15039 Send UDP traffic on the squid port.
15040 </summary>
15041 @@ -60136,7 +60756,7 @@ Domain allowed access.
15042 </param>
15043 <infoflow type="write" weight="10"/>
15044 </interface>
15045 -<interface name="corenet_dontaudit_udp_send_squid_port" lineno="80739">
15046 +<interface name="corenet_dontaudit_udp_send_squid_port" lineno="81160">
15047 <summary>
15048 Do not audit attempts to send UDP traffic on the squid port.
15049 </summary>
15050 @@ -60147,7 +60767,7 @@ Domain to not audit.
15051 </param>
15052 <infoflow type="none"/>
15053 </interface>
15054 -<interface name="corenet_udp_receive_squid_port" lineno="80754">
15055 +<interface name="corenet_udp_receive_squid_port" lineno="81175">
15056 <summary>
15057 Receive UDP traffic on the squid port.
15058 </summary>
15059 @@ -60158,7 +60778,7 @@ Domain allowed access.
15060 </param>
15061 <infoflow type="read" weight="10"/>
15062 </interface>
15063 -<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="80769">
15064 +<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="81190">
15065 <summary>
15066 Do not audit attempts to receive UDP traffic on the squid port.
15067 </summary>
15068 @@ -60169,7 +60789,7 @@ Domain to not audit.
15069 </param>
15070 <infoflow type="none"/>
15071 </interface>
15072 -<interface name="corenet_udp_sendrecv_squid_port" lineno="80784">
15073 +<interface name="corenet_udp_sendrecv_squid_port" lineno="81205">
15074 <summary>
15075 Send and receive UDP traffic on the squid port.
15076 </summary>
15077 @@ -60180,7 +60800,7 @@ Domain allowed access.
15078 </param>
15079 <infoflow type="both" weight="10"/>
15080 </interface>
15081 -<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="80800">
15082 +<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="81221">
15083 <summary>
15084 Do not audit attempts to send and receive
15085 UDP traffic on the squid port.
15086 @@ -60192,7 +60812,7 @@ Domain to not audit.
15087 </param>
15088 <infoflow type="none"/>
15089 </interface>
15090 -<interface name="corenet_tcp_bind_squid_port" lineno="80815">
15091 +<interface name="corenet_tcp_bind_squid_port" lineno="81236">
15092 <summary>
15093 Bind TCP sockets to the squid port.
15094 </summary>
15095 @@ -60203,7 +60823,7 @@ Domain allowed access.
15096 </param>
15097 <infoflow type="none"/>
15098 </interface>
15099 -<interface name="corenet_udp_bind_squid_port" lineno="80835">
15100 +<interface name="corenet_udp_bind_squid_port" lineno="81256">
15101 <summary>
15102 Bind UDP sockets to the squid port.
15103 </summary>
15104 @@ -60214,7 +60834,7 @@ Domain allowed access.
15105 </param>
15106 <infoflow type="none"/>
15107 </interface>
15108 -<interface name="corenet_tcp_connect_squid_port" lineno="80854">
15109 +<interface name="corenet_tcp_connect_squid_port" lineno="81275">
15110 <summary>
15111 Make a TCP connection to the squid port.
15112 </summary>
15113 @@ -60224,7 +60844,7 @@ Domain allowed access.
15114 </summary>
15115 </param>
15116 </interface>
15117 -<interface name="corenet_send_squid_client_packets" lineno="80874">
15118 +<interface name="corenet_send_squid_client_packets" lineno="81295">
15119 <summary>
15120 Send squid_client packets.
15121 </summary>
15122 @@ -60235,7 +60855,7 @@ Domain allowed access.
15123 </param>
15124 <infoflow type="write" weight="10"/>
15125 </interface>
15126 -<interface name="corenet_dontaudit_send_squid_client_packets" lineno="80893">
15127 +<interface name="corenet_dontaudit_send_squid_client_packets" lineno="81314">
15128 <summary>
15129 Do not audit attempts to send squid_client packets.
15130 </summary>
15131 @@ -60246,7 +60866,7 @@ Domain to not audit.
15132 </param>
15133 <infoflow type="none"/>
15134 </interface>
15135 -<interface name="corenet_receive_squid_client_packets" lineno="80912">
15136 +<interface name="corenet_receive_squid_client_packets" lineno="81333">
15137 <summary>
15138 Receive squid_client packets.
15139 </summary>
15140 @@ -60257,7 +60877,7 @@ Domain allowed access.
15141 </param>
15142 <infoflow type="read" weight="10"/>
15143 </interface>
15144 -<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="80931">
15145 +<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="81352">
15146 <summary>
15147 Do not audit attempts to receive squid_client packets.
15148 </summary>
15149 @@ -60268,7 +60888,7 @@ Domain allowed access.
15150 </param>
15151 <infoflow type="none"/>
15152 </interface>
15153 -<interface name="corenet_sendrecv_squid_client_packets" lineno="80950">
15154 +<interface name="corenet_sendrecv_squid_client_packets" lineno="81371">
15155 <summary>
15156 Send and receive squid_client packets.
15157 </summary>
15158 @@ -60279,7 +60899,7 @@ Domain allowed access.
15159 </param>
15160 <infoflow type="both" weight="10"/>
15161 </interface>
15162 -<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="80966">
15163 +<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="81387">
15164 <summary>
15165 Do not audit attempts to send and receive squid_client packets.
15166 </summary>
15167 @@ -60290,7 +60910,7 @@ Domain to not audit.
15168 </param>
15169 <infoflow type="none"/>
15170 </interface>
15171 -<interface name="corenet_relabelto_squid_client_packets" lineno="80981">
15172 +<interface name="corenet_relabelto_squid_client_packets" lineno="81402">
15173 <summary>
15174 Relabel packets to squid_client the packet type.
15175 </summary>
15176 @@ -60300,7 +60920,7 @@ Domain allowed access.
15177 </summary>
15178 </param>
15179 </interface>
15180 -<interface name="corenet_send_squid_server_packets" lineno="81001">
15181 +<interface name="corenet_send_squid_server_packets" lineno="81422">
15182 <summary>
15183 Send squid_server packets.
15184 </summary>
15185 @@ -60311,7 +60931,7 @@ Domain allowed access.
15186 </param>
15187 <infoflow type="write" weight="10"/>
15188 </interface>
15189 -<interface name="corenet_dontaudit_send_squid_server_packets" lineno="81020">
15190 +<interface name="corenet_dontaudit_send_squid_server_packets" lineno="81441">
15191 <summary>
15192 Do not audit attempts to send squid_server packets.
15193 </summary>
15194 @@ -60322,7 +60942,7 @@ Domain to not audit.
15195 </param>
15196 <infoflow type="none"/>
15197 </interface>
15198 -<interface name="corenet_receive_squid_server_packets" lineno="81039">
15199 +<interface name="corenet_receive_squid_server_packets" lineno="81460">
15200 <summary>
15201 Receive squid_server packets.
15202 </summary>
15203 @@ -60333,7 +60953,7 @@ Domain allowed access.
15204 </param>
15205 <infoflow type="read" weight="10"/>
15206 </interface>
15207 -<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="81058">
15208 +<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="81479">
15209 <summary>
15210 Do not audit attempts to receive squid_server packets.
15211 </summary>
15212 @@ -60344,7 +60964,7 @@ Domain allowed access.
15213 </param>
15214 <infoflow type="none"/>
15215 </interface>
15216 -<interface name="corenet_sendrecv_squid_server_packets" lineno="81077">
15217 +<interface name="corenet_sendrecv_squid_server_packets" lineno="81498">
15218 <summary>
15219 Send and receive squid_server packets.
15220 </summary>
15221 @@ -60355,7 +60975,7 @@ Domain allowed access.
15222 </param>
15223 <infoflow type="both" weight="10"/>
15224 </interface>
15225 -<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="81093">
15226 +<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="81514">
15227 <summary>
15228 Do not audit attempts to send and receive squid_server packets.
15229 </summary>
15230 @@ -60366,7 +60986,7 @@ Domain to not audit.
15231 </param>
15232 <infoflow type="none"/>
15233 </interface>
15234 -<interface name="corenet_relabelto_squid_server_packets" lineno="81108">
15235 +<interface name="corenet_relabelto_squid_server_packets" lineno="81529">
15236 <summary>
15237 Relabel packets to squid_server the packet type.
15238 </summary>
15239 @@ -60376,7 +60996,7 @@ Domain allowed access.
15240 </summary>
15241 </param>
15242 </interface>
15243 -<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="81130">
15244 +<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="81551">
15245 <summary>
15246 Send and receive TCP traffic on the ssdp port.
15247 </summary>
15248 @@ -60387,7 +61007,7 @@ Domain allowed access.
15249 </param>
15250 <infoflow type="both" weight="10"/>
15251 </interface>
15252 -<interface name="corenet_udp_send_ssdp_port" lineno="81145">
15253 +<interface name="corenet_udp_send_ssdp_port" lineno="81566">
15254 <summary>
15255 Send UDP traffic on the ssdp port.
15256 </summary>
15257 @@ -60398,7 +61018,7 @@ Domain allowed access.
15258 </param>
15259 <infoflow type="write" weight="10"/>
15260 </interface>
15261 -<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="81160">
15262 +<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="81581">
15263 <summary>
15264 Do not audit attempts to send UDP traffic on the ssdp port.
15265 </summary>
15266 @@ -60409,7 +61029,7 @@ Domain to not audit.
15267 </param>
15268 <infoflow type="none"/>
15269 </interface>
15270 -<interface name="corenet_udp_receive_ssdp_port" lineno="81175">
15271 +<interface name="corenet_udp_receive_ssdp_port" lineno="81596">
15272 <summary>
15273 Receive UDP traffic on the ssdp port.
15274 </summary>
15275 @@ -60420,7 +61040,7 @@ Domain allowed access.
15276 </param>
15277 <infoflow type="read" weight="10"/>
15278 </interface>
15279 -<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="81190">
15280 +<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="81611">
15281 <summary>
15282 Do not audit attempts to receive UDP traffic on the ssdp port.
15283 </summary>
15284 @@ -60431,7 +61051,7 @@ Domain to not audit.
15285 </param>
15286 <infoflow type="none"/>
15287 </interface>
15288 -<interface name="corenet_udp_sendrecv_ssdp_port" lineno="81205">
15289 +<interface name="corenet_udp_sendrecv_ssdp_port" lineno="81626">
15290 <summary>
15291 Send and receive UDP traffic on the ssdp port.
15292 </summary>
15293 @@ -60442,7 +61062,7 @@ Domain allowed access.
15294 </param>
15295 <infoflow type="both" weight="10"/>
15296 </interface>
15297 -<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="81221">
15298 +<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="81642">
15299 <summary>
15300 Do not audit attempts to send and receive
15301 UDP traffic on the ssdp port.
15302 @@ -60454,7 +61074,7 @@ Domain to not audit.
15303 </param>
15304 <infoflow type="none"/>
15305 </interface>
15306 -<interface name="corenet_tcp_bind_ssdp_port" lineno="81236">
15307 +<interface name="corenet_tcp_bind_ssdp_port" lineno="81657">
15308 <summary>
15309 Bind TCP sockets to the ssdp port.
15310 </summary>
15311 @@ -60465,7 +61085,7 @@ Domain allowed access.
15312 </param>
15313 <infoflow type="none"/>
15314 </interface>
15315 -<interface name="corenet_udp_bind_ssdp_port" lineno="81256">
15316 +<interface name="corenet_udp_bind_ssdp_port" lineno="81677">
15317 <summary>
15318 Bind UDP sockets to the ssdp port.
15319 </summary>
15320 @@ -60476,7 +61096,7 @@ Domain allowed access.
15321 </param>
15322 <infoflow type="none"/>
15323 </interface>
15324 -<interface name="corenet_tcp_connect_ssdp_port" lineno="81275">
15325 +<interface name="corenet_tcp_connect_ssdp_port" lineno="81696">
15326 <summary>
15327 Make a TCP connection to the ssdp port.
15328 </summary>
15329 @@ -60486,7 +61106,7 @@ Domain allowed access.
15330 </summary>
15331 </param>
15332 </interface>
15333 -<interface name="corenet_send_ssdp_client_packets" lineno="81295">
15334 +<interface name="corenet_send_ssdp_client_packets" lineno="81716">
15335 <summary>
15336 Send ssdp_client packets.
15337 </summary>
15338 @@ -60497,7 +61117,7 @@ Domain allowed access.
15339 </param>
15340 <infoflow type="write" weight="10"/>
15341 </interface>
15342 -<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="81314">
15343 +<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="81735">
15344 <summary>
15345 Do not audit attempts to send ssdp_client packets.
15346 </summary>
15347 @@ -60508,7 +61128,7 @@ Domain to not audit.
15348 </param>
15349 <infoflow type="none"/>
15350 </interface>
15351 -<interface name="corenet_receive_ssdp_client_packets" lineno="81333">
15352 +<interface name="corenet_receive_ssdp_client_packets" lineno="81754">
15353 <summary>
15354 Receive ssdp_client packets.
15355 </summary>
15356 @@ -60519,7 +61139,7 @@ Domain allowed access.
15357 </param>
15358 <infoflow type="read" weight="10"/>
15359 </interface>
15360 -<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="81352">
15361 +<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="81773">
15362 <summary>
15363 Do not audit attempts to receive ssdp_client packets.
15364 </summary>
15365 @@ -60530,7 +61150,7 @@ Domain allowed access.
15366 </param>
15367 <infoflow type="none"/>
15368 </interface>
15369 -<interface name="corenet_sendrecv_ssdp_client_packets" lineno="81371">
15370 +<interface name="corenet_sendrecv_ssdp_client_packets" lineno="81792">
15371 <summary>
15372 Send and receive ssdp_client packets.
15373 </summary>
15374 @@ -60541,7 +61161,7 @@ Domain allowed access.
15375 </param>
15376 <infoflow type="both" weight="10"/>
15377 </interface>
15378 -<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="81387">
15379 +<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="81808">
15380 <summary>
15381 Do not audit attempts to send and receive ssdp_client packets.
15382 </summary>
15383 @@ -60552,7 +61172,7 @@ Domain to not audit.
15384 </param>
15385 <infoflow type="none"/>
15386 </interface>
15387 -<interface name="corenet_relabelto_ssdp_client_packets" lineno="81402">
15388 +<interface name="corenet_relabelto_ssdp_client_packets" lineno="81823">
15389 <summary>
15390 Relabel packets to ssdp_client the packet type.
15391 </summary>
15392 @@ -60562,7 +61182,7 @@ Domain allowed access.
15393 </summary>
15394 </param>
15395 </interface>
15396 -<interface name="corenet_send_ssdp_server_packets" lineno="81422">
15397 +<interface name="corenet_send_ssdp_server_packets" lineno="81843">
15398 <summary>
15399 Send ssdp_server packets.
15400 </summary>
15401 @@ -60573,7 +61193,7 @@ Domain allowed access.
15402 </param>
15403 <infoflow type="write" weight="10"/>
15404 </interface>
15405 -<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="81441">
15406 +<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="81862">
15407 <summary>
15408 Do not audit attempts to send ssdp_server packets.
15409 </summary>
15410 @@ -60584,7 +61204,7 @@ Domain to not audit.
15411 </param>
15412 <infoflow type="none"/>
15413 </interface>
15414 -<interface name="corenet_receive_ssdp_server_packets" lineno="81460">
15415 +<interface name="corenet_receive_ssdp_server_packets" lineno="81881">
15416 <summary>
15417 Receive ssdp_server packets.
15418 </summary>
15419 @@ -60595,7 +61215,7 @@ Domain allowed access.
15420 </param>
15421 <infoflow type="read" weight="10"/>
15422 </interface>
15423 -<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="81479">
15424 +<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="81900">
15425 <summary>
15426 Do not audit attempts to receive ssdp_server packets.
15427 </summary>
15428 @@ -60606,7 +61226,7 @@ Domain allowed access.
15429 </param>
15430 <infoflow type="none"/>
15431 </interface>
15432 -<interface name="corenet_sendrecv_ssdp_server_packets" lineno="81498">
15433 +<interface name="corenet_sendrecv_ssdp_server_packets" lineno="81919">
15434 <summary>
15435 Send and receive ssdp_server packets.
15436 </summary>
15437 @@ -60617,7 +61237,7 @@ Domain allowed access.
15438 </param>
15439 <infoflow type="both" weight="10"/>
15440 </interface>
15441 -<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="81514">
15442 +<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="81935">
15443 <summary>
15444 Do not audit attempts to send and receive ssdp_server packets.
15445 </summary>
15446 @@ -60628,7 +61248,7 @@ Domain to not audit.
15447 </param>
15448 <infoflow type="none"/>
15449 </interface>
15450 -<interface name="corenet_relabelto_ssdp_server_packets" lineno="81529">
15451 +<interface name="corenet_relabelto_ssdp_server_packets" lineno="81950">
15452 <summary>
15453 Relabel packets to ssdp_server the packet type.
15454 </summary>
15455 @@ -60638,7 +61258,7 @@ Domain allowed access.
15456 </summary>
15457 </param>
15458 </interface>
15459 -<interface name="corenet_tcp_sendrecv_ssh_port" lineno="81551">
15460 +<interface name="corenet_tcp_sendrecv_ssh_port" lineno="81972">
15461 <summary>
15462 Send and receive TCP traffic on the ssh port.
15463 </summary>
15464 @@ -60649,7 +61269,7 @@ Domain allowed access.
15465 </param>
15466 <infoflow type="both" weight="10"/>
15467 </interface>
15468 -<interface name="corenet_udp_send_ssh_port" lineno="81566">
15469 +<interface name="corenet_udp_send_ssh_port" lineno="81987">
15470 <summary>
15471 Send UDP traffic on the ssh port.
15472 </summary>
15473 @@ -60660,7 +61280,7 @@ Domain allowed access.
15474 </param>
15475 <infoflow type="write" weight="10"/>
15476 </interface>
15477 -<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="81581">
15478 +<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="82002">
15479 <summary>
15480 Do not audit attempts to send UDP traffic on the ssh port.
15481 </summary>
15482 @@ -60671,7 +61291,7 @@ Domain to not audit.
15483 </param>
15484 <infoflow type="none"/>
15485 </interface>
15486 -<interface name="corenet_udp_receive_ssh_port" lineno="81596">
15487 +<interface name="corenet_udp_receive_ssh_port" lineno="82017">
15488 <summary>
15489 Receive UDP traffic on the ssh port.
15490 </summary>
15491 @@ -60682,7 +61302,7 @@ Domain allowed access.
15492 </param>
15493 <infoflow type="read" weight="10"/>
15494 </interface>
15495 -<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="81611">
15496 +<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="82032">
15497 <summary>
15498 Do not audit attempts to receive UDP traffic on the ssh port.
15499 </summary>
15500 @@ -60693,7 +61313,7 @@ Domain to not audit.
15501 </param>
15502 <infoflow type="none"/>
15503 </interface>
15504 -<interface name="corenet_udp_sendrecv_ssh_port" lineno="81626">
15505 +<interface name="corenet_udp_sendrecv_ssh_port" lineno="82047">
15506 <summary>
15507 Send and receive UDP traffic on the ssh port.
15508 </summary>
15509 @@ -60704,7 +61324,7 @@ Domain allowed access.
15510 </param>
15511 <infoflow type="both" weight="10"/>
15512 </interface>
15513 -<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="81642">
15514 +<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="82063">
15515 <summary>
15516 Do not audit attempts to send and receive
15517 UDP traffic on the ssh port.
15518 @@ -60716,7 +61336,7 @@ Domain to not audit.
15519 </param>
15520 <infoflow type="none"/>
15521 </interface>
15522 -<interface name="corenet_tcp_bind_ssh_port" lineno="81657">
15523 +<interface name="corenet_tcp_bind_ssh_port" lineno="82078">
15524 <summary>
15525 Bind TCP sockets to the ssh port.
15526 </summary>
15527 @@ -60727,7 +61347,7 @@ Domain allowed access.
15528 </param>
15529 <infoflow type="none"/>
15530 </interface>
15531 -<interface name="corenet_udp_bind_ssh_port" lineno="81677">
15532 +<interface name="corenet_udp_bind_ssh_port" lineno="82098">
15533 <summary>
15534 Bind UDP sockets to the ssh port.
15535 </summary>
15536 @@ -60738,7 +61358,7 @@ Domain allowed access.
15537 </param>
15538 <infoflow type="none"/>
15539 </interface>
15540 -<interface name="corenet_tcp_connect_ssh_port" lineno="81696">
15541 +<interface name="corenet_tcp_connect_ssh_port" lineno="82117">
15542 <summary>
15543 Make a TCP connection to the ssh port.
15544 </summary>
15545 @@ -60748,7 +61368,7 @@ Domain allowed access.
15546 </summary>
15547 </param>
15548 </interface>
15549 -<interface name="corenet_send_ssh_client_packets" lineno="81716">
15550 +<interface name="corenet_send_ssh_client_packets" lineno="82137">
15551 <summary>
15552 Send ssh_client packets.
15553 </summary>
15554 @@ -60759,7 +61379,7 @@ Domain allowed access.
15555 </param>
15556 <infoflow type="write" weight="10"/>
15557 </interface>
15558 -<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="81735">
15559 +<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="82156">
15560 <summary>
15561 Do not audit attempts to send ssh_client packets.
15562 </summary>
15563 @@ -60770,7 +61390,7 @@ Domain to not audit.
15564 </param>
15565 <infoflow type="none"/>
15566 </interface>
15567 -<interface name="corenet_receive_ssh_client_packets" lineno="81754">
15568 +<interface name="corenet_receive_ssh_client_packets" lineno="82175">
15569 <summary>
15570 Receive ssh_client packets.
15571 </summary>
15572 @@ -60781,7 +61401,7 @@ Domain allowed access.
15573 </param>
15574 <infoflow type="read" weight="10"/>
15575 </interface>
15576 -<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="81773">
15577 +<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="82194">
15578 <summary>
15579 Do not audit attempts to receive ssh_client packets.
15580 </summary>
15581 @@ -60792,7 +61412,7 @@ Domain allowed access.
15582 </param>
15583 <infoflow type="none"/>
15584 </interface>
15585 -<interface name="corenet_sendrecv_ssh_client_packets" lineno="81792">
15586 +<interface name="corenet_sendrecv_ssh_client_packets" lineno="82213">
15587 <summary>
15588 Send and receive ssh_client packets.
15589 </summary>
15590 @@ -60803,7 +61423,7 @@ Domain allowed access.
15591 </param>
15592 <infoflow type="both" weight="10"/>
15593 </interface>
15594 -<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="81808">
15595 +<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="82229">
15596 <summary>
15597 Do not audit attempts to send and receive ssh_client packets.
15598 </summary>
15599 @@ -60814,7 +61434,7 @@ Domain to not audit.
15600 </param>
15601 <infoflow type="none"/>
15602 </interface>
15603 -<interface name="corenet_relabelto_ssh_client_packets" lineno="81823">
15604 +<interface name="corenet_relabelto_ssh_client_packets" lineno="82244">
15605 <summary>
15606 Relabel packets to ssh_client the packet type.
15607 </summary>
15608 @@ -60824,7 +61444,7 @@ Domain allowed access.
15609 </summary>
15610 </param>
15611 </interface>
15612 -<interface name="corenet_send_ssh_server_packets" lineno="81843">
15613 +<interface name="corenet_send_ssh_server_packets" lineno="82264">
15614 <summary>
15615 Send ssh_server packets.
15616 </summary>
15617 @@ -60835,7 +61455,7 @@ Domain allowed access.
15618 </param>
15619 <infoflow type="write" weight="10"/>
15620 </interface>
15621 -<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="81862">
15622 +<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="82283">
15623 <summary>
15624 Do not audit attempts to send ssh_server packets.
15625 </summary>
15626 @@ -60846,7 +61466,7 @@ Domain to not audit.
15627 </param>
15628 <infoflow type="none"/>
15629 </interface>
15630 -<interface name="corenet_receive_ssh_server_packets" lineno="81881">
15631 +<interface name="corenet_receive_ssh_server_packets" lineno="82302">
15632 <summary>
15633 Receive ssh_server packets.
15634 </summary>
15635 @@ -60857,7 +61477,7 @@ Domain allowed access.
15636 </param>
15637 <infoflow type="read" weight="10"/>
15638 </interface>
15639 -<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="81900">
15640 +<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="82321">
15641 <summary>
15642 Do not audit attempts to receive ssh_server packets.
15643 </summary>
15644 @@ -60868,7 +61488,7 @@ Domain allowed access.
15645 </param>
15646 <infoflow type="none"/>
15647 </interface>
15648 -<interface name="corenet_sendrecv_ssh_server_packets" lineno="81919">
15649 +<interface name="corenet_sendrecv_ssh_server_packets" lineno="82340">
15650 <summary>
15651 Send and receive ssh_server packets.
15652 </summary>
15653 @@ -60879,7 +61499,7 @@ Domain allowed access.
15654 </param>
15655 <infoflow type="both" weight="10"/>
15656 </interface>
15657 -<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="81935">
15658 +<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="82356">
15659 <summary>
15660 Do not audit attempts to send and receive ssh_server packets.
15661 </summary>
15662 @@ -60890,7 +61510,7 @@ Domain to not audit.
15663 </param>
15664 <infoflow type="none"/>
15665 </interface>
15666 -<interface name="corenet_relabelto_ssh_server_packets" lineno="81950">
15667 +<interface name="corenet_relabelto_ssh_server_packets" lineno="82371">
15668 <summary>
15669 Relabel packets to ssh_server the packet type.
15670 </summary>
15671 @@ -60900,7 +61520,7 @@ Domain allowed access.
15672 </summary>
15673 </param>
15674 </interface>
15675 -<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="81972">
15676 +<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="82393">
15677 <summary>
15678 Send and receive TCP traffic on the stunnel port.
15679 </summary>
15680 @@ -60911,7 +61531,7 @@ Domain allowed access.
15681 </param>
15682 <infoflow type="both" weight="10"/>
15683 </interface>
15684 -<interface name="corenet_udp_send_stunnel_port" lineno="81987">
15685 +<interface name="corenet_udp_send_stunnel_port" lineno="82408">
15686 <summary>
15687 Send UDP traffic on the stunnel port.
15688 </summary>
15689 @@ -60922,7 +61542,7 @@ Domain allowed access.
15690 </param>
15691 <infoflow type="write" weight="10"/>
15692 </interface>
15693 -<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="82002">
15694 +<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="82423">
15695 <summary>
15696 Do not audit attempts to send UDP traffic on the stunnel port.
15697 </summary>
15698 @@ -60933,7 +61553,7 @@ Domain to not audit.
15699 </param>
15700 <infoflow type="none"/>
15701 </interface>
15702 -<interface name="corenet_udp_receive_stunnel_port" lineno="82017">
15703 +<interface name="corenet_udp_receive_stunnel_port" lineno="82438">
15704 <summary>
15705 Receive UDP traffic on the stunnel port.
15706 </summary>
15707 @@ -60944,7 +61564,7 @@ Domain allowed access.
15708 </param>
15709 <infoflow type="read" weight="10"/>
15710 </interface>
15711 -<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="82032">
15712 +<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="82453">
15713 <summary>
15714 Do not audit attempts to receive UDP traffic on the stunnel port.
15715 </summary>
15716 @@ -60955,7 +61575,7 @@ Domain to not audit.
15717 </param>
15718 <infoflow type="none"/>
15719 </interface>
15720 -<interface name="corenet_udp_sendrecv_stunnel_port" lineno="82047">
15721 +<interface name="corenet_udp_sendrecv_stunnel_port" lineno="82468">
15722 <summary>
15723 Send and receive UDP traffic on the stunnel port.
15724 </summary>
15725 @@ -60966,7 +61586,7 @@ Domain allowed access.
15726 </param>
15727 <infoflow type="both" weight="10"/>
15728 </interface>
15729 -<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="82063">
15730 +<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="82484">
15731 <summary>
15732 Do not audit attempts to send and receive
15733 UDP traffic on the stunnel port.
15734 @@ -60978,7 +61598,7 @@ Domain to not audit.
15735 </param>
15736 <infoflow type="none"/>
15737 </interface>
15738 -<interface name="corenet_tcp_bind_stunnel_port" lineno="82078">
15739 +<interface name="corenet_tcp_bind_stunnel_port" lineno="82499">
15740 <summary>
15741 Bind TCP sockets to the stunnel port.
15742 </summary>
15743 @@ -60989,7 +61609,7 @@ Domain allowed access.
15744 </param>
15745 <infoflow type="none"/>
15746 </interface>
15747 -<interface name="corenet_udp_bind_stunnel_port" lineno="82098">
15748 +<interface name="corenet_udp_bind_stunnel_port" lineno="82519">
15749 <summary>
15750 Bind UDP sockets to the stunnel port.
15751 </summary>
15752 @@ -61000,7 +61620,7 @@ Domain allowed access.
15753 </param>
15754 <infoflow type="none"/>
15755 </interface>
15756 -<interface name="corenet_tcp_connect_stunnel_port" lineno="82117">
15757 +<interface name="corenet_tcp_connect_stunnel_port" lineno="82538">
15758 <summary>
15759 Make a TCP connection to the stunnel port.
15760 </summary>
15761 @@ -61010,7 +61630,7 @@ Domain allowed access.
15762 </summary>
15763 </param>
15764 </interface>
15765 -<interface name="corenet_send_stunnel_client_packets" lineno="82137">
15766 +<interface name="corenet_send_stunnel_client_packets" lineno="82558">
15767 <summary>
15768 Send stunnel_client packets.
15769 </summary>
15770 @@ -61021,7 +61641,7 @@ Domain allowed access.
15771 </param>
15772 <infoflow type="write" weight="10"/>
15773 </interface>
15774 -<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="82156">
15775 +<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="82577">
15776 <summary>
15777 Do not audit attempts to send stunnel_client packets.
15778 </summary>
15779 @@ -61032,7 +61652,7 @@ Domain to not audit.
15780 </param>
15781 <infoflow type="none"/>
15782 </interface>
15783 -<interface name="corenet_receive_stunnel_client_packets" lineno="82175">
15784 +<interface name="corenet_receive_stunnel_client_packets" lineno="82596">
15785 <summary>
15786 Receive stunnel_client packets.
15787 </summary>
15788 @@ -61043,7 +61663,7 @@ Domain allowed access.
15789 </param>
15790 <infoflow type="read" weight="10"/>
15791 </interface>
15792 -<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="82194">
15793 +<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="82615">
15794 <summary>
15795 Do not audit attempts to receive stunnel_client packets.
15796 </summary>
15797 @@ -61054,7 +61674,7 @@ Domain allowed access.
15798 </param>
15799 <infoflow type="none"/>
15800 </interface>
15801 -<interface name="corenet_sendrecv_stunnel_client_packets" lineno="82213">
15802 +<interface name="corenet_sendrecv_stunnel_client_packets" lineno="82634">
15803 <summary>
15804 Send and receive stunnel_client packets.
15805 </summary>
15806 @@ -61065,7 +61685,7 @@ Domain allowed access.
15807 </param>
15808 <infoflow type="both" weight="10"/>
15809 </interface>
15810 -<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="82229">
15811 +<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="82650">
15812 <summary>
15813 Do not audit attempts to send and receive stunnel_client packets.
15814 </summary>
15815 @@ -61076,7 +61696,7 @@ Domain to not audit.
15816 </param>
15817 <infoflow type="none"/>
15818 </interface>
15819 -<interface name="corenet_relabelto_stunnel_client_packets" lineno="82244">
15820 +<interface name="corenet_relabelto_stunnel_client_packets" lineno="82665">
15821 <summary>
15822 Relabel packets to stunnel_client the packet type.
15823 </summary>
15824 @@ -61086,7 +61706,7 @@ Domain allowed access.
15825 </summary>
15826 </param>
15827 </interface>
15828 -<interface name="corenet_send_stunnel_server_packets" lineno="82264">
15829 +<interface name="corenet_send_stunnel_server_packets" lineno="82685">
15830 <summary>
15831 Send stunnel_server packets.
15832 </summary>
15833 @@ -61097,7 +61717,7 @@ Domain allowed access.
15834 </param>
15835 <infoflow type="write" weight="10"/>
15836 </interface>
15837 -<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="82283">
15838 +<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="82704">
15839 <summary>
15840 Do not audit attempts to send stunnel_server packets.
15841 </summary>
15842 @@ -61108,7 +61728,7 @@ Domain to not audit.
15843 </param>
15844 <infoflow type="none"/>
15845 </interface>
15846 -<interface name="corenet_receive_stunnel_server_packets" lineno="82302">
15847 +<interface name="corenet_receive_stunnel_server_packets" lineno="82723">
15848 <summary>
15849 Receive stunnel_server packets.
15850 </summary>
15851 @@ -61119,7 +61739,7 @@ Domain allowed access.
15852 </param>
15853 <infoflow type="read" weight="10"/>
15854 </interface>
15855 -<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="82321">
15856 +<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="82742">
15857 <summary>
15858 Do not audit attempts to receive stunnel_server packets.
15859 </summary>
15860 @@ -61130,7 +61750,7 @@ Domain allowed access.
15861 </param>
15862 <infoflow type="none"/>
15863 </interface>
15864 -<interface name="corenet_sendrecv_stunnel_server_packets" lineno="82340">
15865 +<interface name="corenet_sendrecv_stunnel_server_packets" lineno="82761">
15866 <summary>
15867 Send and receive stunnel_server packets.
15868 </summary>
15869 @@ -61141,7 +61761,7 @@ Domain allowed access.
15870 </param>
15871 <infoflow type="both" weight="10"/>
15872 </interface>
15873 -<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="82356">
15874 +<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="82777">
15875 <summary>
15876 Do not audit attempts to send and receive stunnel_server packets.
15877 </summary>
15878 @@ -61152,7 +61772,7 @@ Domain to not audit.
15879 </param>
15880 <infoflow type="none"/>
15881 </interface>
15882 -<interface name="corenet_relabelto_stunnel_server_packets" lineno="82371">
15883 +<interface name="corenet_relabelto_stunnel_server_packets" lineno="82792">
15884 <summary>
15885 Relabel packets to stunnel_server the packet type.
15886 </summary>
15887 @@ -61162,7 +61782,7 @@ Domain allowed access.
15888 </summary>
15889 </param>
15890 </interface>
15891 -<interface name="corenet_tcp_sendrecv_svn_port" lineno="82393">
15892 +<interface name="corenet_tcp_sendrecv_svn_port" lineno="82814">
15893 <summary>
15894 Send and receive TCP traffic on the svn port.
15895 </summary>
15896 @@ -61173,7 +61793,7 @@ Domain allowed access.
15897 </param>
15898 <infoflow type="both" weight="10"/>
15899 </interface>
15900 -<interface name="corenet_udp_send_svn_port" lineno="82408">
15901 +<interface name="corenet_udp_send_svn_port" lineno="82829">
15902 <summary>
15903 Send UDP traffic on the svn port.
15904 </summary>
15905 @@ -61184,7 +61804,7 @@ Domain allowed access.
15906 </param>
15907 <infoflow type="write" weight="10"/>
15908 </interface>
15909 -<interface name="corenet_dontaudit_udp_send_svn_port" lineno="82423">
15910 +<interface name="corenet_dontaudit_udp_send_svn_port" lineno="82844">
15911 <summary>
15912 Do not audit attempts to send UDP traffic on the svn port.
15913 </summary>
15914 @@ -61195,7 +61815,7 @@ Domain to not audit.
15915 </param>
15916 <infoflow type="none"/>
15917 </interface>
15918 -<interface name="corenet_udp_receive_svn_port" lineno="82438">
15919 +<interface name="corenet_udp_receive_svn_port" lineno="82859">
15920 <summary>
15921 Receive UDP traffic on the svn port.
15922 </summary>
15923 @@ -61206,7 +61826,7 @@ Domain allowed access.
15924 </param>
15925 <infoflow type="read" weight="10"/>
15926 </interface>
15927 -<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="82453">
15928 +<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="82874">
15929 <summary>
15930 Do not audit attempts to receive UDP traffic on the svn port.
15931 </summary>
15932 @@ -61217,7 +61837,7 @@ Domain to not audit.
15933 </param>
15934 <infoflow type="none"/>
15935 </interface>
15936 -<interface name="corenet_udp_sendrecv_svn_port" lineno="82468">
15937 +<interface name="corenet_udp_sendrecv_svn_port" lineno="82889">
15938 <summary>
15939 Send and receive UDP traffic on the svn port.
15940 </summary>
15941 @@ -61228,7 +61848,7 @@ Domain allowed access.
15942 </param>
15943 <infoflow type="both" weight="10"/>
15944 </interface>
15945 -<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="82484">
15946 +<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="82905">
15947 <summary>
15948 Do not audit attempts to send and receive
15949 UDP traffic on the svn port.
15950 @@ -61240,7 +61860,7 @@ Domain to not audit.
15951 </param>
15952 <infoflow type="none"/>
15953 </interface>
15954 -<interface name="corenet_tcp_bind_svn_port" lineno="82499">
15955 +<interface name="corenet_tcp_bind_svn_port" lineno="82920">
15956 <summary>
15957 Bind TCP sockets to the svn port.
15958 </summary>
15959 @@ -61251,7 +61871,7 @@ Domain allowed access.
15960 </param>
15961 <infoflow type="none"/>
15962 </interface>
15963 -<interface name="corenet_udp_bind_svn_port" lineno="82519">
15964 +<interface name="corenet_udp_bind_svn_port" lineno="82940">
15965 <summary>
15966 Bind UDP sockets to the svn port.
15967 </summary>
15968 @@ -61262,7 +61882,7 @@ Domain allowed access.
15969 </param>
15970 <infoflow type="none"/>
15971 </interface>
15972 -<interface name="corenet_tcp_connect_svn_port" lineno="82538">
15973 +<interface name="corenet_tcp_connect_svn_port" lineno="82959">
15974 <summary>
15975 Make a TCP connection to the svn port.
15976 </summary>
15977 @@ -61272,7 +61892,7 @@ Domain allowed access.
15978 </summary>
15979 </param>
15980 </interface>
15981 -<interface name="corenet_send_svn_client_packets" lineno="82558">
15982 +<interface name="corenet_send_svn_client_packets" lineno="82979">
15983 <summary>
15984 Send svn_client packets.
15985 </summary>
15986 @@ -61283,7 +61903,7 @@ Domain allowed access.
15987 </param>
15988 <infoflow type="write" weight="10"/>
15989 </interface>
15990 -<interface name="corenet_dontaudit_send_svn_client_packets" lineno="82577">
15991 +<interface name="corenet_dontaudit_send_svn_client_packets" lineno="82998">
15992 <summary>
15993 Do not audit attempts to send svn_client packets.
15994 </summary>
15995 @@ -61294,7 +61914,7 @@ Domain to not audit.
15996 </param>
15997 <infoflow type="none"/>
15998 </interface>
15999 -<interface name="corenet_receive_svn_client_packets" lineno="82596">
16000 +<interface name="corenet_receive_svn_client_packets" lineno="83017">
16001 <summary>
16002 Receive svn_client packets.
16003 </summary>
16004 @@ -61305,7 +61925,7 @@ Domain allowed access.
16005 </param>
16006 <infoflow type="read" weight="10"/>
16007 </interface>
16008 -<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="82615">
16009 +<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="83036">
16010 <summary>
16011 Do not audit attempts to receive svn_client packets.
16012 </summary>
16013 @@ -61316,7 +61936,7 @@ Domain allowed access.
16014 </param>
16015 <infoflow type="none"/>
16016 </interface>
16017 -<interface name="corenet_sendrecv_svn_client_packets" lineno="82634">
16018 +<interface name="corenet_sendrecv_svn_client_packets" lineno="83055">
16019 <summary>
16020 Send and receive svn_client packets.
16021 </summary>
16022 @@ -61327,7 +61947,7 @@ Domain allowed access.
16023 </param>
16024 <infoflow type="both" weight="10"/>
16025 </interface>
16026 -<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="82650">
16027 +<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="83071">
16028 <summary>
16029 Do not audit attempts to send and receive svn_client packets.
16030 </summary>
16031 @@ -61338,7 +61958,7 @@ Domain to not audit.
16032 </param>
16033 <infoflow type="none"/>
16034 </interface>
16035 -<interface name="corenet_relabelto_svn_client_packets" lineno="82665">
16036 +<interface name="corenet_relabelto_svn_client_packets" lineno="83086">
16037 <summary>
16038 Relabel packets to svn_client the packet type.
16039 </summary>
16040 @@ -61348,7 +61968,7 @@ Domain allowed access.
16041 </summary>
16042 </param>
16043 </interface>
16044 -<interface name="corenet_send_svn_server_packets" lineno="82685">
16045 +<interface name="corenet_send_svn_server_packets" lineno="83106">
16046 <summary>
16047 Send svn_server packets.
16048 </summary>
16049 @@ -61359,7 +61979,7 @@ Domain allowed access.
16050 </param>
16051 <infoflow type="write" weight="10"/>
16052 </interface>
16053 -<interface name="corenet_dontaudit_send_svn_server_packets" lineno="82704">
16054 +<interface name="corenet_dontaudit_send_svn_server_packets" lineno="83125">
16055 <summary>
16056 Do not audit attempts to send svn_server packets.
16057 </summary>
16058 @@ -61370,7 +61990,7 @@ Domain to not audit.
16059 </param>
16060 <infoflow type="none"/>
16061 </interface>
16062 -<interface name="corenet_receive_svn_server_packets" lineno="82723">
16063 +<interface name="corenet_receive_svn_server_packets" lineno="83144">
16064 <summary>
16065 Receive svn_server packets.
16066 </summary>
16067 @@ -61381,7 +62001,7 @@ Domain allowed access.
16068 </param>
16069 <infoflow type="read" weight="10"/>
16070 </interface>
16071 -<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="82742">
16072 +<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="83163">
16073 <summary>
16074 Do not audit attempts to receive svn_server packets.
16075 </summary>
16076 @@ -61392,7 +62012,7 @@ Domain allowed access.
16077 </param>
16078 <infoflow type="none"/>
16079 </interface>
16080 -<interface name="corenet_sendrecv_svn_server_packets" lineno="82761">
16081 +<interface name="corenet_sendrecv_svn_server_packets" lineno="83182">
16082 <summary>
16083 Send and receive svn_server packets.
16084 </summary>
16085 @@ -61403,7 +62023,7 @@ Domain allowed access.
16086 </param>
16087 <infoflow type="both" weight="10"/>
16088 </interface>
16089 -<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="82777">
16090 +<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="83198">
16091 <summary>
16092 Do not audit attempts to send and receive svn_server packets.
16093 </summary>
16094 @@ -61414,7 +62034,7 @@ Domain to not audit.
16095 </param>
16096 <infoflow type="none"/>
16097 </interface>
16098 -<interface name="corenet_relabelto_svn_server_packets" lineno="82792">
16099 +<interface name="corenet_relabelto_svn_server_packets" lineno="83213">
16100 <summary>
16101 Relabel packets to svn_server the packet type.
16102 </summary>
16103 @@ -61424,7 +62044,7 @@ Domain allowed access.
16104 </summary>
16105 </param>
16106 </interface>
16107 -<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="82814">
16108 +<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="83235">
16109 <summary>
16110 Send and receive TCP traffic on the svrloc port.
16111 </summary>
16112 @@ -61435,7 +62055,7 @@ Domain allowed access.
16113 </param>
16114 <infoflow type="both" weight="10"/>
16115 </interface>
16116 -<interface name="corenet_udp_send_svrloc_port" lineno="82829">
16117 +<interface name="corenet_udp_send_svrloc_port" lineno="83250">
16118 <summary>
16119 Send UDP traffic on the svrloc port.
16120 </summary>
16121 @@ -61446,7 +62066,7 @@ Domain allowed access.
16122 </param>
16123 <infoflow type="write" weight="10"/>
16124 </interface>
16125 -<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="82844">
16126 +<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="83265">
16127 <summary>
16128 Do not audit attempts to send UDP traffic on the svrloc port.
16129 </summary>
16130 @@ -61457,7 +62077,7 @@ Domain to not audit.
16131 </param>
16132 <infoflow type="none"/>
16133 </interface>
16134 -<interface name="corenet_udp_receive_svrloc_port" lineno="82859">
16135 +<interface name="corenet_udp_receive_svrloc_port" lineno="83280">
16136 <summary>
16137 Receive UDP traffic on the svrloc port.
16138 </summary>
16139 @@ -61468,7 +62088,7 @@ Domain allowed access.
16140 </param>
16141 <infoflow type="read" weight="10"/>
16142 </interface>
16143 -<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="82874">
16144 +<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="83295">
16145 <summary>
16146 Do not audit attempts to receive UDP traffic on the svrloc port.
16147 </summary>
16148 @@ -61479,7 +62099,7 @@ Domain to not audit.
16149 </param>
16150 <infoflow type="none"/>
16151 </interface>
16152 -<interface name="corenet_udp_sendrecv_svrloc_port" lineno="82889">
16153 +<interface name="corenet_udp_sendrecv_svrloc_port" lineno="83310">
16154 <summary>
16155 Send and receive UDP traffic on the svrloc port.
16156 </summary>
16157 @@ -61490,7 +62110,7 @@ Domain allowed access.
16158 </param>
16159 <infoflow type="both" weight="10"/>
16160 </interface>
16161 -<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="82905">
16162 +<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="83326">
16163 <summary>
16164 Do not audit attempts to send and receive
16165 UDP traffic on the svrloc port.
16166 @@ -61502,7 +62122,7 @@ Domain to not audit.
16167 </param>
16168 <infoflow type="none"/>
16169 </interface>
16170 -<interface name="corenet_tcp_bind_svrloc_port" lineno="82920">
16171 +<interface name="corenet_tcp_bind_svrloc_port" lineno="83341">
16172 <summary>
16173 Bind TCP sockets to the svrloc port.
16174 </summary>
16175 @@ -61513,7 +62133,7 @@ Domain allowed access.
16176 </param>
16177 <infoflow type="none"/>
16178 </interface>
16179 -<interface name="corenet_udp_bind_svrloc_port" lineno="82940">
16180 +<interface name="corenet_udp_bind_svrloc_port" lineno="83361">
16181 <summary>
16182 Bind UDP sockets to the svrloc port.
16183 </summary>
16184 @@ -61524,7 +62144,7 @@ Domain allowed access.
16185 </param>
16186 <infoflow type="none"/>
16187 </interface>
16188 -<interface name="corenet_tcp_connect_svrloc_port" lineno="82959">
16189 +<interface name="corenet_tcp_connect_svrloc_port" lineno="83380">
16190 <summary>
16191 Make a TCP connection to the svrloc port.
16192 </summary>
16193 @@ -61534,7 +62154,7 @@ Domain allowed access.
16194 </summary>
16195 </param>
16196 </interface>
16197 -<interface name="corenet_send_svrloc_client_packets" lineno="82979">
16198 +<interface name="corenet_send_svrloc_client_packets" lineno="83400">
16199 <summary>
16200 Send svrloc_client packets.
16201 </summary>
16202 @@ -61545,7 +62165,7 @@ Domain allowed access.
16203 </param>
16204 <infoflow type="write" weight="10"/>
16205 </interface>
16206 -<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="82998">
16207 +<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="83419">
16208 <summary>
16209 Do not audit attempts to send svrloc_client packets.
16210 </summary>
16211 @@ -61556,7 +62176,7 @@ Domain to not audit.
16212 </param>
16213 <infoflow type="none"/>
16214 </interface>
16215 -<interface name="corenet_receive_svrloc_client_packets" lineno="83017">
16216 +<interface name="corenet_receive_svrloc_client_packets" lineno="83438">
16217 <summary>
16218 Receive svrloc_client packets.
16219 </summary>
16220 @@ -61567,7 +62187,7 @@ Domain allowed access.
16221 </param>
16222 <infoflow type="read" weight="10"/>
16223 </interface>
16224 -<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="83036">
16225 +<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="83457">
16226 <summary>
16227 Do not audit attempts to receive svrloc_client packets.
16228 </summary>
16229 @@ -61578,7 +62198,7 @@ Domain allowed access.
16230 </param>
16231 <infoflow type="none"/>
16232 </interface>
16233 -<interface name="corenet_sendrecv_svrloc_client_packets" lineno="83055">
16234 +<interface name="corenet_sendrecv_svrloc_client_packets" lineno="83476">
16235 <summary>
16236 Send and receive svrloc_client packets.
16237 </summary>
16238 @@ -61589,7 +62209,7 @@ Domain allowed access.
16239 </param>
16240 <infoflow type="both" weight="10"/>
16241 </interface>
16242 -<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="83071">
16243 +<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="83492">
16244 <summary>
16245 Do not audit attempts to send and receive svrloc_client packets.
16246 </summary>
16247 @@ -61600,7 +62220,7 @@ Domain to not audit.
16248 </param>
16249 <infoflow type="none"/>
16250 </interface>
16251 -<interface name="corenet_relabelto_svrloc_client_packets" lineno="83086">
16252 +<interface name="corenet_relabelto_svrloc_client_packets" lineno="83507">
16253 <summary>
16254 Relabel packets to svrloc_client the packet type.
16255 </summary>
16256 @@ -61610,7 +62230,7 @@ Domain allowed access.
16257 </summary>
16258 </param>
16259 </interface>
16260 -<interface name="corenet_send_svrloc_server_packets" lineno="83106">
16261 +<interface name="corenet_send_svrloc_server_packets" lineno="83527">
16262 <summary>
16263 Send svrloc_server packets.
16264 </summary>
16265 @@ -61621,7 +62241,7 @@ Domain allowed access.
16266 </param>
16267 <infoflow type="write" weight="10"/>
16268 </interface>
16269 -<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="83125">
16270 +<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="83546">
16271 <summary>
16272 Do not audit attempts to send svrloc_server packets.
16273 </summary>
16274 @@ -61632,7 +62252,7 @@ Domain to not audit.
16275 </param>
16276 <infoflow type="none"/>
16277 </interface>
16278 -<interface name="corenet_receive_svrloc_server_packets" lineno="83144">
16279 +<interface name="corenet_receive_svrloc_server_packets" lineno="83565">
16280 <summary>
16281 Receive svrloc_server packets.
16282 </summary>
16283 @@ -61643,7 +62263,7 @@ Domain allowed access.
16284 </param>
16285 <infoflow type="read" weight="10"/>
16286 </interface>
16287 -<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="83163">
16288 +<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="83584">
16289 <summary>
16290 Do not audit attempts to receive svrloc_server packets.
16291 </summary>
16292 @@ -61654,7 +62274,7 @@ Domain allowed access.
16293 </param>
16294 <infoflow type="none"/>
16295 </interface>
16296 -<interface name="corenet_sendrecv_svrloc_server_packets" lineno="83182">
16297 +<interface name="corenet_sendrecv_svrloc_server_packets" lineno="83603">
16298 <summary>
16299 Send and receive svrloc_server packets.
16300 </summary>
16301 @@ -61665,7 +62285,7 @@ Domain allowed access.
16302 </param>
16303 <infoflow type="both" weight="10"/>
16304 </interface>
16305 -<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="83198">
16306 +<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="83619">
16307 <summary>
16308 Do not audit attempts to send and receive svrloc_server packets.
16309 </summary>
16310 @@ -61676,7 +62296,7 @@ Domain to not audit.
16311 </param>
16312 <infoflow type="none"/>
16313 </interface>
16314 -<interface name="corenet_relabelto_svrloc_server_packets" lineno="83213">
16315 +<interface name="corenet_relabelto_svrloc_server_packets" lineno="83634">
16316 <summary>
16317 Relabel packets to svrloc_server the packet type.
16318 </summary>
16319 @@ -61686,7 +62306,7 @@ Domain allowed access.
16320 </summary>
16321 </param>
16322 </interface>
16323 -<interface name="corenet_tcp_sendrecv_swat_port" lineno="83235">
16324 +<interface name="corenet_tcp_sendrecv_swat_port" lineno="83656">
16325 <summary>
16326 Send and receive TCP traffic on the swat port.
16327 </summary>
16328 @@ -61697,7 +62317,7 @@ Domain allowed access.
16329 </param>
16330 <infoflow type="both" weight="10"/>
16331 </interface>
16332 -<interface name="corenet_udp_send_swat_port" lineno="83250">
16333 +<interface name="corenet_udp_send_swat_port" lineno="83671">
16334 <summary>
16335 Send UDP traffic on the swat port.
16336 </summary>
16337 @@ -61708,7 +62328,7 @@ Domain allowed access.
16338 </param>
16339 <infoflow type="write" weight="10"/>
16340 </interface>
16341 -<interface name="corenet_dontaudit_udp_send_swat_port" lineno="83265">
16342 +<interface name="corenet_dontaudit_udp_send_swat_port" lineno="83686">
16343 <summary>
16344 Do not audit attempts to send UDP traffic on the swat port.
16345 </summary>
16346 @@ -61719,7 +62339,7 @@ Domain to not audit.
16347 </param>
16348 <infoflow type="none"/>
16349 </interface>
16350 -<interface name="corenet_udp_receive_swat_port" lineno="83280">
16351 +<interface name="corenet_udp_receive_swat_port" lineno="83701">
16352 <summary>
16353 Receive UDP traffic on the swat port.
16354 </summary>
16355 @@ -61730,7 +62350,7 @@ Domain allowed access.
16356 </param>
16357 <infoflow type="read" weight="10"/>
16358 </interface>
16359 -<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="83295">
16360 +<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="83716">
16361 <summary>
16362 Do not audit attempts to receive UDP traffic on the swat port.
16363 </summary>
16364 @@ -61741,7 +62361,7 @@ Domain to not audit.
16365 </param>
16366 <infoflow type="none"/>
16367 </interface>
16368 -<interface name="corenet_udp_sendrecv_swat_port" lineno="83310">
16369 +<interface name="corenet_udp_sendrecv_swat_port" lineno="83731">
16370 <summary>
16371 Send and receive UDP traffic on the swat port.
16372 </summary>
16373 @@ -61752,7 +62372,7 @@ Domain allowed access.
16374 </param>
16375 <infoflow type="both" weight="10"/>
16376 </interface>
16377 -<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="83326">
16378 +<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="83747">
16379 <summary>
16380 Do not audit attempts to send and receive
16381 UDP traffic on the swat port.
16382 @@ -61764,7 +62384,7 @@ Domain to not audit.
16383 </param>
16384 <infoflow type="none"/>
16385 </interface>
16386 -<interface name="corenet_tcp_bind_swat_port" lineno="83341">
16387 +<interface name="corenet_tcp_bind_swat_port" lineno="83762">
16388 <summary>
16389 Bind TCP sockets to the swat port.
16390 </summary>
16391 @@ -61775,7 +62395,7 @@ Domain allowed access.
16392 </param>
16393 <infoflow type="none"/>
16394 </interface>
16395 -<interface name="corenet_udp_bind_swat_port" lineno="83361">
16396 +<interface name="corenet_udp_bind_swat_port" lineno="83782">
16397 <summary>
16398 Bind UDP sockets to the swat port.
16399 </summary>
16400 @@ -61786,7 +62406,7 @@ Domain allowed access.
16401 </param>
16402 <infoflow type="none"/>
16403 </interface>
16404 -<interface name="corenet_tcp_connect_swat_port" lineno="83380">
16405 +<interface name="corenet_tcp_connect_swat_port" lineno="83801">
16406 <summary>
16407 Make a TCP connection to the swat port.
16408 </summary>
16409 @@ -61796,7 +62416,7 @@ Domain allowed access.
16410 </summary>
16411 </param>
16412 </interface>
16413 -<interface name="corenet_send_swat_client_packets" lineno="83400">
16414 +<interface name="corenet_send_swat_client_packets" lineno="83821">
16415 <summary>
16416 Send swat_client packets.
16417 </summary>
16418 @@ -61807,7 +62427,7 @@ Domain allowed access.
16419 </param>
16420 <infoflow type="write" weight="10"/>
16421 </interface>
16422 -<interface name="corenet_dontaudit_send_swat_client_packets" lineno="83419">
16423 +<interface name="corenet_dontaudit_send_swat_client_packets" lineno="83840">
16424 <summary>
16425 Do not audit attempts to send swat_client packets.
16426 </summary>
16427 @@ -61818,7 +62438,7 @@ Domain to not audit.
16428 </param>
16429 <infoflow type="none"/>
16430 </interface>
16431 -<interface name="corenet_receive_swat_client_packets" lineno="83438">
16432 +<interface name="corenet_receive_swat_client_packets" lineno="83859">
16433 <summary>
16434 Receive swat_client packets.
16435 </summary>
16436 @@ -61829,7 +62449,7 @@ Domain allowed access.
16437 </param>
16438 <infoflow type="read" weight="10"/>
16439 </interface>
16440 -<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="83457">
16441 +<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="83878">
16442 <summary>
16443 Do not audit attempts to receive swat_client packets.
16444 </summary>
16445 @@ -61840,7 +62460,7 @@ Domain allowed access.
16446 </param>
16447 <infoflow type="none"/>
16448 </interface>
16449 -<interface name="corenet_sendrecv_swat_client_packets" lineno="83476">
16450 +<interface name="corenet_sendrecv_swat_client_packets" lineno="83897">
16451 <summary>
16452 Send and receive swat_client packets.
16453 </summary>
16454 @@ -61851,7 +62471,7 @@ Domain allowed access.
16455 </param>
16456 <infoflow type="both" weight="10"/>
16457 </interface>
16458 -<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="83492">
16459 +<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="83913">
16460 <summary>
16461 Do not audit attempts to send and receive swat_client packets.
16462 </summary>
16463 @@ -61862,7 +62482,7 @@ Domain to not audit.
16464 </param>
16465 <infoflow type="none"/>
16466 </interface>
16467 -<interface name="corenet_relabelto_swat_client_packets" lineno="83507">
16468 +<interface name="corenet_relabelto_swat_client_packets" lineno="83928">
16469 <summary>
16470 Relabel packets to swat_client the packet type.
16471 </summary>
16472 @@ -61872,7 +62492,7 @@ Domain allowed access.
16473 </summary>
16474 </param>
16475 </interface>
16476 -<interface name="corenet_send_swat_server_packets" lineno="83527">
16477 +<interface name="corenet_send_swat_server_packets" lineno="83948">
16478 <summary>
16479 Send swat_server packets.
16480 </summary>
16481 @@ -61883,7 +62503,7 @@ Domain allowed access.
16482 </param>
16483 <infoflow type="write" weight="10"/>
16484 </interface>
16485 -<interface name="corenet_dontaudit_send_swat_server_packets" lineno="83546">
16486 +<interface name="corenet_dontaudit_send_swat_server_packets" lineno="83967">
16487 <summary>
16488 Do not audit attempts to send swat_server packets.
16489 </summary>
16490 @@ -61894,7 +62514,7 @@ Domain to not audit.
16491 </param>
16492 <infoflow type="none"/>
16493 </interface>
16494 -<interface name="corenet_receive_swat_server_packets" lineno="83565">
16495 +<interface name="corenet_receive_swat_server_packets" lineno="83986">
16496 <summary>
16497 Receive swat_server packets.
16498 </summary>
16499 @@ -61905,7 +62525,7 @@ Domain allowed access.
16500 </param>
16501 <infoflow type="read" weight="10"/>
16502 </interface>
16503 -<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="83584">
16504 +<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="84005">
16505 <summary>
16506 Do not audit attempts to receive swat_server packets.
16507 </summary>
16508 @@ -61916,7 +62536,7 @@ Domain allowed access.
16509 </param>
16510 <infoflow type="none"/>
16511 </interface>
16512 -<interface name="corenet_sendrecv_swat_server_packets" lineno="83603">
16513 +<interface name="corenet_sendrecv_swat_server_packets" lineno="84024">
16514 <summary>
16515 Send and receive swat_server packets.
16516 </summary>
16517 @@ -61927,7 +62547,7 @@ Domain allowed access.
16518 </param>
16519 <infoflow type="both" weight="10"/>
16520 </interface>
16521 -<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="83619">
16522 +<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="84040">
16523 <summary>
16524 Do not audit attempts to send and receive swat_server packets.
16525 </summary>
16526 @@ -61938,7 +62558,7 @@ Domain to not audit.
16527 </param>
16528 <infoflow type="none"/>
16529 </interface>
16530 -<interface name="corenet_relabelto_swat_server_packets" lineno="83634">
16531 +<interface name="corenet_relabelto_swat_server_packets" lineno="84055">
16532 <summary>
16533 Relabel packets to swat_server the packet type.
16534 </summary>
16535 @@ -61948,7 +62568,7 @@ Domain allowed access.
16536 </summary>
16537 </param>
16538 </interface>
16539 -<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="83656">
16540 +<interface name="corenet_tcp_sendrecv_syncthing_port" lineno="84077">
16541 <summary>
16542 Send and receive TCP traffic on the syncthing port.
16543 </summary>
16544 @@ -61959,7 +62579,7 @@ Domain allowed access.
16545 </param>
16546 <infoflow type="both" weight="10"/>
16547 </interface>
16548 -<interface name="corenet_udp_send_syncthing_port" lineno="83671">
16549 +<interface name="corenet_udp_send_syncthing_port" lineno="84092">
16550 <summary>
16551 Send UDP traffic on the syncthing port.
16552 </summary>
16553 @@ -61970,7 +62590,7 @@ Domain allowed access.
16554 </param>
16555 <infoflow type="write" weight="10"/>
16556 </interface>
16557 -<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="83686">
16558 +<interface name="corenet_dontaudit_udp_send_syncthing_port" lineno="84107">
16559 <summary>
16560 Do not audit attempts to send UDP traffic on the syncthing port.
16561 </summary>
16562 @@ -61981,7 +62601,7 @@ Domain to not audit.
16563 </param>
16564 <infoflow type="none"/>
16565 </interface>
16566 -<interface name="corenet_udp_receive_syncthing_port" lineno="83701">
16567 +<interface name="corenet_udp_receive_syncthing_port" lineno="84122">
16568 <summary>
16569 Receive UDP traffic on the syncthing port.
16570 </summary>
16571 @@ -61992,7 +62612,7 @@ Domain allowed access.
16572 </param>
16573 <infoflow type="read" weight="10"/>
16574 </interface>
16575 -<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="83716">
16576 +<interface name="corenet_dontaudit_udp_receive_syncthing_port" lineno="84137">
16577 <summary>
16578 Do not audit attempts to receive UDP traffic on the syncthing port.
16579 </summary>
16580 @@ -62003,7 +62623,7 @@ Domain to not audit.
16581 </param>
16582 <infoflow type="none"/>
16583 </interface>
16584 -<interface name="corenet_udp_sendrecv_syncthing_port" lineno="83731">
16585 +<interface name="corenet_udp_sendrecv_syncthing_port" lineno="84152">
16586 <summary>
16587 Send and receive UDP traffic on the syncthing port.
16588 </summary>
16589 @@ -62014,7 +62634,7 @@ Domain allowed access.
16590 </param>
16591 <infoflow type="both" weight="10"/>
16592 </interface>
16593 -<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="83747">
16594 +<interface name="corenet_dontaudit_udp_sendrecv_syncthing_port" lineno="84168">
16595 <summary>
16596 Do not audit attempts to send and receive
16597 UDP traffic on the syncthing port.
16598 @@ -62026,7 +62646,7 @@ Domain to not audit.
16599 </param>
16600 <infoflow type="none"/>
16601 </interface>
16602 -<interface name="corenet_tcp_bind_syncthing_port" lineno="83762">
16603 +<interface name="corenet_tcp_bind_syncthing_port" lineno="84183">
16604 <summary>
16605 Bind TCP sockets to the syncthing port.
16606 </summary>
16607 @@ -62037,7 +62657,7 @@ Domain allowed access.
16608 </param>
16609 <infoflow type="none"/>
16610 </interface>
16611 -<interface name="corenet_udp_bind_syncthing_port" lineno="83782">
16612 +<interface name="corenet_udp_bind_syncthing_port" lineno="84203">
16613 <summary>
16614 Bind UDP sockets to the syncthing port.
16615 </summary>
16616 @@ -62048,7 +62668,7 @@ Domain allowed access.
16617 </param>
16618 <infoflow type="none"/>
16619 </interface>
16620 -<interface name="corenet_tcp_connect_syncthing_port" lineno="83801">
16621 +<interface name="corenet_tcp_connect_syncthing_port" lineno="84222">
16622 <summary>
16623 Make a TCP connection to the syncthing port.
16624 </summary>
16625 @@ -62058,7 +62678,7 @@ Domain allowed access.
16626 </summary>
16627 </param>
16628 </interface>
16629 -<interface name="corenet_send_syncthing_client_packets" lineno="83821">
16630 +<interface name="corenet_send_syncthing_client_packets" lineno="84242">
16631 <summary>
16632 Send syncthing_client packets.
16633 </summary>
16634 @@ -62069,7 +62689,7 @@ Domain allowed access.
16635 </param>
16636 <infoflow type="write" weight="10"/>
16637 </interface>
16638 -<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="83840">
16639 +<interface name="corenet_dontaudit_send_syncthing_client_packets" lineno="84261">
16640 <summary>
16641 Do not audit attempts to send syncthing_client packets.
16642 </summary>
16643 @@ -62080,7 +62700,7 @@ Domain to not audit.
16644 </param>
16645 <infoflow type="none"/>
16646 </interface>
16647 -<interface name="corenet_receive_syncthing_client_packets" lineno="83859">
16648 +<interface name="corenet_receive_syncthing_client_packets" lineno="84280">
16649 <summary>
16650 Receive syncthing_client packets.
16651 </summary>
16652 @@ -62091,7 +62711,7 @@ Domain allowed access.
16653 </param>
16654 <infoflow type="read" weight="10"/>
16655 </interface>
16656 -<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="83878">
16657 +<interface name="corenet_dontaudit_receive_syncthing_client_packets" lineno="84299">
16658 <summary>
16659 Do not audit attempts to receive syncthing_client packets.
16660 </summary>
16661 @@ -62102,7 +62722,7 @@ Domain allowed access.
16662 </param>
16663 <infoflow type="none"/>
16664 </interface>
16665 -<interface name="corenet_sendrecv_syncthing_client_packets" lineno="83897">
16666 +<interface name="corenet_sendrecv_syncthing_client_packets" lineno="84318">
16667 <summary>
16668 Send and receive syncthing_client packets.
16669 </summary>
16670 @@ -62113,7 +62733,7 @@ Domain allowed access.
16671 </param>
16672 <infoflow type="both" weight="10"/>
16673 </interface>
16674 -<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="83913">
16675 +<interface name="corenet_dontaudit_sendrecv_syncthing_client_packets" lineno="84334">
16676 <summary>
16677 Do not audit attempts to send and receive syncthing_client packets.
16678 </summary>
16679 @@ -62124,7 +62744,7 @@ Domain to not audit.
16680 </param>
16681 <infoflow type="none"/>
16682 </interface>
16683 -<interface name="corenet_relabelto_syncthing_client_packets" lineno="83928">
16684 +<interface name="corenet_relabelto_syncthing_client_packets" lineno="84349">
16685 <summary>
16686 Relabel packets to syncthing_client the packet type.
16687 </summary>
16688 @@ -62134,7 +62754,7 @@ Domain allowed access.
16689 </summary>
16690 </param>
16691 </interface>
16692 -<interface name="corenet_send_syncthing_server_packets" lineno="83948">
16693 +<interface name="corenet_send_syncthing_server_packets" lineno="84369">
16694 <summary>
16695 Send syncthing_server packets.
16696 </summary>
16697 @@ -62145,7 +62765,7 @@ Domain allowed access.
16698 </param>
16699 <infoflow type="write" weight="10"/>
16700 </interface>
16701 -<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="83967">
16702 +<interface name="corenet_dontaudit_send_syncthing_server_packets" lineno="84388">
16703 <summary>
16704 Do not audit attempts to send syncthing_server packets.
16705 </summary>
16706 @@ -62156,7 +62776,7 @@ Domain to not audit.
16707 </param>
16708 <infoflow type="none"/>
16709 </interface>
16710 -<interface name="corenet_receive_syncthing_server_packets" lineno="83986">
16711 +<interface name="corenet_receive_syncthing_server_packets" lineno="84407">
16712 <summary>
16713 Receive syncthing_server packets.
16714 </summary>
16715 @@ -62167,7 +62787,7 @@ Domain allowed access.
16716 </param>
16717 <infoflow type="read" weight="10"/>
16718 </interface>
16719 -<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="84005">
16720 +<interface name="corenet_dontaudit_receive_syncthing_server_packets" lineno="84426">
16721 <summary>
16722 Do not audit attempts to receive syncthing_server packets.
16723 </summary>
16724 @@ -62178,7 +62798,7 @@ Domain allowed access.
16725 </param>
16726 <infoflow type="none"/>
16727 </interface>
16728 -<interface name="corenet_sendrecv_syncthing_server_packets" lineno="84024">
16729 +<interface name="corenet_sendrecv_syncthing_server_packets" lineno="84445">
16730 <summary>
16731 Send and receive syncthing_server packets.
16732 </summary>
16733 @@ -62189,7 +62809,7 @@ Domain allowed access.
16734 </param>
16735 <infoflow type="both" weight="10"/>
16736 </interface>
16737 -<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="84040">
16738 +<interface name="corenet_dontaudit_sendrecv_syncthing_server_packets" lineno="84461">
16739 <summary>
16740 Do not audit attempts to send and receive syncthing_server packets.
16741 </summary>
16742 @@ -62200,7 +62820,7 @@ Domain to not audit.
16743 </param>
16744 <infoflow type="none"/>
16745 </interface>
16746 -<interface name="corenet_relabelto_syncthing_server_packets" lineno="84055">
16747 +<interface name="corenet_relabelto_syncthing_server_packets" lineno="84476">
16748 <summary>
16749 Relabel packets to syncthing_server the packet type.
16750 </summary>
16751 @@ -62210,7 +62830,7 @@ Domain allowed access.
16752 </summary>
16753 </param>
16754 </interface>
16755 -<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="84077">
16756 +<interface name="corenet_tcp_sendrecv_syncthing_admin_port" lineno="84498">
16757 <summary>
16758 Send and receive TCP traffic on the syncthing_admin port.
16759 </summary>
16760 @@ -62221,7 +62841,7 @@ Domain allowed access.
16761 </param>
16762 <infoflow type="both" weight="10"/>
16763 </interface>
16764 -<interface name="corenet_udp_send_syncthing_admin_port" lineno="84092">
16765 +<interface name="corenet_udp_send_syncthing_admin_port" lineno="84513">
16766 <summary>
16767 Send UDP traffic on the syncthing_admin port.
16768 </summary>
16769 @@ -62232,7 +62852,7 @@ Domain allowed access.
16770 </param>
16771 <infoflow type="write" weight="10"/>
16772 </interface>
16773 -<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="84107">
16774 +<interface name="corenet_dontaudit_udp_send_syncthing_admin_port" lineno="84528">
16775 <summary>
16776 Do not audit attempts to send UDP traffic on the syncthing_admin port.
16777 </summary>
16778 @@ -62243,7 +62863,7 @@ Domain to not audit.
16779 </param>
16780 <infoflow type="none"/>
16781 </interface>
16782 -<interface name="corenet_udp_receive_syncthing_admin_port" lineno="84122">
16783 +<interface name="corenet_udp_receive_syncthing_admin_port" lineno="84543">
16784 <summary>
16785 Receive UDP traffic on the syncthing_admin port.
16786 </summary>
16787 @@ -62254,7 +62874,7 @@ Domain allowed access.
16788 </param>
16789 <infoflow type="read" weight="10"/>
16790 </interface>
16791 -<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="84137">
16792 +<interface name="corenet_dontaudit_udp_receive_syncthing_admin_port" lineno="84558">
16793 <summary>
16794 Do not audit attempts to receive UDP traffic on the syncthing_admin port.
16795 </summary>
16796 @@ -62265,7 +62885,7 @@ Domain to not audit.
16797 </param>
16798 <infoflow type="none"/>
16799 </interface>
16800 -<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="84152">
16801 +<interface name="corenet_udp_sendrecv_syncthing_admin_port" lineno="84573">
16802 <summary>
16803 Send and receive UDP traffic on the syncthing_admin port.
16804 </summary>
16805 @@ -62276,7 +62896,7 @@ Domain allowed access.
16806 </param>
16807 <infoflow type="both" weight="10"/>
16808 </interface>
16809 -<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="84168">
16810 +<interface name="corenet_dontaudit_udp_sendrecv_syncthing_admin_port" lineno="84589">
16811 <summary>
16812 Do not audit attempts to send and receive
16813 UDP traffic on the syncthing_admin port.
16814 @@ -62288,7 +62908,7 @@ Domain to not audit.
16815 </param>
16816 <infoflow type="none"/>
16817 </interface>
16818 -<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="84183">
16819 +<interface name="corenet_tcp_bind_syncthing_admin_port" lineno="84604">
16820 <summary>
16821 Bind TCP sockets to the syncthing_admin port.
16822 </summary>
16823 @@ -62299,7 +62919,7 @@ Domain allowed access.
16824 </param>
16825 <infoflow type="none"/>
16826 </interface>
16827 -<interface name="corenet_udp_bind_syncthing_admin_port" lineno="84203">
16828 +<interface name="corenet_udp_bind_syncthing_admin_port" lineno="84624">
16829 <summary>
16830 Bind UDP sockets to the syncthing_admin port.
16831 </summary>
16832 @@ -62310,7 +62930,7 @@ Domain allowed access.
16833 </param>
16834 <infoflow type="none"/>
16835 </interface>
16836 -<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="84222">
16837 +<interface name="corenet_tcp_connect_syncthing_admin_port" lineno="84643">
16838 <summary>
16839 Make a TCP connection to the syncthing_admin port.
16840 </summary>
16841 @@ -62320,7 +62940,7 @@ Domain allowed access.
16842 </summary>
16843 </param>
16844 </interface>
16845 -<interface name="corenet_send_syncthing_admin_client_packets" lineno="84242">
16846 +<interface name="corenet_send_syncthing_admin_client_packets" lineno="84663">
16847 <summary>
16848 Send syncthing_admin_client packets.
16849 </summary>
16850 @@ -62331,7 +62951,7 @@ Domain allowed access.
16851 </param>
16852 <infoflow type="write" weight="10"/>
16853 </interface>
16854 -<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="84261">
16855 +<interface name="corenet_dontaudit_send_syncthing_admin_client_packets" lineno="84682">
16856 <summary>
16857 Do not audit attempts to send syncthing_admin_client packets.
16858 </summary>
16859 @@ -62342,7 +62962,7 @@ Domain to not audit.
16860 </param>
16861 <infoflow type="none"/>
16862 </interface>
16863 -<interface name="corenet_receive_syncthing_admin_client_packets" lineno="84280">
16864 +<interface name="corenet_receive_syncthing_admin_client_packets" lineno="84701">
16865 <summary>
16866 Receive syncthing_admin_client packets.
16867 </summary>
16868 @@ -62353,7 +62973,7 @@ Domain allowed access.
16869 </param>
16870 <infoflow type="read" weight="10"/>
16871 </interface>
16872 -<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="84299">
16873 +<interface name="corenet_dontaudit_receive_syncthing_admin_client_packets" lineno="84720">
16874 <summary>
16875 Do not audit attempts to receive syncthing_admin_client packets.
16876 </summary>
16877 @@ -62364,7 +62984,7 @@ Domain allowed access.
16878 </param>
16879 <infoflow type="none"/>
16880 </interface>
16881 -<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="84318">
16882 +<interface name="corenet_sendrecv_syncthing_admin_client_packets" lineno="84739">
16883 <summary>
16884 Send and receive syncthing_admin_client packets.
16885 </summary>
16886 @@ -62375,7 +62995,7 @@ Domain allowed access.
16887 </param>
16888 <infoflow type="both" weight="10"/>
16889 </interface>
16890 -<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="84334">
16891 +<interface name="corenet_dontaudit_sendrecv_syncthing_admin_client_packets" lineno="84755">
16892 <summary>
16893 Do not audit attempts to send and receive syncthing_admin_client packets.
16894 </summary>
16895 @@ -62386,7 +63006,7 @@ Domain to not audit.
16896 </param>
16897 <infoflow type="none"/>
16898 </interface>
16899 -<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="84349">
16900 +<interface name="corenet_relabelto_syncthing_admin_client_packets" lineno="84770">
16901 <summary>
16902 Relabel packets to syncthing_admin_client the packet type.
16903 </summary>
16904 @@ -62396,7 +63016,7 @@ Domain allowed access.
16905 </summary>
16906 </param>
16907 </interface>
16908 -<interface name="corenet_send_syncthing_admin_server_packets" lineno="84369">
16909 +<interface name="corenet_send_syncthing_admin_server_packets" lineno="84790">
16910 <summary>
16911 Send syncthing_admin_server packets.
16912 </summary>
16913 @@ -62407,7 +63027,7 @@ Domain allowed access.
16914 </param>
16915 <infoflow type="write" weight="10"/>
16916 </interface>
16917 -<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="84388">
16918 +<interface name="corenet_dontaudit_send_syncthing_admin_server_packets" lineno="84809">
16919 <summary>
16920 Do not audit attempts to send syncthing_admin_server packets.
16921 </summary>
16922 @@ -62418,7 +63038,7 @@ Domain to not audit.
16923 </param>
16924 <infoflow type="none"/>
16925 </interface>
16926 -<interface name="corenet_receive_syncthing_admin_server_packets" lineno="84407">
16927 +<interface name="corenet_receive_syncthing_admin_server_packets" lineno="84828">
16928 <summary>
16929 Receive syncthing_admin_server packets.
16930 </summary>
16931 @@ -62429,7 +63049,7 @@ Domain allowed access.
16932 </param>
16933 <infoflow type="read" weight="10"/>
16934 </interface>
16935 -<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="84426">
16936 +<interface name="corenet_dontaudit_receive_syncthing_admin_server_packets" lineno="84847">
16937 <summary>
16938 Do not audit attempts to receive syncthing_admin_server packets.
16939 </summary>
16940 @@ -62440,7 +63060,7 @@ Domain allowed access.
16941 </param>
16942 <infoflow type="none"/>
16943 </interface>
16944 -<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="84445">
16945 +<interface name="corenet_sendrecv_syncthing_admin_server_packets" lineno="84866">
16946 <summary>
16947 Send and receive syncthing_admin_server packets.
16948 </summary>
16949 @@ -62451,7 +63071,7 @@ Domain allowed access.
16950 </param>
16951 <infoflow type="both" weight="10"/>
16952 </interface>
16953 -<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="84461">
16954 +<interface name="corenet_dontaudit_sendrecv_syncthing_admin_server_packets" lineno="84882">
16955 <summary>
16956 Do not audit attempts to send and receive syncthing_admin_server packets.
16957 </summary>
16958 @@ -62462,7 +63082,7 @@ Domain to not audit.
16959 </param>
16960 <infoflow type="none"/>
16961 </interface>
16962 -<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="84476">
16963 +<interface name="corenet_relabelto_syncthing_admin_server_packets" lineno="84897">
16964 <summary>
16965 Relabel packets to syncthing_admin_server the packet type.
16966 </summary>
16967 @@ -62472,7 +63092,7 @@ Domain allowed access.
16968 </summary>
16969 </param>
16970 </interface>
16971 -<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="84498">
16972 +<interface name="corenet_tcp_sendrecv_syncthing_discovery_port" lineno="84919">
16973 <summary>
16974 Send and receive TCP traffic on the syncthing_discovery port.
16975 </summary>
16976 @@ -62483,7 +63103,7 @@ Domain allowed access.
16977 </param>
16978 <infoflow type="both" weight="10"/>
16979 </interface>
16980 -<interface name="corenet_udp_send_syncthing_discovery_port" lineno="84513">
16981 +<interface name="corenet_udp_send_syncthing_discovery_port" lineno="84934">
16982 <summary>
16983 Send UDP traffic on the syncthing_discovery port.
16984 </summary>
16985 @@ -62494,7 +63114,7 @@ Domain allowed access.
16986 </param>
16987 <infoflow type="write" weight="10"/>
16988 </interface>
16989 -<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="84528">
16990 +<interface name="corenet_dontaudit_udp_send_syncthing_discovery_port" lineno="84949">
16991 <summary>
16992 Do not audit attempts to send UDP traffic on the syncthing_discovery port.
16993 </summary>
16994 @@ -62505,7 +63125,7 @@ Domain to not audit.
16995 </param>
16996 <infoflow type="none"/>
16997 </interface>
16998 -<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="84543">
16999 +<interface name="corenet_udp_receive_syncthing_discovery_port" lineno="84964">
17000 <summary>
17001 Receive UDP traffic on the syncthing_discovery port.
17002 </summary>
17003 @@ -62516,7 +63136,7 @@ Domain allowed access.
17004 </param>
17005 <infoflow type="read" weight="10"/>
17006 </interface>
17007 -<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="84558">
17008 +<interface name="corenet_dontaudit_udp_receive_syncthing_discovery_port" lineno="84979">
17009 <summary>
17010 Do not audit attempts to receive UDP traffic on the syncthing_discovery port.
17011 </summary>
17012 @@ -62527,7 +63147,7 @@ Domain to not audit.
17013 </param>
17014 <infoflow type="none"/>
17015 </interface>
17016 -<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="84573">
17017 +<interface name="corenet_udp_sendrecv_syncthing_discovery_port" lineno="84994">
17018 <summary>
17019 Send and receive UDP traffic on the syncthing_discovery port.
17020 </summary>
17021 @@ -62538,7 +63158,7 @@ Domain allowed access.
17022 </param>
17023 <infoflow type="both" weight="10"/>
17024 </interface>
17025 -<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="84589">
17026 +<interface name="corenet_dontaudit_udp_sendrecv_syncthing_discovery_port" lineno="85010">
17027 <summary>
17028 Do not audit attempts to send and receive
17029 UDP traffic on the syncthing_discovery port.
17030 @@ -62550,7 +63170,7 @@ Domain to not audit.
17031 </param>
17032 <infoflow type="none"/>
17033 </interface>
17034 -<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="84604">
17035 +<interface name="corenet_tcp_bind_syncthing_discovery_port" lineno="85025">
17036 <summary>
17037 Bind TCP sockets to the syncthing_discovery port.
17038 </summary>
17039 @@ -62561,7 +63181,7 @@ Domain allowed access.
17040 </param>
17041 <infoflow type="none"/>
17042 </interface>
17043 -<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="84624">
17044 +<interface name="corenet_udp_bind_syncthing_discovery_port" lineno="85045">
17045 <summary>
17046 Bind UDP sockets to the syncthing_discovery port.
17047 </summary>
17048 @@ -62572,7 +63192,7 @@ Domain allowed access.
17049 </param>
17050 <infoflow type="none"/>
17051 </interface>
17052 -<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="84643">
17053 +<interface name="corenet_tcp_connect_syncthing_discovery_port" lineno="85064">
17054 <summary>
17055 Make a TCP connection to the syncthing_discovery port.
17056 </summary>
17057 @@ -62582,7 +63202,7 @@ Domain allowed access.
17058 </summary>
17059 </param>
17060 </interface>
17061 -<interface name="corenet_send_syncthing_discovery_client_packets" lineno="84663">
17062 +<interface name="corenet_send_syncthing_discovery_client_packets" lineno="85084">
17063 <summary>
17064 Send syncthing_discovery_client packets.
17065 </summary>
17066 @@ -62593,7 +63213,7 @@ Domain allowed access.
17067 </param>
17068 <infoflow type="write" weight="10"/>
17069 </interface>
17070 -<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="84682">
17071 +<interface name="corenet_dontaudit_send_syncthing_discovery_client_packets" lineno="85103">
17072 <summary>
17073 Do not audit attempts to send syncthing_discovery_client packets.
17074 </summary>
17075 @@ -62604,7 +63224,7 @@ Domain to not audit.
17076 </param>
17077 <infoflow type="none"/>
17078 </interface>
17079 -<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="84701">
17080 +<interface name="corenet_receive_syncthing_discovery_client_packets" lineno="85122">
17081 <summary>
17082 Receive syncthing_discovery_client packets.
17083 </summary>
17084 @@ -62615,7 +63235,7 @@ Domain allowed access.
17085 </param>
17086 <infoflow type="read" weight="10"/>
17087 </interface>
17088 -<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="84720">
17089 +<interface name="corenet_dontaudit_receive_syncthing_discovery_client_packets" lineno="85141">
17090 <summary>
17091 Do not audit attempts to receive syncthing_discovery_client packets.
17092 </summary>
17093 @@ -62626,7 +63246,7 @@ Domain allowed access.
17094 </param>
17095 <infoflow type="none"/>
17096 </interface>
17097 -<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="84739">
17098 +<interface name="corenet_sendrecv_syncthing_discovery_client_packets" lineno="85160">
17099 <summary>
17100 Send and receive syncthing_discovery_client packets.
17101 </summary>
17102 @@ -62637,7 +63257,7 @@ Domain allowed access.
17103 </param>
17104 <infoflow type="both" weight="10"/>
17105 </interface>
17106 -<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="84755">
17107 +<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_client_packets" lineno="85176">
17108 <summary>
17109 Do not audit attempts to send and receive syncthing_discovery_client packets.
17110 </summary>
17111 @@ -62648,7 +63268,7 @@ Domain to not audit.
17112 </param>
17113 <infoflow type="none"/>
17114 </interface>
17115 -<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="84770">
17116 +<interface name="corenet_relabelto_syncthing_discovery_client_packets" lineno="85191">
17117 <summary>
17118 Relabel packets to syncthing_discovery_client the packet type.
17119 </summary>
17120 @@ -62658,7 +63278,7 @@ Domain allowed access.
17121 </summary>
17122 </param>
17123 </interface>
17124 -<interface name="corenet_send_syncthing_discovery_server_packets" lineno="84790">
17125 +<interface name="corenet_send_syncthing_discovery_server_packets" lineno="85211">
17126 <summary>
17127 Send syncthing_discovery_server packets.
17128 </summary>
17129 @@ -62669,7 +63289,7 @@ Domain allowed access.
17130 </param>
17131 <infoflow type="write" weight="10"/>
17132 </interface>
17133 -<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="84809">
17134 +<interface name="corenet_dontaudit_send_syncthing_discovery_server_packets" lineno="85230">
17135 <summary>
17136 Do not audit attempts to send syncthing_discovery_server packets.
17137 </summary>
17138 @@ -62680,7 +63300,7 @@ Domain to not audit.
17139 </param>
17140 <infoflow type="none"/>
17141 </interface>
17142 -<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="84828">
17143 +<interface name="corenet_receive_syncthing_discovery_server_packets" lineno="85249">
17144 <summary>
17145 Receive syncthing_discovery_server packets.
17146 </summary>
17147 @@ -62691,7 +63311,7 @@ Domain allowed access.
17148 </param>
17149 <infoflow type="read" weight="10"/>
17150 </interface>
17151 -<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="84847">
17152 +<interface name="corenet_dontaudit_receive_syncthing_discovery_server_packets" lineno="85268">
17153 <summary>
17154 Do not audit attempts to receive syncthing_discovery_server packets.
17155 </summary>
17156 @@ -62702,7 +63322,7 @@ Domain allowed access.
17157 </param>
17158 <infoflow type="none"/>
17159 </interface>
17160 -<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="84866">
17161 +<interface name="corenet_sendrecv_syncthing_discovery_server_packets" lineno="85287">
17162 <summary>
17163 Send and receive syncthing_discovery_server packets.
17164 </summary>
17165 @@ -62713,7 +63333,7 @@ Domain allowed access.
17166 </param>
17167 <infoflow type="both" weight="10"/>
17168 </interface>
17169 -<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="84882">
17170 +<interface name="corenet_dontaudit_sendrecv_syncthing_discovery_server_packets" lineno="85303">
17171 <summary>
17172 Do not audit attempts to send and receive syncthing_discovery_server packets.
17173 </summary>
17174 @@ -62724,7 +63344,7 @@ Domain to not audit.
17175 </param>
17176 <infoflow type="none"/>
17177 </interface>
17178 -<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="84897">
17179 +<interface name="corenet_relabelto_syncthing_discovery_server_packets" lineno="85318">
17180 <summary>
17181 Relabel packets to syncthing_discovery_server the packet type.
17182 </summary>
17183 @@ -62734,7 +63354,7 @@ Domain allowed access.
17184 </summary>
17185 </param>
17186 </interface>
17187 -<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="84919">
17188 +<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="85340">
17189 <summary>
17190 Send and receive TCP traffic on the sype_transport port.
17191 </summary>
17192 @@ -62745,7 +63365,7 @@ Domain allowed access.
17193 </param>
17194 <infoflow type="both" weight="10"/>
17195 </interface>
17196 -<interface name="corenet_udp_send_sype_transport_port" lineno="84934">
17197 +<interface name="corenet_udp_send_sype_transport_port" lineno="85355">
17198 <summary>
17199 Send UDP traffic on the sype_transport port.
17200 </summary>
17201 @@ -62756,7 +63376,7 @@ Domain allowed access.
17202 </param>
17203 <infoflow type="write" weight="10"/>
17204 </interface>
17205 -<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="84949">
17206 +<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="85370">
17207 <summary>
17208 Do not audit attempts to send UDP traffic on the sype_transport port.
17209 </summary>
17210 @@ -62767,7 +63387,7 @@ Domain to not audit.
17211 </param>
17212 <infoflow type="none"/>
17213 </interface>
17214 -<interface name="corenet_udp_receive_sype_transport_port" lineno="84964">
17215 +<interface name="corenet_udp_receive_sype_transport_port" lineno="85385">
17216 <summary>
17217 Receive UDP traffic on the sype_transport port.
17218 </summary>
17219 @@ -62778,7 +63398,7 @@ Domain allowed access.
17220 </param>
17221 <infoflow type="read" weight="10"/>
17222 </interface>
17223 -<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="84979">
17224 +<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="85400">
17225 <summary>
17226 Do not audit attempts to receive UDP traffic on the sype_transport port.
17227 </summary>
17228 @@ -62789,7 +63409,7 @@ Domain to not audit.
17229 </param>
17230 <infoflow type="none"/>
17231 </interface>
17232 -<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="84994">
17233 +<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="85415">
17234 <summary>
17235 Send and receive UDP traffic on the sype_transport port.
17236 </summary>
17237 @@ -62800,7 +63420,7 @@ Domain allowed access.
17238 </param>
17239 <infoflow type="both" weight="10"/>
17240 </interface>
17241 -<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="85010">
17242 +<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="85431">
17243 <summary>
17244 Do not audit attempts to send and receive
17245 UDP traffic on the sype_transport port.
17246 @@ -62812,7 +63432,7 @@ Domain to not audit.
17247 </param>
17248 <infoflow type="none"/>
17249 </interface>
17250 -<interface name="corenet_tcp_bind_sype_transport_port" lineno="85025">
17251 +<interface name="corenet_tcp_bind_sype_transport_port" lineno="85446">
17252 <summary>
17253 Bind TCP sockets to the sype_transport port.
17254 </summary>
17255 @@ -62823,7 +63443,7 @@ Domain allowed access.
17256 </param>
17257 <infoflow type="none"/>
17258 </interface>
17259 -<interface name="corenet_udp_bind_sype_transport_port" lineno="85045">
17260 +<interface name="corenet_udp_bind_sype_transport_port" lineno="85466">
17261 <summary>
17262 Bind UDP sockets to the sype_transport port.
17263 </summary>
17264 @@ -62834,7 +63454,7 @@ Domain allowed access.
17265 </param>
17266 <infoflow type="none"/>
17267 </interface>
17268 -<interface name="corenet_tcp_connect_sype_transport_port" lineno="85064">
17269 +<interface name="corenet_tcp_connect_sype_transport_port" lineno="85485">
17270 <summary>
17271 Make a TCP connection to the sype_transport port.
17272 </summary>
17273 @@ -62844,7 +63464,7 @@ Domain allowed access.
17274 </summary>
17275 </param>
17276 </interface>
17277 -<interface name="corenet_send_sype_transport_client_packets" lineno="85084">
17278 +<interface name="corenet_send_sype_transport_client_packets" lineno="85505">
17279 <summary>
17280 Send sype_transport_client packets.
17281 </summary>
17282 @@ -62855,7 +63475,7 @@ Domain allowed access.
17283 </param>
17284 <infoflow type="write" weight="10"/>
17285 </interface>
17286 -<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="85103">
17287 +<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="85524">
17288 <summary>
17289 Do not audit attempts to send sype_transport_client packets.
17290 </summary>
17291 @@ -62866,7 +63486,7 @@ Domain to not audit.
17292 </param>
17293 <infoflow type="none"/>
17294 </interface>
17295 -<interface name="corenet_receive_sype_transport_client_packets" lineno="85122">
17296 +<interface name="corenet_receive_sype_transport_client_packets" lineno="85543">
17297 <summary>
17298 Receive sype_transport_client packets.
17299 </summary>
17300 @@ -62877,7 +63497,7 @@ Domain allowed access.
17301 </param>
17302 <infoflow type="read" weight="10"/>
17303 </interface>
17304 -<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="85141">
17305 +<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="85562">
17306 <summary>
17307 Do not audit attempts to receive sype_transport_client packets.
17308 </summary>
17309 @@ -62888,7 +63508,7 @@ Domain allowed access.
17310 </param>
17311 <infoflow type="none"/>
17312 </interface>
17313 -<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="85160">
17314 +<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="85581">
17315 <summary>
17316 Send and receive sype_transport_client packets.
17317 </summary>
17318 @@ -62899,7 +63519,7 @@ Domain allowed access.
17319 </param>
17320 <infoflow type="both" weight="10"/>
17321 </interface>
17322 -<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="85176">
17323 +<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="85597">
17324 <summary>
17325 Do not audit attempts to send and receive sype_transport_client packets.
17326 </summary>
17327 @@ -62910,7 +63530,7 @@ Domain to not audit.
17328 </param>
17329 <infoflow type="none"/>
17330 </interface>
17331 -<interface name="corenet_relabelto_sype_transport_client_packets" lineno="85191">
17332 +<interface name="corenet_relabelto_sype_transport_client_packets" lineno="85612">
17333 <summary>
17334 Relabel packets to sype_transport_client the packet type.
17335 </summary>
17336 @@ -62920,7 +63540,7 @@ Domain allowed access.
17337 </summary>
17338 </param>
17339 </interface>
17340 -<interface name="corenet_send_sype_transport_server_packets" lineno="85211">
17341 +<interface name="corenet_send_sype_transport_server_packets" lineno="85632">
17342 <summary>
17343 Send sype_transport_server packets.
17344 </summary>
17345 @@ -62931,7 +63551,7 @@ Domain allowed access.
17346 </param>
17347 <infoflow type="write" weight="10"/>
17348 </interface>
17349 -<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="85230">
17350 +<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="85651">
17351 <summary>
17352 Do not audit attempts to send sype_transport_server packets.
17353 </summary>
17354 @@ -62942,7 +63562,7 @@ Domain to not audit.
17355 </param>
17356 <infoflow type="none"/>
17357 </interface>
17358 -<interface name="corenet_receive_sype_transport_server_packets" lineno="85249">
17359 +<interface name="corenet_receive_sype_transport_server_packets" lineno="85670">
17360 <summary>
17361 Receive sype_transport_server packets.
17362 </summary>
17363 @@ -62953,7 +63573,7 @@ Domain allowed access.
17364 </param>
17365 <infoflow type="read" weight="10"/>
17366 </interface>
17367 -<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="85268">
17368 +<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="85689">
17369 <summary>
17370 Do not audit attempts to receive sype_transport_server packets.
17371 </summary>
17372 @@ -62964,7 +63584,7 @@ Domain allowed access.
17373 </param>
17374 <infoflow type="none"/>
17375 </interface>
17376 -<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="85287">
17377 +<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="85708">
17378 <summary>
17379 Send and receive sype_transport_server packets.
17380 </summary>
17381 @@ -62975,7 +63595,7 @@ Domain allowed access.
17382 </param>
17383 <infoflow type="both" weight="10"/>
17384 </interface>
17385 -<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="85303">
17386 +<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="85724">
17387 <summary>
17388 Do not audit attempts to send and receive sype_transport_server packets.
17389 </summary>
17390 @@ -62986,7 +63606,7 @@ Domain to not audit.
17391 </param>
17392 <infoflow type="none"/>
17393 </interface>
17394 -<interface name="corenet_relabelto_sype_transport_server_packets" lineno="85318">
17395 +<interface name="corenet_relabelto_sype_transport_server_packets" lineno="85739">
17396 <summary>
17397 Relabel packets to sype_transport_server the packet type.
17398 </summary>
17399 @@ -62996,7 +63616,7 @@ Domain allowed access.
17400 </summary>
17401 </param>
17402 </interface>
17403 -<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85340">
17404 +<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85761">
17405 <summary>
17406 Send and receive TCP traffic on the syslogd port.
17407 </summary>
17408 @@ -63007,7 +63627,7 @@ Domain allowed access.
17409 </param>
17410 <infoflow type="both" weight="10"/>
17411 </interface>
17412 -<interface name="corenet_udp_send_syslogd_port" lineno="85355">
17413 +<interface name="corenet_udp_send_syslogd_port" lineno="85776">
17414 <summary>
17415 Send UDP traffic on the syslogd port.
17416 </summary>
17417 @@ -63018,7 +63638,7 @@ Domain allowed access.
17418 </param>
17419 <infoflow type="write" weight="10"/>
17420 </interface>
17421 -<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85370">
17422 +<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85791">
17423 <summary>
17424 Do not audit attempts to send UDP traffic on the syslogd port.
17425 </summary>
17426 @@ -63029,7 +63649,7 @@ Domain to not audit.
17427 </param>
17428 <infoflow type="none"/>
17429 </interface>
17430 -<interface name="corenet_udp_receive_syslogd_port" lineno="85385">
17431 +<interface name="corenet_udp_receive_syslogd_port" lineno="85806">
17432 <summary>
17433 Receive UDP traffic on the syslogd port.
17434 </summary>
17435 @@ -63040,7 +63660,7 @@ Domain allowed access.
17436 </param>
17437 <infoflow type="read" weight="10"/>
17438 </interface>
17439 -<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85400">
17440 +<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85821">
17441 <summary>
17442 Do not audit attempts to receive UDP traffic on the syslogd port.
17443 </summary>
17444 @@ -63051,7 +63671,7 @@ Domain to not audit.
17445 </param>
17446 <infoflow type="none"/>
17447 </interface>
17448 -<interface name="corenet_udp_sendrecv_syslogd_port" lineno="85415">
17449 +<interface name="corenet_udp_sendrecv_syslogd_port" lineno="85836">
17450 <summary>
17451 Send and receive UDP traffic on the syslogd port.
17452 </summary>
17453 @@ -63062,7 +63682,7 @@ Domain allowed access.
17454 </param>
17455 <infoflow type="both" weight="10"/>
17456 </interface>
17457 -<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85431">
17458 +<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85852">
17459 <summary>
17460 Do not audit attempts to send and receive
17461 UDP traffic on the syslogd port.
17462 @@ -63074,7 +63694,7 @@ Domain to not audit.
17463 </param>
17464 <infoflow type="none"/>
17465 </interface>
17466 -<interface name="corenet_tcp_bind_syslogd_port" lineno="85446">
17467 +<interface name="corenet_tcp_bind_syslogd_port" lineno="85867">
17468 <summary>
17469 Bind TCP sockets to the syslogd port.
17470 </summary>
17471 @@ -63085,7 +63705,7 @@ Domain allowed access.
17472 </param>
17473 <infoflow type="none"/>
17474 </interface>
17475 -<interface name="corenet_udp_bind_syslogd_port" lineno="85466">
17476 +<interface name="corenet_udp_bind_syslogd_port" lineno="85887">
17477 <summary>
17478 Bind UDP sockets to the syslogd port.
17479 </summary>
17480 @@ -63096,7 +63716,7 @@ Domain allowed access.
17481 </param>
17482 <infoflow type="none"/>
17483 </interface>
17484 -<interface name="corenet_tcp_connect_syslogd_port" lineno="85485">
17485 +<interface name="corenet_tcp_connect_syslogd_port" lineno="85906">
17486 <summary>
17487 Make a TCP connection to the syslogd port.
17488 </summary>
17489 @@ -63106,7 +63726,7 @@ Domain allowed access.
17490 </summary>
17491 </param>
17492 </interface>
17493 -<interface name="corenet_send_syslogd_client_packets" lineno="85505">
17494 +<interface name="corenet_send_syslogd_client_packets" lineno="85926">
17495 <summary>
17496 Send syslogd_client packets.
17497 </summary>
17498 @@ -63117,7 +63737,7 @@ Domain allowed access.
17499 </param>
17500 <infoflow type="write" weight="10"/>
17501 </interface>
17502 -<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85524">
17503 +<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85945">
17504 <summary>
17505 Do not audit attempts to send syslogd_client packets.
17506 </summary>
17507 @@ -63128,7 +63748,7 @@ Domain to not audit.
17508 </param>
17509 <infoflow type="none"/>
17510 </interface>
17511 -<interface name="corenet_receive_syslogd_client_packets" lineno="85543">
17512 +<interface name="corenet_receive_syslogd_client_packets" lineno="85964">
17513 <summary>
17514 Receive syslogd_client packets.
17515 </summary>
17516 @@ -63139,7 +63759,7 @@ Domain allowed access.
17517 </param>
17518 <infoflow type="read" weight="10"/>
17519 </interface>
17520 -<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="85562">
17521 +<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="85983">
17522 <summary>
17523 Do not audit attempts to receive syslogd_client packets.
17524 </summary>
17525 @@ -63150,7 +63770,7 @@ Domain allowed access.
17526 </param>
17527 <infoflow type="none"/>
17528 </interface>
17529 -<interface name="corenet_sendrecv_syslogd_client_packets" lineno="85581">
17530 +<interface name="corenet_sendrecv_syslogd_client_packets" lineno="86002">
17531 <summary>
17532 Send and receive syslogd_client packets.
17533 </summary>
17534 @@ -63161,7 +63781,7 @@ Domain allowed access.
17535 </param>
17536 <infoflow type="both" weight="10"/>
17537 </interface>
17538 -<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="85597">
17539 +<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="86018">
17540 <summary>
17541 Do not audit attempts to send and receive syslogd_client packets.
17542 </summary>
17543 @@ -63172,7 +63792,7 @@ Domain to not audit.
17544 </param>
17545 <infoflow type="none"/>
17546 </interface>
17547 -<interface name="corenet_relabelto_syslogd_client_packets" lineno="85612">
17548 +<interface name="corenet_relabelto_syslogd_client_packets" lineno="86033">
17549 <summary>
17550 Relabel packets to syslogd_client the packet type.
17551 </summary>
17552 @@ -63182,7 +63802,7 @@ Domain allowed access.
17553 </summary>
17554 </param>
17555 </interface>
17556 -<interface name="corenet_send_syslogd_server_packets" lineno="85632">
17557 +<interface name="corenet_send_syslogd_server_packets" lineno="86053">
17558 <summary>
17559 Send syslogd_server packets.
17560 </summary>
17561 @@ -63193,7 +63813,7 @@ Domain allowed access.
17562 </param>
17563 <infoflow type="write" weight="10"/>
17564 </interface>
17565 -<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="85651">
17566 +<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="86072">
17567 <summary>
17568 Do not audit attempts to send syslogd_server packets.
17569 </summary>
17570 @@ -63204,7 +63824,7 @@ Domain to not audit.
17571 </param>
17572 <infoflow type="none"/>
17573 </interface>
17574 -<interface name="corenet_receive_syslogd_server_packets" lineno="85670">
17575 +<interface name="corenet_receive_syslogd_server_packets" lineno="86091">
17576 <summary>
17577 Receive syslogd_server packets.
17578 </summary>
17579 @@ -63215,7 +63835,7 @@ Domain allowed access.
17580 </param>
17581 <infoflow type="read" weight="10"/>
17582 </interface>
17583 -<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="85689">
17584 +<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="86110">
17585 <summary>
17586 Do not audit attempts to receive syslogd_server packets.
17587 </summary>
17588 @@ -63226,7 +63846,7 @@ Domain allowed access.
17589 </param>
17590 <infoflow type="none"/>
17591 </interface>
17592 -<interface name="corenet_sendrecv_syslogd_server_packets" lineno="85708">
17593 +<interface name="corenet_sendrecv_syslogd_server_packets" lineno="86129">
17594 <summary>
17595 Send and receive syslogd_server packets.
17596 </summary>
17597 @@ -63237,7 +63857,7 @@ Domain allowed access.
17598 </param>
17599 <infoflow type="both" weight="10"/>
17600 </interface>
17601 -<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="85724">
17602 +<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="86145">
17603 <summary>
17604 Do not audit attempts to send and receive syslogd_server packets.
17605 </summary>
17606 @@ -63248,7 +63868,7 @@ Domain to not audit.
17607 </param>
17608 <infoflow type="none"/>
17609 </interface>
17610 -<interface name="corenet_relabelto_syslogd_server_packets" lineno="85739">
17611 +<interface name="corenet_relabelto_syslogd_server_packets" lineno="86160">
17612 <summary>
17613 Relabel packets to syslogd_server the packet type.
17614 </summary>
17615 @@ -63258,7 +63878,7 @@ Domain allowed access.
17616 </summary>
17617 </param>
17618 </interface>
17619 -<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="85761">
17620 +<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="86182">
17621 <summary>
17622 Send and receive TCP traffic on the syslog_tls port.
17623 </summary>
17624 @@ -63269,7 +63889,7 @@ Domain allowed access.
17625 </param>
17626 <infoflow type="both" weight="10"/>
17627 </interface>
17628 -<interface name="corenet_udp_send_syslog_tls_port" lineno="85776">
17629 +<interface name="corenet_udp_send_syslog_tls_port" lineno="86197">
17630 <summary>
17631 Send UDP traffic on the syslog_tls port.
17632 </summary>
17633 @@ -63280,7 +63900,7 @@ Domain allowed access.
17634 </param>
17635 <infoflow type="write" weight="10"/>
17636 </interface>
17637 -<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="85791">
17638 +<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="86212">
17639 <summary>
17640 Do not audit attempts to send UDP traffic on the syslog_tls port.
17641 </summary>
17642 @@ -63291,7 +63911,7 @@ Domain to not audit.
17643 </param>
17644 <infoflow type="none"/>
17645 </interface>
17646 -<interface name="corenet_udp_receive_syslog_tls_port" lineno="85806">
17647 +<interface name="corenet_udp_receive_syslog_tls_port" lineno="86227">
17648 <summary>
17649 Receive UDP traffic on the syslog_tls port.
17650 </summary>
17651 @@ -63302,7 +63922,7 @@ Domain allowed access.
17652 </param>
17653 <infoflow type="read" weight="10"/>
17654 </interface>
17655 -<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="85821">
17656 +<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="86242">
17657 <summary>
17658 Do not audit attempts to receive UDP traffic on the syslog_tls port.
17659 </summary>
17660 @@ -63313,7 +63933,7 @@ Domain to not audit.
17661 </param>
17662 <infoflow type="none"/>
17663 </interface>
17664 -<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="85836">
17665 +<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="86257">
17666 <summary>
17667 Send and receive UDP traffic on the syslog_tls port.
17668 </summary>
17669 @@ -63324,7 +63944,7 @@ Domain allowed access.
17670 </param>
17671 <infoflow type="both" weight="10"/>
17672 </interface>
17673 -<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="85852">
17674 +<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="86273">
17675 <summary>
17676 Do not audit attempts to send and receive
17677 UDP traffic on the syslog_tls port.
17678 @@ -63336,7 +63956,7 @@ Domain to not audit.
17679 </param>
17680 <infoflow type="none"/>
17681 </interface>
17682 -<interface name="corenet_tcp_bind_syslog_tls_port" lineno="85867">
17683 +<interface name="corenet_tcp_bind_syslog_tls_port" lineno="86288">
17684 <summary>
17685 Bind TCP sockets to the syslog_tls port.
17686 </summary>
17687 @@ -63347,7 +63967,7 @@ Domain allowed access.
17688 </param>
17689 <infoflow type="none"/>
17690 </interface>
17691 -<interface name="corenet_udp_bind_syslog_tls_port" lineno="85887">
17692 +<interface name="corenet_udp_bind_syslog_tls_port" lineno="86308">
17693 <summary>
17694 Bind UDP sockets to the syslog_tls port.
17695 </summary>
17696 @@ -63358,7 +63978,7 @@ Domain allowed access.
17697 </param>
17698 <infoflow type="none"/>
17699 </interface>
17700 -<interface name="corenet_tcp_connect_syslog_tls_port" lineno="85906">
17701 +<interface name="corenet_tcp_connect_syslog_tls_port" lineno="86327">
17702 <summary>
17703 Make a TCP connection to the syslog_tls port.
17704 </summary>
17705 @@ -63368,7 +63988,7 @@ Domain allowed access.
17706 </summary>
17707 </param>
17708 </interface>
17709 -<interface name="corenet_send_syslog_tls_client_packets" lineno="85926">
17710 +<interface name="corenet_send_syslog_tls_client_packets" lineno="86347">
17711 <summary>
17712 Send syslog_tls_client packets.
17713 </summary>
17714 @@ -63379,7 +63999,7 @@ Domain allowed access.
17715 </param>
17716 <infoflow type="write" weight="10"/>
17717 </interface>
17718 -<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="85945">
17719 +<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="86366">
17720 <summary>
17721 Do not audit attempts to send syslog_tls_client packets.
17722 </summary>
17723 @@ -63390,7 +64010,7 @@ Domain to not audit.
17724 </param>
17725 <infoflow type="none"/>
17726 </interface>
17727 -<interface name="corenet_receive_syslog_tls_client_packets" lineno="85964">
17728 +<interface name="corenet_receive_syslog_tls_client_packets" lineno="86385">
17729 <summary>
17730 Receive syslog_tls_client packets.
17731 </summary>
17732 @@ -63401,7 +64021,7 @@ Domain allowed access.
17733 </param>
17734 <infoflow type="read" weight="10"/>
17735 </interface>
17736 -<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="85983">
17737 +<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="86404">
17738 <summary>
17739 Do not audit attempts to receive syslog_tls_client packets.
17740 </summary>
17741 @@ -63412,7 +64032,7 @@ Domain allowed access.
17742 </param>
17743 <infoflow type="none"/>
17744 </interface>
17745 -<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="86002">
17746 +<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="86423">
17747 <summary>
17748 Send and receive syslog_tls_client packets.
17749 </summary>
17750 @@ -63423,7 +64043,7 @@ Domain allowed access.
17751 </param>
17752 <infoflow type="both" weight="10"/>
17753 </interface>
17754 -<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="86018">
17755 +<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="86439">
17756 <summary>
17757 Do not audit attempts to send and receive syslog_tls_client packets.
17758 </summary>
17759 @@ -63434,7 +64054,7 @@ Domain to not audit.
17760 </param>
17761 <infoflow type="none"/>
17762 </interface>
17763 -<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="86033">
17764 +<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="86454">
17765 <summary>
17766 Relabel packets to syslog_tls_client the packet type.
17767 </summary>
17768 @@ -63444,7 +64064,7 @@ Domain allowed access.
17769 </summary>
17770 </param>
17771 </interface>
17772 -<interface name="corenet_send_syslog_tls_server_packets" lineno="86053">
17773 +<interface name="corenet_send_syslog_tls_server_packets" lineno="86474">
17774 <summary>
17775 Send syslog_tls_server packets.
17776 </summary>
17777 @@ -63455,7 +64075,7 @@ Domain allowed access.
17778 </param>
17779 <infoflow type="write" weight="10"/>
17780 </interface>
17781 -<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="86072">
17782 +<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="86493">
17783 <summary>
17784 Do not audit attempts to send syslog_tls_server packets.
17785 </summary>
17786 @@ -63466,7 +64086,7 @@ Domain to not audit.
17787 </param>
17788 <infoflow type="none"/>
17789 </interface>
17790 -<interface name="corenet_receive_syslog_tls_server_packets" lineno="86091">
17791 +<interface name="corenet_receive_syslog_tls_server_packets" lineno="86512">
17792 <summary>
17793 Receive syslog_tls_server packets.
17794 </summary>
17795 @@ -63477,7 +64097,7 @@ Domain allowed access.
17796 </param>
17797 <infoflow type="read" weight="10"/>
17798 </interface>
17799 -<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="86110">
17800 +<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="86531">
17801 <summary>
17802 Do not audit attempts to receive syslog_tls_server packets.
17803 </summary>
17804 @@ -63488,7 +64108,7 @@ Domain allowed access.
17805 </param>
17806 <infoflow type="none"/>
17807 </interface>
17808 -<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="86129">
17809 +<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="86550">
17810 <summary>
17811 Send and receive syslog_tls_server packets.
17812 </summary>
17813 @@ -63499,7 +64119,7 @@ Domain allowed access.
17814 </param>
17815 <infoflow type="both" weight="10"/>
17816 </interface>
17817 -<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="86145">
17818 +<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="86566">
17819 <summary>
17820 Do not audit attempts to send and receive syslog_tls_server packets.
17821 </summary>
17822 @@ -63510,7 +64130,7 @@ Domain to not audit.
17823 </param>
17824 <infoflow type="none"/>
17825 </interface>
17826 -<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="86160">
17827 +<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="86581">
17828 <summary>
17829 Relabel packets to syslog_tls_server the packet type.
17830 </summary>
17831 @@ -63520,7 +64140,7 @@ Domain allowed access.
17832 </summary>
17833 </param>
17834 </interface>
17835 -<interface name="corenet_tcp_sendrecv_tcs_port" lineno="86182">
17836 +<interface name="corenet_tcp_sendrecv_tcs_port" lineno="86603">
17837 <summary>
17838 Send and receive TCP traffic on the tcs port.
17839 </summary>
17840 @@ -63531,7 +64151,7 @@ Domain allowed access.
17841 </param>
17842 <infoflow type="both" weight="10"/>
17843 </interface>
17844 -<interface name="corenet_udp_send_tcs_port" lineno="86197">
17845 +<interface name="corenet_udp_send_tcs_port" lineno="86618">
17846 <summary>
17847 Send UDP traffic on the tcs port.
17848 </summary>
17849 @@ -63542,7 +64162,7 @@ Domain allowed access.
17850 </param>
17851 <infoflow type="write" weight="10"/>
17852 </interface>
17853 -<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="86212">
17854 +<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="86633">
17855 <summary>
17856 Do not audit attempts to send UDP traffic on the tcs port.
17857 </summary>
17858 @@ -63553,7 +64173,7 @@ Domain to not audit.
17859 </param>
17860 <infoflow type="none"/>
17861 </interface>
17862 -<interface name="corenet_udp_receive_tcs_port" lineno="86227">
17863 +<interface name="corenet_udp_receive_tcs_port" lineno="86648">
17864 <summary>
17865 Receive UDP traffic on the tcs port.
17866 </summary>
17867 @@ -63564,7 +64184,7 @@ Domain allowed access.
17868 </param>
17869 <infoflow type="read" weight="10"/>
17870 </interface>
17871 -<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="86242">
17872 +<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="86663">
17873 <summary>
17874 Do not audit attempts to receive UDP traffic on the tcs port.
17875 </summary>
17876 @@ -63575,7 +64195,7 @@ Domain to not audit.
17877 </param>
17878 <infoflow type="none"/>
17879 </interface>
17880 -<interface name="corenet_udp_sendrecv_tcs_port" lineno="86257">
17881 +<interface name="corenet_udp_sendrecv_tcs_port" lineno="86678">
17882 <summary>
17883 Send and receive UDP traffic on the tcs port.
17884 </summary>
17885 @@ -63586,7 +64206,7 @@ Domain allowed access.
17886 </param>
17887 <infoflow type="both" weight="10"/>
17888 </interface>
17889 -<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="86273">
17890 +<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="86694">
17891 <summary>
17892 Do not audit attempts to send and receive
17893 UDP traffic on the tcs port.
17894 @@ -63598,7 +64218,7 @@ Domain to not audit.
17895 </param>
17896 <infoflow type="none"/>
17897 </interface>
17898 -<interface name="corenet_tcp_bind_tcs_port" lineno="86288">
17899 +<interface name="corenet_tcp_bind_tcs_port" lineno="86709">
17900 <summary>
17901 Bind TCP sockets to the tcs port.
17902 </summary>
17903 @@ -63609,7 +64229,7 @@ Domain allowed access.
17904 </param>
17905 <infoflow type="none"/>
17906 </interface>
17907 -<interface name="corenet_udp_bind_tcs_port" lineno="86308">
17908 +<interface name="corenet_udp_bind_tcs_port" lineno="86729">
17909 <summary>
17910 Bind UDP sockets to the tcs port.
17911 </summary>
17912 @@ -63620,7 +64240,7 @@ Domain allowed access.
17913 </param>
17914 <infoflow type="none"/>
17915 </interface>
17916 -<interface name="corenet_tcp_connect_tcs_port" lineno="86327">
17917 +<interface name="corenet_tcp_connect_tcs_port" lineno="86748">
17918 <summary>
17919 Make a TCP connection to the tcs port.
17920 </summary>
17921 @@ -63630,7 +64250,7 @@ Domain allowed access.
17922 </summary>
17923 </param>
17924 </interface>
17925 -<interface name="corenet_send_tcs_client_packets" lineno="86347">
17926 +<interface name="corenet_send_tcs_client_packets" lineno="86768">
17927 <summary>
17928 Send tcs_client packets.
17929 </summary>
17930 @@ -63641,7 +64261,7 @@ Domain allowed access.
17931 </param>
17932 <infoflow type="write" weight="10"/>
17933 </interface>
17934 -<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="86366">
17935 +<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="86787">
17936 <summary>
17937 Do not audit attempts to send tcs_client packets.
17938 </summary>
17939 @@ -63652,7 +64272,7 @@ Domain to not audit.
17940 </param>
17941 <infoflow type="none"/>
17942 </interface>
17943 -<interface name="corenet_receive_tcs_client_packets" lineno="86385">
17944 +<interface name="corenet_receive_tcs_client_packets" lineno="86806">
17945 <summary>
17946 Receive tcs_client packets.
17947 </summary>
17948 @@ -63663,7 +64283,7 @@ Domain allowed access.
17949 </param>
17950 <infoflow type="read" weight="10"/>
17951 </interface>
17952 -<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="86404">
17953 +<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="86825">
17954 <summary>
17955 Do not audit attempts to receive tcs_client packets.
17956 </summary>
17957 @@ -63674,7 +64294,7 @@ Domain allowed access.
17958 </param>
17959 <infoflow type="none"/>
17960 </interface>
17961 -<interface name="corenet_sendrecv_tcs_client_packets" lineno="86423">
17962 +<interface name="corenet_sendrecv_tcs_client_packets" lineno="86844">
17963 <summary>
17964 Send and receive tcs_client packets.
17965 </summary>
17966 @@ -63685,7 +64305,7 @@ Domain allowed access.
17967 </param>
17968 <infoflow type="both" weight="10"/>
17969 </interface>
17970 -<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="86439">
17971 +<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="86860">
17972 <summary>
17973 Do not audit attempts to send and receive tcs_client packets.
17974 </summary>
17975 @@ -63696,7 +64316,7 @@ Domain to not audit.
17976 </param>
17977 <infoflow type="none"/>
17978 </interface>
17979 -<interface name="corenet_relabelto_tcs_client_packets" lineno="86454">
17980 +<interface name="corenet_relabelto_tcs_client_packets" lineno="86875">
17981 <summary>
17982 Relabel packets to tcs_client the packet type.
17983 </summary>
17984 @@ -63706,7 +64326,7 @@ Domain allowed access.
17985 </summary>
17986 </param>
17987 </interface>
17988 -<interface name="corenet_send_tcs_server_packets" lineno="86474">
17989 +<interface name="corenet_send_tcs_server_packets" lineno="86895">
17990 <summary>
17991 Send tcs_server packets.
17992 </summary>
17993 @@ -63717,7 +64337,7 @@ Domain allowed access.
17994 </param>
17995 <infoflow type="write" weight="10"/>
17996 </interface>
17997 -<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="86493">
17998 +<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="86914">
17999 <summary>
18000 Do not audit attempts to send tcs_server packets.
18001 </summary>
18002 @@ -63728,7 +64348,7 @@ Domain to not audit.
18003 </param>
18004 <infoflow type="none"/>
18005 </interface>
18006 -<interface name="corenet_receive_tcs_server_packets" lineno="86512">
18007 +<interface name="corenet_receive_tcs_server_packets" lineno="86933">
18008 <summary>
18009 Receive tcs_server packets.
18010 </summary>
18011 @@ -63739,7 +64359,7 @@ Domain allowed access.
18012 </param>
18013 <infoflow type="read" weight="10"/>
18014 </interface>
18015 -<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="86531">
18016 +<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="86952">
18017 <summary>
18018 Do not audit attempts to receive tcs_server packets.
18019 </summary>
18020 @@ -63750,7 +64370,7 @@ Domain allowed access.
18021 </param>
18022 <infoflow type="none"/>
18023 </interface>
18024 -<interface name="corenet_sendrecv_tcs_server_packets" lineno="86550">
18025 +<interface name="corenet_sendrecv_tcs_server_packets" lineno="86971">
18026 <summary>
18027 Send and receive tcs_server packets.
18028 </summary>
18029 @@ -63761,7 +64381,7 @@ Domain allowed access.
18030 </param>
18031 <infoflow type="both" weight="10"/>
18032 </interface>
18033 -<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="86566">
18034 +<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="86987">
18035 <summary>
18036 Do not audit attempts to send and receive tcs_server packets.
18037 </summary>
18038 @@ -63772,7 +64392,7 @@ Domain to not audit.
18039 </param>
18040 <infoflow type="none"/>
18041 </interface>
18042 -<interface name="corenet_relabelto_tcs_server_packets" lineno="86581">
18043 +<interface name="corenet_relabelto_tcs_server_packets" lineno="87002">
18044 <summary>
18045 Relabel packets to tcs_server the packet type.
18046 </summary>
18047 @@ -63782,7 +64402,7 @@ Domain allowed access.
18048 </summary>
18049 </param>
18050 </interface>
18051 -<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="86603">
18052 +<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="87024">
18053 <summary>
18054 Send and receive TCP traffic on the telnetd port.
18055 </summary>
18056 @@ -63793,7 +64413,7 @@ Domain allowed access.
18057 </param>
18058 <infoflow type="both" weight="10"/>
18059 </interface>
18060 -<interface name="corenet_udp_send_telnetd_port" lineno="86618">
18061 +<interface name="corenet_udp_send_telnetd_port" lineno="87039">
18062 <summary>
18063 Send UDP traffic on the telnetd port.
18064 </summary>
18065 @@ -63804,7 +64424,7 @@ Domain allowed access.
18066 </param>
18067 <infoflow type="write" weight="10"/>
18068 </interface>
18069 -<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="86633">
18070 +<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="87054">
18071 <summary>
18072 Do not audit attempts to send UDP traffic on the telnetd port.
18073 </summary>
18074 @@ -63815,7 +64435,7 @@ Domain to not audit.
18075 </param>
18076 <infoflow type="none"/>
18077 </interface>
18078 -<interface name="corenet_udp_receive_telnetd_port" lineno="86648">
18079 +<interface name="corenet_udp_receive_telnetd_port" lineno="87069">
18080 <summary>
18081 Receive UDP traffic on the telnetd port.
18082 </summary>
18083 @@ -63826,7 +64446,7 @@ Domain allowed access.
18084 </param>
18085 <infoflow type="read" weight="10"/>
18086 </interface>
18087 -<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="86663">
18088 +<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="87084">
18089 <summary>
18090 Do not audit attempts to receive UDP traffic on the telnetd port.
18091 </summary>
18092 @@ -63837,7 +64457,7 @@ Domain to not audit.
18093 </param>
18094 <infoflow type="none"/>
18095 </interface>
18096 -<interface name="corenet_udp_sendrecv_telnetd_port" lineno="86678">
18097 +<interface name="corenet_udp_sendrecv_telnetd_port" lineno="87099">
18098 <summary>
18099 Send and receive UDP traffic on the telnetd port.
18100 </summary>
18101 @@ -63848,7 +64468,7 @@ Domain allowed access.
18102 </param>
18103 <infoflow type="both" weight="10"/>
18104 </interface>
18105 -<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="86694">
18106 +<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="87115">
18107 <summary>
18108 Do not audit attempts to send and receive
18109 UDP traffic on the telnetd port.
18110 @@ -63860,7 +64480,7 @@ Domain to not audit.
18111 </param>
18112 <infoflow type="none"/>
18113 </interface>
18114 -<interface name="corenet_tcp_bind_telnetd_port" lineno="86709">
18115 +<interface name="corenet_tcp_bind_telnetd_port" lineno="87130">
18116 <summary>
18117 Bind TCP sockets to the telnetd port.
18118 </summary>
18119 @@ -63871,7 +64491,7 @@ Domain allowed access.
18120 </param>
18121 <infoflow type="none"/>
18122 </interface>
18123 -<interface name="corenet_udp_bind_telnetd_port" lineno="86729">
18124 +<interface name="corenet_udp_bind_telnetd_port" lineno="87150">
18125 <summary>
18126 Bind UDP sockets to the telnetd port.
18127 </summary>
18128 @@ -63882,7 +64502,7 @@ Domain allowed access.
18129 </param>
18130 <infoflow type="none"/>
18131 </interface>
18132 -<interface name="corenet_tcp_connect_telnetd_port" lineno="86748">
18133 +<interface name="corenet_tcp_connect_telnetd_port" lineno="87169">
18134 <summary>
18135 Make a TCP connection to the telnetd port.
18136 </summary>
18137 @@ -63892,7 +64512,7 @@ Domain allowed access.
18138 </summary>
18139 </param>
18140 </interface>
18141 -<interface name="corenet_send_telnetd_client_packets" lineno="86768">
18142 +<interface name="corenet_send_telnetd_client_packets" lineno="87189">
18143 <summary>
18144 Send telnetd_client packets.
18145 </summary>
18146 @@ -63903,7 +64523,7 @@ Domain allowed access.
18147 </param>
18148 <infoflow type="write" weight="10"/>
18149 </interface>
18150 -<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="86787">
18151 +<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="87208">
18152 <summary>
18153 Do not audit attempts to send telnetd_client packets.
18154 </summary>
18155 @@ -63914,7 +64534,7 @@ Domain to not audit.
18156 </param>
18157 <infoflow type="none"/>
18158 </interface>
18159 -<interface name="corenet_receive_telnetd_client_packets" lineno="86806">
18160 +<interface name="corenet_receive_telnetd_client_packets" lineno="87227">
18161 <summary>
18162 Receive telnetd_client packets.
18163 </summary>
18164 @@ -63925,7 +64545,7 @@ Domain allowed access.
18165 </param>
18166 <infoflow type="read" weight="10"/>
18167 </interface>
18168 -<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="86825">
18169 +<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="87246">
18170 <summary>
18171 Do not audit attempts to receive telnetd_client packets.
18172 </summary>
18173 @@ -63936,7 +64556,7 @@ Domain allowed access.
18174 </param>
18175 <infoflow type="none"/>
18176 </interface>
18177 -<interface name="corenet_sendrecv_telnetd_client_packets" lineno="86844">
18178 +<interface name="corenet_sendrecv_telnetd_client_packets" lineno="87265">
18179 <summary>
18180 Send and receive telnetd_client packets.
18181 </summary>
18182 @@ -63947,7 +64567,7 @@ Domain allowed access.
18183 </param>
18184 <infoflow type="both" weight="10"/>
18185 </interface>
18186 -<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="86860">
18187 +<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="87281">
18188 <summary>
18189 Do not audit attempts to send and receive telnetd_client packets.
18190 </summary>
18191 @@ -63958,7 +64578,7 @@ Domain to not audit.
18192 </param>
18193 <infoflow type="none"/>
18194 </interface>
18195 -<interface name="corenet_relabelto_telnetd_client_packets" lineno="86875">
18196 +<interface name="corenet_relabelto_telnetd_client_packets" lineno="87296">
18197 <summary>
18198 Relabel packets to telnetd_client the packet type.
18199 </summary>
18200 @@ -63968,7 +64588,7 @@ Domain allowed access.
18201 </summary>
18202 </param>
18203 </interface>
18204 -<interface name="corenet_send_telnetd_server_packets" lineno="86895">
18205 +<interface name="corenet_send_telnetd_server_packets" lineno="87316">
18206 <summary>
18207 Send telnetd_server packets.
18208 </summary>
18209 @@ -63979,7 +64599,7 @@ Domain allowed access.
18210 </param>
18211 <infoflow type="write" weight="10"/>
18212 </interface>
18213 -<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="86914">
18214 +<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="87335">
18215 <summary>
18216 Do not audit attempts to send telnetd_server packets.
18217 </summary>
18218 @@ -63990,7 +64610,7 @@ Domain to not audit.
18219 </param>
18220 <infoflow type="none"/>
18221 </interface>
18222 -<interface name="corenet_receive_telnetd_server_packets" lineno="86933">
18223 +<interface name="corenet_receive_telnetd_server_packets" lineno="87354">
18224 <summary>
18225 Receive telnetd_server packets.
18226 </summary>
18227 @@ -64001,7 +64621,7 @@ Domain allowed access.
18228 </param>
18229 <infoflow type="read" weight="10"/>
18230 </interface>
18231 -<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="86952">
18232 +<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="87373">
18233 <summary>
18234 Do not audit attempts to receive telnetd_server packets.
18235 </summary>
18236 @@ -64012,7 +64632,7 @@ Domain allowed access.
18237 </param>
18238 <infoflow type="none"/>
18239 </interface>
18240 -<interface name="corenet_sendrecv_telnetd_server_packets" lineno="86971">
18241 +<interface name="corenet_sendrecv_telnetd_server_packets" lineno="87392">
18242 <summary>
18243 Send and receive telnetd_server packets.
18244 </summary>
18245 @@ -64023,7 +64643,7 @@ Domain allowed access.
18246 </param>
18247 <infoflow type="both" weight="10"/>
18248 </interface>
18249 -<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="86987">
18250 +<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="87408">
18251 <summary>
18252 Do not audit attempts to send and receive telnetd_server packets.
18253 </summary>
18254 @@ -64034,7 +64654,7 @@ Domain to not audit.
18255 </param>
18256 <infoflow type="none"/>
18257 </interface>
18258 -<interface name="corenet_relabelto_telnetd_server_packets" lineno="87002">
18259 +<interface name="corenet_relabelto_telnetd_server_packets" lineno="87423">
18260 <summary>
18261 Relabel packets to telnetd_server the packet type.
18262 </summary>
18263 @@ -64044,7 +64664,7 @@ Domain allowed access.
18264 </summary>
18265 </param>
18266 </interface>
18267 -<interface name="corenet_tcp_sendrecv_tftp_port" lineno="87024">
18268 +<interface name="corenet_tcp_sendrecv_tftp_port" lineno="87445">
18269 <summary>
18270 Send and receive TCP traffic on the tftp port.
18271 </summary>
18272 @@ -64055,7 +64675,7 @@ Domain allowed access.
18273 </param>
18274 <infoflow type="both" weight="10"/>
18275 </interface>
18276 -<interface name="corenet_udp_send_tftp_port" lineno="87039">
18277 +<interface name="corenet_udp_send_tftp_port" lineno="87460">
18278 <summary>
18279 Send UDP traffic on the tftp port.
18280 </summary>
18281 @@ -64066,7 +64686,7 @@ Domain allowed access.
18282 </param>
18283 <infoflow type="write" weight="10"/>
18284 </interface>
18285 -<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="87054">
18286 +<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="87475">
18287 <summary>
18288 Do not audit attempts to send UDP traffic on the tftp port.
18289 </summary>
18290 @@ -64077,7 +64697,7 @@ Domain to not audit.
18291 </param>
18292 <infoflow type="none"/>
18293 </interface>
18294 -<interface name="corenet_udp_receive_tftp_port" lineno="87069">
18295 +<interface name="corenet_udp_receive_tftp_port" lineno="87490">
18296 <summary>
18297 Receive UDP traffic on the tftp port.
18298 </summary>
18299 @@ -64088,7 +64708,7 @@ Domain allowed access.
18300 </param>
18301 <infoflow type="read" weight="10"/>
18302 </interface>
18303 -<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="87084">
18304 +<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="87505">
18305 <summary>
18306 Do not audit attempts to receive UDP traffic on the tftp port.
18307 </summary>
18308 @@ -64099,7 +64719,7 @@ Domain to not audit.
18309 </param>
18310 <infoflow type="none"/>
18311 </interface>
18312 -<interface name="corenet_udp_sendrecv_tftp_port" lineno="87099">
18313 +<interface name="corenet_udp_sendrecv_tftp_port" lineno="87520">
18314 <summary>
18315 Send and receive UDP traffic on the tftp port.
18316 </summary>
18317 @@ -64110,7 +64730,7 @@ Domain allowed access.
18318 </param>
18319 <infoflow type="both" weight="10"/>
18320 </interface>
18321 -<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="87115">
18322 +<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="87536">
18323 <summary>
18324 Do not audit attempts to send and receive
18325 UDP traffic on the tftp port.
18326 @@ -64122,7 +64742,7 @@ Domain to not audit.
18327 </param>
18328 <infoflow type="none"/>
18329 </interface>
18330 -<interface name="corenet_tcp_bind_tftp_port" lineno="87130">
18331 +<interface name="corenet_tcp_bind_tftp_port" lineno="87551">
18332 <summary>
18333 Bind TCP sockets to the tftp port.
18334 </summary>
18335 @@ -64133,7 +64753,7 @@ Domain allowed access.
18336 </param>
18337 <infoflow type="none"/>
18338 </interface>
18339 -<interface name="corenet_udp_bind_tftp_port" lineno="87150">
18340 +<interface name="corenet_udp_bind_tftp_port" lineno="87571">
18341 <summary>
18342 Bind UDP sockets to the tftp port.
18343 </summary>
18344 @@ -64144,7 +64764,7 @@ Domain allowed access.
18345 </param>
18346 <infoflow type="none"/>
18347 </interface>
18348 -<interface name="corenet_tcp_connect_tftp_port" lineno="87169">
18349 +<interface name="corenet_tcp_connect_tftp_port" lineno="87590">
18350 <summary>
18351 Make a TCP connection to the tftp port.
18352 </summary>
18353 @@ -64154,7 +64774,7 @@ Domain allowed access.
18354 </summary>
18355 </param>
18356 </interface>
18357 -<interface name="corenet_send_tftp_client_packets" lineno="87189">
18358 +<interface name="corenet_send_tftp_client_packets" lineno="87610">
18359 <summary>
18360 Send tftp_client packets.
18361 </summary>
18362 @@ -64165,7 +64785,7 @@ Domain allowed access.
18363 </param>
18364 <infoflow type="write" weight="10"/>
18365 </interface>
18366 -<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="87208">
18367 +<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="87629">
18368 <summary>
18369 Do not audit attempts to send tftp_client packets.
18370 </summary>
18371 @@ -64176,7 +64796,7 @@ Domain to not audit.
18372 </param>
18373 <infoflow type="none"/>
18374 </interface>
18375 -<interface name="corenet_receive_tftp_client_packets" lineno="87227">
18376 +<interface name="corenet_receive_tftp_client_packets" lineno="87648">
18377 <summary>
18378 Receive tftp_client packets.
18379 </summary>
18380 @@ -64187,7 +64807,7 @@ Domain allowed access.
18381 </param>
18382 <infoflow type="read" weight="10"/>
18383 </interface>
18384 -<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="87246">
18385 +<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="87667">
18386 <summary>
18387 Do not audit attempts to receive tftp_client packets.
18388 </summary>
18389 @@ -64198,7 +64818,7 @@ Domain allowed access.
18390 </param>
18391 <infoflow type="none"/>
18392 </interface>
18393 -<interface name="corenet_sendrecv_tftp_client_packets" lineno="87265">
18394 +<interface name="corenet_sendrecv_tftp_client_packets" lineno="87686">
18395 <summary>
18396 Send and receive tftp_client packets.
18397 </summary>
18398 @@ -64209,7 +64829,7 @@ Domain allowed access.
18399 </param>
18400 <infoflow type="both" weight="10"/>
18401 </interface>
18402 -<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="87281">
18403 +<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="87702">
18404 <summary>
18405 Do not audit attempts to send and receive tftp_client packets.
18406 </summary>
18407 @@ -64220,7 +64840,7 @@ Domain to not audit.
18408 </param>
18409 <infoflow type="none"/>
18410 </interface>
18411 -<interface name="corenet_relabelto_tftp_client_packets" lineno="87296">
18412 +<interface name="corenet_relabelto_tftp_client_packets" lineno="87717">
18413 <summary>
18414 Relabel packets to tftp_client the packet type.
18415 </summary>
18416 @@ -64230,7 +64850,7 @@ Domain allowed access.
18417 </summary>
18418 </param>
18419 </interface>
18420 -<interface name="corenet_send_tftp_server_packets" lineno="87316">
18421 +<interface name="corenet_send_tftp_server_packets" lineno="87737">
18422 <summary>
18423 Send tftp_server packets.
18424 </summary>
18425 @@ -64241,7 +64861,7 @@ Domain allowed access.
18426 </param>
18427 <infoflow type="write" weight="10"/>
18428 </interface>
18429 -<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="87335">
18430 +<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="87756">
18431 <summary>
18432 Do not audit attempts to send tftp_server packets.
18433 </summary>
18434 @@ -64252,7 +64872,7 @@ Domain to not audit.
18435 </param>
18436 <infoflow type="none"/>
18437 </interface>
18438 -<interface name="corenet_receive_tftp_server_packets" lineno="87354">
18439 +<interface name="corenet_receive_tftp_server_packets" lineno="87775">
18440 <summary>
18441 Receive tftp_server packets.
18442 </summary>
18443 @@ -64263,7 +64883,7 @@ Domain allowed access.
18444 </param>
18445 <infoflow type="read" weight="10"/>
18446 </interface>
18447 -<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="87373">
18448 +<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="87794">
18449 <summary>
18450 Do not audit attempts to receive tftp_server packets.
18451 </summary>
18452 @@ -64274,7 +64894,7 @@ Domain allowed access.
18453 </param>
18454 <infoflow type="none"/>
18455 </interface>
18456 -<interface name="corenet_sendrecv_tftp_server_packets" lineno="87392">
18457 +<interface name="corenet_sendrecv_tftp_server_packets" lineno="87813">
18458 <summary>
18459 Send and receive tftp_server packets.
18460 </summary>
18461 @@ -64285,7 +64905,7 @@ Domain allowed access.
18462 </param>
18463 <infoflow type="both" weight="10"/>
18464 </interface>
18465 -<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="87408">
18466 +<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="87829">
18467 <summary>
18468 Do not audit attempts to send and receive tftp_server packets.
18469 </summary>
18470 @@ -64296,7 +64916,7 @@ Domain to not audit.
18471 </param>
18472 <infoflow type="none"/>
18473 </interface>
18474 -<interface name="corenet_relabelto_tftp_server_packets" lineno="87423">
18475 +<interface name="corenet_relabelto_tftp_server_packets" lineno="87844">
18476 <summary>
18477 Relabel packets to tftp_server the packet type.
18478 </summary>
18479 @@ -64306,7 +64926,7 @@ Domain allowed access.
18480 </summary>
18481 </param>
18482 </interface>
18483 -<interface name="corenet_tcp_sendrecv_tor_port" lineno="87445">
18484 +<interface name="corenet_tcp_sendrecv_tor_port" lineno="87866">
18485 <summary>
18486 Send and receive TCP traffic on the tor port.
18487 </summary>
18488 @@ -64317,7 +64937,7 @@ Domain allowed access.
18489 </param>
18490 <infoflow type="both" weight="10"/>
18491 </interface>
18492 -<interface name="corenet_udp_send_tor_port" lineno="87460">
18493 +<interface name="corenet_udp_send_tor_port" lineno="87881">
18494 <summary>
18495 Send UDP traffic on the tor port.
18496 </summary>
18497 @@ -64328,7 +64948,7 @@ Domain allowed access.
18498 </param>
18499 <infoflow type="write" weight="10"/>
18500 </interface>
18501 -<interface name="corenet_dontaudit_udp_send_tor_port" lineno="87475">
18502 +<interface name="corenet_dontaudit_udp_send_tor_port" lineno="87896">
18503 <summary>
18504 Do not audit attempts to send UDP traffic on the tor port.
18505 </summary>
18506 @@ -64339,7 +64959,7 @@ Domain to not audit.
18507 </param>
18508 <infoflow type="none"/>
18509 </interface>
18510 -<interface name="corenet_udp_receive_tor_port" lineno="87490">
18511 +<interface name="corenet_udp_receive_tor_port" lineno="87911">
18512 <summary>
18513 Receive UDP traffic on the tor port.
18514 </summary>
18515 @@ -64350,7 +64970,7 @@ Domain allowed access.
18516 </param>
18517 <infoflow type="read" weight="10"/>
18518 </interface>
18519 -<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="87505">
18520 +<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="87926">
18521 <summary>
18522 Do not audit attempts to receive UDP traffic on the tor port.
18523 </summary>
18524 @@ -64361,7 +64981,7 @@ Domain to not audit.
18525 </param>
18526 <infoflow type="none"/>
18527 </interface>
18528 -<interface name="corenet_udp_sendrecv_tor_port" lineno="87520">
18529 +<interface name="corenet_udp_sendrecv_tor_port" lineno="87941">
18530 <summary>
18531 Send and receive UDP traffic on the tor port.
18532 </summary>
18533 @@ -64372,7 +64992,7 @@ Domain allowed access.
18534 </param>
18535 <infoflow type="both" weight="10"/>
18536 </interface>
18537 -<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="87536">
18538 +<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="87957">
18539 <summary>
18540 Do not audit attempts to send and receive
18541 UDP traffic on the tor port.
18542 @@ -64384,7 +65004,7 @@ Domain to not audit.
18543 </param>
18544 <infoflow type="none"/>
18545 </interface>
18546 -<interface name="corenet_tcp_bind_tor_port" lineno="87551">
18547 +<interface name="corenet_tcp_bind_tor_port" lineno="87972">
18548 <summary>
18549 Bind TCP sockets to the tor port.
18550 </summary>
18551 @@ -64395,7 +65015,7 @@ Domain allowed access.
18552 </param>
18553 <infoflow type="none"/>
18554 </interface>
18555 -<interface name="corenet_udp_bind_tor_port" lineno="87571">
18556 +<interface name="corenet_udp_bind_tor_port" lineno="87992">
18557 <summary>
18558 Bind UDP sockets to the tor port.
18559 </summary>
18560 @@ -64406,7 +65026,7 @@ Domain allowed access.
18561 </param>
18562 <infoflow type="none"/>
18563 </interface>
18564 -<interface name="corenet_tcp_connect_tor_port" lineno="87590">
18565 +<interface name="corenet_tcp_connect_tor_port" lineno="88011">
18566 <summary>
18567 Make a TCP connection to the tor port.
18568 </summary>
18569 @@ -64416,7 +65036,7 @@ Domain allowed access.
18570 </summary>
18571 </param>
18572 </interface>
18573 -<interface name="corenet_send_tor_client_packets" lineno="87610">
18574 +<interface name="corenet_send_tor_client_packets" lineno="88031">
18575 <summary>
18576 Send tor_client packets.
18577 </summary>
18578 @@ -64427,7 +65047,7 @@ Domain allowed access.
18579 </param>
18580 <infoflow type="write" weight="10"/>
18581 </interface>
18582 -<interface name="corenet_dontaudit_send_tor_client_packets" lineno="87629">
18583 +<interface name="corenet_dontaudit_send_tor_client_packets" lineno="88050">
18584 <summary>
18585 Do not audit attempts to send tor_client packets.
18586 </summary>
18587 @@ -64438,7 +65058,7 @@ Domain to not audit.
18588 </param>
18589 <infoflow type="none"/>
18590 </interface>
18591 -<interface name="corenet_receive_tor_client_packets" lineno="87648">
18592 +<interface name="corenet_receive_tor_client_packets" lineno="88069">
18593 <summary>
18594 Receive tor_client packets.
18595 </summary>
18596 @@ -64449,7 +65069,7 @@ Domain allowed access.
18597 </param>
18598 <infoflow type="read" weight="10"/>
18599 </interface>
18600 -<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="87667">
18601 +<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="88088">
18602 <summary>
18603 Do not audit attempts to receive tor_client packets.
18604 </summary>
18605 @@ -64460,7 +65080,7 @@ Domain allowed access.
18606 </param>
18607 <infoflow type="none"/>
18608 </interface>
18609 -<interface name="corenet_sendrecv_tor_client_packets" lineno="87686">
18610 +<interface name="corenet_sendrecv_tor_client_packets" lineno="88107">
18611 <summary>
18612 Send and receive tor_client packets.
18613 </summary>
18614 @@ -64471,7 +65091,7 @@ Domain allowed access.
18615 </param>
18616 <infoflow type="both" weight="10"/>
18617 </interface>
18618 -<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="87702">
18619 +<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="88123">
18620 <summary>
18621 Do not audit attempts to send and receive tor_client packets.
18622 </summary>
18623 @@ -64482,7 +65102,7 @@ Domain to not audit.
18624 </param>
18625 <infoflow type="none"/>
18626 </interface>
18627 -<interface name="corenet_relabelto_tor_client_packets" lineno="87717">
18628 +<interface name="corenet_relabelto_tor_client_packets" lineno="88138">
18629 <summary>
18630 Relabel packets to tor_client the packet type.
18631 </summary>
18632 @@ -64492,7 +65112,7 @@ Domain allowed access.
18633 </summary>
18634 </param>
18635 </interface>
18636 -<interface name="corenet_send_tor_server_packets" lineno="87737">
18637 +<interface name="corenet_send_tor_server_packets" lineno="88158">
18638 <summary>
18639 Send tor_server packets.
18640 </summary>
18641 @@ -64503,7 +65123,7 @@ Domain allowed access.
18642 </param>
18643 <infoflow type="write" weight="10"/>
18644 </interface>
18645 -<interface name="corenet_dontaudit_send_tor_server_packets" lineno="87756">
18646 +<interface name="corenet_dontaudit_send_tor_server_packets" lineno="88177">
18647 <summary>
18648 Do not audit attempts to send tor_server packets.
18649 </summary>
18650 @@ -64514,7 +65134,7 @@ Domain to not audit.
18651 </param>
18652 <infoflow type="none"/>
18653 </interface>
18654 -<interface name="corenet_receive_tor_server_packets" lineno="87775">
18655 +<interface name="corenet_receive_tor_server_packets" lineno="88196">
18656 <summary>
18657 Receive tor_server packets.
18658 </summary>
18659 @@ -64525,7 +65145,7 @@ Domain allowed access.
18660 </param>
18661 <infoflow type="read" weight="10"/>
18662 </interface>
18663 -<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="87794">
18664 +<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="88215">
18665 <summary>
18666 Do not audit attempts to receive tor_server packets.
18667 </summary>
18668 @@ -64536,7 +65156,7 @@ Domain allowed access.
18669 </param>
18670 <infoflow type="none"/>
18671 </interface>
18672 -<interface name="corenet_sendrecv_tor_server_packets" lineno="87813">
18673 +<interface name="corenet_sendrecv_tor_server_packets" lineno="88234">
18674 <summary>
18675 Send and receive tor_server packets.
18676 </summary>
18677 @@ -64547,7 +65167,7 @@ Domain allowed access.
18678 </param>
18679 <infoflow type="both" weight="10"/>
18680 </interface>
18681 -<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="87829">
18682 +<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="88250">
18683 <summary>
18684 Do not audit attempts to send and receive tor_server packets.
18685 </summary>
18686 @@ -64558,7 +65178,7 @@ Domain to not audit.
18687 </param>
18688 <infoflow type="none"/>
18689 </interface>
18690 -<interface name="corenet_relabelto_tor_server_packets" lineno="87844">
18691 +<interface name="corenet_relabelto_tor_server_packets" lineno="88265">
18692 <summary>
18693 Relabel packets to tor_server the packet type.
18694 </summary>
18695 @@ -64568,7 +65188,7 @@ Domain allowed access.
18696 </summary>
18697 </param>
18698 </interface>
18699 -<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="87866">
18700 +<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="88287">
18701 <summary>
18702 Send and receive TCP traffic on the traceroute port.
18703 </summary>
18704 @@ -64579,7 +65199,7 @@ Domain allowed access.
18705 </param>
18706 <infoflow type="both" weight="10"/>
18707 </interface>
18708 -<interface name="corenet_udp_send_traceroute_port" lineno="87881">
18709 +<interface name="corenet_udp_send_traceroute_port" lineno="88302">
18710 <summary>
18711 Send UDP traffic on the traceroute port.
18712 </summary>
18713 @@ -64590,7 +65210,7 @@ Domain allowed access.
18714 </param>
18715 <infoflow type="write" weight="10"/>
18716 </interface>
18717 -<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="87896">
18718 +<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="88317">
18719 <summary>
18720 Do not audit attempts to send UDP traffic on the traceroute port.
18721 </summary>
18722 @@ -64601,7 +65221,7 @@ Domain to not audit.
18723 </param>
18724 <infoflow type="none"/>
18725 </interface>
18726 -<interface name="corenet_udp_receive_traceroute_port" lineno="87911">
18727 +<interface name="corenet_udp_receive_traceroute_port" lineno="88332">
18728 <summary>
18729 Receive UDP traffic on the traceroute port.
18730 </summary>
18731 @@ -64612,7 +65232,7 @@ Domain allowed access.
18732 </param>
18733 <infoflow type="read" weight="10"/>
18734 </interface>
18735 -<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="87926">
18736 +<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="88347">
18737 <summary>
18738 Do not audit attempts to receive UDP traffic on the traceroute port.
18739 </summary>
18740 @@ -64623,7 +65243,7 @@ Domain to not audit.
18741 </param>
18742 <infoflow type="none"/>
18743 </interface>
18744 -<interface name="corenet_udp_sendrecv_traceroute_port" lineno="87941">
18745 +<interface name="corenet_udp_sendrecv_traceroute_port" lineno="88362">
18746 <summary>
18747 Send and receive UDP traffic on the traceroute port.
18748 </summary>
18749 @@ -64634,7 +65254,7 @@ Domain allowed access.
18750 </param>
18751 <infoflow type="both" weight="10"/>
18752 </interface>
18753 -<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="87957">
18754 +<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="88378">
18755 <summary>
18756 Do not audit attempts to send and receive
18757 UDP traffic on the traceroute port.
18758 @@ -64646,7 +65266,7 @@ Domain to not audit.
18759 </param>
18760 <infoflow type="none"/>
18761 </interface>
18762 -<interface name="corenet_tcp_bind_traceroute_port" lineno="87972">
18763 +<interface name="corenet_tcp_bind_traceroute_port" lineno="88393">
18764 <summary>
18765 Bind TCP sockets to the traceroute port.
18766 </summary>
18767 @@ -64657,7 +65277,7 @@ Domain allowed access.
18768 </param>
18769 <infoflow type="none"/>
18770 </interface>
18771 -<interface name="corenet_udp_bind_traceroute_port" lineno="87992">
18772 +<interface name="corenet_udp_bind_traceroute_port" lineno="88413">
18773 <summary>
18774 Bind UDP sockets to the traceroute port.
18775 </summary>
18776 @@ -64668,7 +65288,7 @@ Domain allowed access.
18777 </param>
18778 <infoflow type="none"/>
18779 </interface>
18780 -<interface name="corenet_tcp_connect_traceroute_port" lineno="88011">
18781 +<interface name="corenet_tcp_connect_traceroute_port" lineno="88432">
18782 <summary>
18783 Make a TCP connection to the traceroute port.
18784 </summary>
18785 @@ -64678,7 +65298,7 @@ Domain allowed access.
18786 </summary>
18787 </param>
18788 </interface>
18789 -<interface name="corenet_send_traceroute_client_packets" lineno="88031">
18790 +<interface name="corenet_send_traceroute_client_packets" lineno="88452">
18791 <summary>
18792 Send traceroute_client packets.
18793 </summary>
18794 @@ -64689,7 +65309,7 @@ Domain allowed access.
18795 </param>
18796 <infoflow type="write" weight="10"/>
18797 </interface>
18798 -<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="88050">
18799 +<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="88471">
18800 <summary>
18801 Do not audit attempts to send traceroute_client packets.
18802 </summary>
18803 @@ -64700,7 +65320,7 @@ Domain to not audit.
18804 </param>
18805 <infoflow type="none"/>
18806 </interface>
18807 -<interface name="corenet_receive_traceroute_client_packets" lineno="88069">
18808 +<interface name="corenet_receive_traceroute_client_packets" lineno="88490">
18809 <summary>
18810 Receive traceroute_client packets.
18811 </summary>
18812 @@ -64711,7 +65331,7 @@ Domain allowed access.
18813 </param>
18814 <infoflow type="read" weight="10"/>
18815 </interface>
18816 -<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="88088">
18817 +<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="88509">
18818 <summary>
18819 Do not audit attempts to receive traceroute_client packets.
18820 </summary>
18821 @@ -64722,7 +65342,7 @@ Domain allowed access.
18822 </param>
18823 <infoflow type="none"/>
18824 </interface>
18825 -<interface name="corenet_sendrecv_traceroute_client_packets" lineno="88107">
18826 +<interface name="corenet_sendrecv_traceroute_client_packets" lineno="88528">
18827 <summary>
18828 Send and receive traceroute_client packets.
18829 </summary>
18830 @@ -64733,7 +65353,7 @@ Domain allowed access.
18831 </param>
18832 <infoflow type="both" weight="10"/>
18833 </interface>
18834 -<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="88123">
18835 +<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="88544">
18836 <summary>
18837 Do not audit attempts to send and receive traceroute_client packets.
18838 </summary>
18839 @@ -64744,7 +65364,7 @@ Domain to not audit.
18840 </param>
18841 <infoflow type="none"/>
18842 </interface>
18843 -<interface name="corenet_relabelto_traceroute_client_packets" lineno="88138">
18844 +<interface name="corenet_relabelto_traceroute_client_packets" lineno="88559">
18845 <summary>
18846 Relabel packets to traceroute_client the packet type.
18847 </summary>
18848 @@ -64754,7 +65374,7 @@ Domain allowed access.
18849 </summary>
18850 </param>
18851 </interface>
18852 -<interface name="corenet_send_traceroute_server_packets" lineno="88158">
18853 +<interface name="corenet_send_traceroute_server_packets" lineno="88579">
18854 <summary>
18855 Send traceroute_server packets.
18856 </summary>
18857 @@ -64765,7 +65385,7 @@ Domain allowed access.
18858 </param>
18859 <infoflow type="write" weight="10"/>
18860 </interface>
18861 -<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="88177">
18862 +<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="88598">
18863 <summary>
18864 Do not audit attempts to send traceroute_server packets.
18865 </summary>
18866 @@ -64776,7 +65396,7 @@ Domain to not audit.
18867 </param>
18868 <infoflow type="none"/>
18869 </interface>
18870 -<interface name="corenet_receive_traceroute_server_packets" lineno="88196">
18871 +<interface name="corenet_receive_traceroute_server_packets" lineno="88617">
18872 <summary>
18873 Receive traceroute_server packets.
18874 </summary>
18875 @@ -64787,7 +65407,7 @@ Domain allowed access.
18876 </param>
18877 <infoflow type="read" weight="10"/>
18878 </interface>
18879 -<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="88215">
18880 +<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="88636">
18881 <summary>
18882 Do not audit attempts to receive traceroute_server packets.
18883 </summary>
18884 @@ -64798,7 +65418,7 @@ Domain allowed access.
18885 </param>
18886 <infoflow type="none"/>
18887 </interface>
18888 -<interface name="corenet_sendrecv_traceroute_server_packets" lineno="88234">
18889 +<interface name="corenet_sendrecv_traceroute_server_packets" lineno="88655">
18890 <summary>
18891 Send and receive traceroute_server packets.
18892 </summary>
18893 @@ -64809,7 +65429,7 @@ Domain allowed access.
18894 </param>
18895 <infoflow type="both" weight="10"/>
18896 </interface>
18897 -<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="88250">
18898 +<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="88671">
18899 <summary>
18900 Do not audit attempts to send and receive traceroute_server packets.
18901 </summary>
18902 @@ -64820,7 +65440,7 @@ Domain to not audit.
18903 </param>
18904 <infoflow type="none"/>
18905 </interface>
18906 -<interface name="corenet_relabelto_traceroute_server_packets" lineno="88265">
18907 +<interface name="corenet_relabelto_traceroute_server_packets" lineno="88686">
18908 <summary>
18909 Relabel packets to traceroute_server the packet type.
18910 </summary>
18911 @@ -64830,7 +65450,7 @@ Domain allowed access.
18912 </summary>
18913 </param>
18914 </interface>
18915 -<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="88287">
18916 +<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="88708">
18917 <summary>
18918 Send and receive TCP traffic on the transproxy port.
18919 </summary>
18920 @@ -64841,7 +65461,7 @@ Domain allowed access.
18921 </param>
18922 <infoflow type="both" weight="10"/>
18923 </interface>
18924 -<interface name="corenet_udp_send_transproxy_port" lineno="88302">
18925 +<interface name="corenet_udp_send_transproxy_port" lineno="88723">
18926 <summary>
18927 Send UDP traffic on the transproxy port.
18928 </summary>
18929 @@ -64852,7 +65472,7 @@ Domain allowed access.
18930 </param>
18931 <infoflow type="write" weight="10"/>
18932 </interface>
18933 -<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="88317">
18934 +<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="88738">
18935 <summary>
18936 Do not audit attempts to send UDP traffic on the transproxy port.
18937 </summary>
18938 @@ -64863,7 +65483,7 @@ Domain to not audit.
18939 </param>
18940 <infoflow type="none"/>
18941 </interface>
18942 -<interface name="corenet_udp_receive_transproxy_port" lineno="88332">
18943 +<interface name="corenet_udp_receive_transproxy_port" lineno="88753">
18944 <summary>
18945 Receive UDP traffic on the transproxy port.
18946 </summary>
18947 @@ -64874,7 +65494,7 @@ Domain allowed access.
18948 </param>
18949 <infoflow type="read" weight="10"/>
18950 </interface>
18951 -<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="88347">
18952 +<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="88768">
18953 <summary>
18954 Do not audit attempts to receive UDP traffic on the transproxy port.
18955 </summary>
18956 @@ -64885,7 +65505,7 @@ Domain to not audit.
18957 </param>
18958 <infoflow type="none"/>
18959 </interface>
18960 -<interface name="corenet_udp_sendrecv_transproxy_port" lineno="88362">
18961 +<interface name="corenet_udp_sendrecv_transproxy_port" lineno="88783">
18962 <summary>
18963 Send and receive UDP traffic on the transproxy port.
18964 </summary>
18965 @@ -64896,7 +65516,7 @@ Domain allowed access.
18966 </param>
18967 <infoflow type="both" weight="10"/>
18968 </interface>
18969 -<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="88378">
18970 +<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="88799">
18971 <summary>
18972 Do not audit attempts to send and receive
18973 UDP traffic on the transproxy port.
18974 @@ -64908,7 +65528,7 @@ Domain to not audit.
18975 </param>
18976 <infoflow type="none"/>
18977 </interface>
18978 -<interface name="corenet_tcp_bind_transproxy_port" lineno="88393">
18979 +<interface name="corenet_tcp_bind_transproxy_port" lineno="88814">
18980 <summary>
18981 Bind TCP sockets to the transproxy port.
18982 </summary>
18983 @@ -64919,7 +65539,7 @@ Domain allowed access.
18984 </param>
18985 <infoflow type="none"/>
18986 </interface>
18987 -<interface name="corenet_udp_bind_transproxy_port" lineno="88413">
18988 +<interface name="corenet_udp_bind_transproxy_port" lineno="88834">
18989 <summary>
18990 Bind UDP sockets to the transproxy port.
18991 </summary>
18992 @@ -64930,7 +65550,7 @@ Domain allowed access.
18993 </param>
18994 <infoflow type="none"/>
18995 </interface>
18996 -<interface name="corenet_tcp_connect_transproxy_port" lineno="88432">
18997 +<interface name="corenet_tcp_connect_transproxy_port" lineno="88853">
18998 <summary>
18999 Make a TCP connection to the transproxy port.
19000 </summary>
19001 @@ -64940,7 +65560,7 @@ Domain allowed access.
19002 </summary>
19003 </param>
19004 </interface>
19005 -<interface name="corenet_send_transproxy_client_packets" lineno="88452">
19006 +<interface name="corenet_send_transproxy_client_packets" lineno="88873">
19007 <summary>
19008 Send transproxy_client packets.
19009 </summary>
19010 @@ -64951,7 +65571,7 @@ Domain allowed access.
19011 </param>
19012 <infoflow type="write" weight="10"/>
19013 </interface>
19014 -<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88471">
19015 +<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88892">
19016 <summary>
19017 Do not audit attempts to send transproxy_client packets.
19018 </summary>
19019 @@ -64962,7 +65582,7 @@ Domain to not audit.
19020 </param>
19021 <infoflow type="none"/>
19022 </interface>
19023 -<interface name="corenet_receive_transproxy_client_packets" lineno="88490">
19024 +<interface name="corenet_receive_transproxy_client_packets" lineno="88911">
19025 <summary>
19026 Receive transproxy_client packets.
19027 </summary>
19028 @@ -64973,7 +65593,7 @@ Domain allowed access.
19029 </param>
19030 <infoflow type="read" weight="10"/>
19031 </interface>
19032 -<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88509">
19033 +<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88930">
19034 <summary>
19035 Do not audit attempts to receive transproxy_client packets.
19036 </summary>
19037 @@ -64984,7 +65604,7 @@ Domain allowed access.
19038 </param>
19039 <infoflow type="none"/>
19040 </interface>
19041 -<interface name="corenet_sendrecv_transproxy_client_packets" lineno="88528">
19042 +<interface name="corenet_sendrecv_transproxy_client_packets" lineno="88949">
19043 <summary>
19044 Send and receive transproxy_client packets.
19045 </summary>
19046 @@ -64995,7 +65615,7 @@ Domain allowed access.
19047 </param>
19048 <infoflow type="both" weight="10"/>
19049 </interface>
19050 -<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88544">
19051 +<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88965">
19052 <summary>
19053 Do not audit attempts to send and receive transproxy_client packets.
19054 </summary>
19055 @@ -65006,7 +65626,7 @@ Domain to not audit.
19056 </param>
19057 <infoflow type="none"/>
19058 </interface>
19059 -<interface name="corenet_relabelto_transproxy_client_packets" lineno="88559">
19060 +<interface name="corenet_relabelto_transproxy_client_packets" lineno="88980">
19061 <summary>
19062 Relabel packets to transproxy_client the packet type.
19063 </summary>
19064 @@ -65016,7 +65636,7 @@ Domain allowed access.
19065 </summary>
19066 </param>
19067 </interface>
19068 -<interface name="corenet_send_transproxy_server_packets" lineno="88579">
19069 +<interface name="corenet_send_transproxy_server_packets" lineno="89000">
19070 <summary>
19071 Send transproxy_server packets.
19072 </summary>
19073 @@ -65027,7 +65647,7 @@ Domain allowed access.
19074 </param>
19075 <infoflow type="write" weight="10"/>
19076 </interface>
19077 -<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="88598">
19078 +<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="89019">
19079 <summary>
19080 Do not audit attempts to send transproxy_server packets.
19081 </summary>
19082 @@ -65038,7 +65658,7 @@ Domain to not audit.
19083 </param>
19084 <infoflow type="none"/>
19085 </interface>
19086 -<interface name="corenet_receive_transproxy_server_packets" lineno="88617">
19087 +<interface name="corenet_receive_transproxy_server_packets" lineno="89038">
19088 <summary>
19089 Receive transproxy_server packets.
19090 </summary>
19091 @@ -65049,7 +65669,7 @@ Domain allowed access.
19092 </param>
19093 <infoflow type="read" weight="10"/>
19094 </interface>
19095 -<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="88636">
19096 +<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="89057">
19097 <summary>
19098 Do not audit attempts to receive transproxy_server packets.
19099 </summary>
19100 @@ -65060,7 +65680,7 @@ Domain allowed access.
19101 </param>
19102 <infoflow type="none"/>
19103 </interface>
19104 -<interface name="corenet_sendrecv_transproxy_server_packets" lineno="88655">
19105 +<interface name="corenet_sendrecv_transproxy_server_packets" lineno="89076">
19106 <summary>
19107 Send and receive transproxy_server packets.
19108 </summary>
19109 @@ -65071,7 +65691,7 @@ Domain allowed access.
19110 </param>
19111 <infoflow type="both" weight="10"/>
19112 </interface>
19113 -<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="88671">
19114 +<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="89092">
19115 <summary>
19116 Do not audit attempts to send and receive transproxy_server packets.
19117 </summary>
19118 @@ -65082,7 +65702,7 @@ Domain to not audit.
19119 </param>
19120 <infoflow type="none"/>
19121 </interface>
19122 -<interface name="corenet_relabelto_transproxy_server_packets" lineno="88686">
19123 +<interface name="corenet_relabelto_transproxy_server_packets" lineno="89107">
19124 <summary>
19125 Relabel packets to transproxy_server the packet type.
19126 </summary>
19127 @@ -65092,7 +65712,7 @@ Domain allowed access.
19128 </summary>
19129 </param>
19130 </interface>
19131 -<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="88708">
19132 +<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="89129">
19133 <summary>
19134 Send and receive TCP traffic on the trisoap port.
19135 </summary>
19136 @@ -65103,7 +65723,7 @@ Domain allowed access.
19137 </param>
19138 <infoflow type="both" weight="10"/>
19139 </interface>
19140 -<interface name="corenet_udp_send_trisoap_port" lineno="88723">
19141 +<interface name="corenet_udp_send_trisoap_port" lineno="89144">
19142 <summary>
19143 Send UDP traffic on the trisoap port.
19144 </summary>
19145 @@ -65114,7 +65734,7 @@ Domain allowed access.
19146 </param>
19147 <infoflow type="write" weight="10"/>
19148 </interface>
19149 -<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="88738">
19150 +<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="89159">
19151 <summary>
19152 Do not audit attempts to send UDP traffic on the trisoap port.
19153 </summary>
19154 @@ -65125,7 +65745,7 @@ Domain to not audit.
19155 </param>
19156 <infoflow type="none"/>
19157 </interface>
19158 -<interface name="corenet_udp_receive_trisoap_port" lineno="88753">
19159 +<interface name="corenet_udp_receive_trisoap_port" lineno="89174">
19160 <summary>
19161 Receive UDP traffic on the trisoap port.
19162 </summary>
19163 @@ -65136,7 +65756,7 @@ Domain allowed access.
19164 </param>
19165 <infoflow type="read" weight="10"/>
19166 </interface>
19167 -<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="88768">
19168 +<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="89189">
19169 <summary>
19170 Do not audit attempts to receive UDP traffic on the trisoap port.
19171 </summary>
19172 @@ -65147,7 +65767,7 @@ Domain to not audit.
19173 </param>
19174 <infoflow type="none"/>
19175 </interface>
19176 -<interface name="corenet_udp_sendrecv_trisoap_port" lineno="88783">
19177 +<interface name="corenet_udp_sendrecv_trisoap_port" lineno="89204">
19178 <summary>
19179 Send and receive UDP traffic on the trisoap port.
19180 </summary>
19181 @@ -65158,7 +65778,7 @@ Domain allowed access.
19182 </param>
19183 <infoflow type="both" weight="10"/>
19184 </interface>
19185 -<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="88799">
19186 +<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="89220">
19187 <summary>
19188 Do not audit attempts to send and receive
19189 UDP traffic on the trisoap port.
19190 @@ -65170,7 +65790,7 @@ Domain to not audit.
19191 </param>
19192 <infoflow type="none"/>
19193 </interface>
19194 -<interface name="corenet_tcp_bind_trisoap_port" lineno="88814">
19195 +<interface name="corenet_tcp_bind_trisoap_port" lineno="89235">
19196 <summary>
19197 Bind TCP sockets to the trisoap port.
19198 </summary>
19199 @@ -65181,7 +65801,7 @@ Domain allowed access.
19200 </param>
19201 <infoflow type="none"/>
19202 </interface>
19203 -<interface name="corenet_udp_bind_trisoap_port" lineno="88834">
19204 +<interface name="corenet_udp_bind_trisoap_port" lineno="89255">
19205 <summary>
19206 Bind UDP sockets to the trisoap port.
19207 </summary>
19208 @@ -65192,7 +65812,7 @@ Domain allowed access.
19209 </param>
19210 <infoflow type="none"/>
19211 </interface>
19212 -<interface name="corenet_tcp_connect_trisoap_port" lineno="88853">
19213 +<interface name="corenet_tcp_connect_trisoap_port" lineno="89274">
19214 <summary>
19215 Make a TCP connection to the trisoap port.
19216 </summary>
19217 @@ -65202,7 +65822,7 @@ Domain allowed access.
19218 </summary>
19219 </param>
19220 </interface>
19221 -<interface name="corenet_send_trisoap_client_packets" lineno="88873">
19222 +<interface name="corenet_send_trisoap_client_packets" lineno="89294">
19223 <summary>
19224 Send trisoap_client packets.
19225 </summary>
19226 @@ -65213,7 +65833,7 @@ Domain allowed access.
19227 </param>
19228 <infoflow type="write" weight="10"/>
19229 </interface>
19230 -<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="88892">
19231 +<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="89313">
19232 <summary>
19233 Do not audit attempts to send trisoap_client packets.
19234 </summary>
19235 @@ -65224,7 +65844,7 @@ Domain to not audit.
19236 </param>
19237 <infoflow type="none"/>
19238 </interface>
19239 -<interface name="corenet_receive_trisoap_client_packets" lineno="88911">
19240 +<interface name="corenet_receive_trisoap_client_packets" lineno="89332">
19241 <summary>
19242 Receive trisoap_client packets.
19243 </summary>
19244 @@ -65235,7 +65855,7 @@ Domain allowed access.
19245 </param>
19246 <infoflow type="read" weight="10"/>
19247 </interface>
19248 -<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="88930">
19249 +<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="89351">
19250 <summary>
19251 Do not audit attempts to receive trisoap_client packets.
19252 </summary>
19253 @@ -65246,7 +65866,7 @@ Domain allowed access.
19254 </param>
19255 <infoflow type="none"/>
19256 </interface>
19257 -<interface name="corenet_sendrecv_trisoap_client_packets" lineno="88949">
19258 +<interface name="corenet_sendrecv_trisoap_client_packets" lineno="89370">
19259 <summary>
19260 Send and receive trisoap_client packets.
19261 </summary>
19262 @@ -65257,7 +65877,7 @@ Domain allowed access.
19263 </param>
19264 <infoflow type="both" weight="10"/>
19265 </interface>
19266 -<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="88965">
19267 +<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="89386">
19268 <summary>
19269 Do not audit attempts to send and receive trisoap_client packets.
19270 </summary>
19271 @@ -65268,7 +65888,7 @@ Domain to not audit.
19272 </param>
19273 <infoflow type="none"/>
19274 </interface>
19275 -<interface name="corenet_relabelto_trisoap_client_packets" lineno="88980">
19276 +<interface name="corenet_relabelto_trisoap_client_packets" lineno="89401">
19277 <summary>
19278 Relabel packets to trisoap_client the packet type.
19279 </summary>
19280 @@ -65278,7 +65898,7 @@ Domain allowed access.
19281 </summary>
19282 </param>
19283 </interface>
19284 -<interface name="corenet_send_trisoap_server_packets" lineno="89000">
19285 +<interface name="corenet_send_trisoap_server_packets" lineno="89421">
19286 <summary>
19287 Send trisoap_server packets.
19288 </summary>
19289 @@ -65289,7 +65909,7 @@ Domain allowed access.
19290 </param>
19291 <infoflow type="write" weight="10"/>
19292 </interface>
19293 -<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="89019">
19294 +<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="89440">
19295 <summary>
19296 Do not audit attempts to send trisoap_server packets.
19297 </summary>
19298 @@ -65300,7 +65920,7 @@ Domain to not audit.
19299 </param>
19300 <infoflow type="none"/>
19301 </interface>
19302 -<interface name="corenet_receive_trisoap_server_packets" lineno="89038">
19303 +<interface name="corenet_receive_trisoap_server_packets" lineno="89459">
19304 <summary>
19305 Receive trisoap_server packets.
19306 </summary>
19307 @@ -65311,7 +65931,7 @@ Domain allowed access.
19308 </param>
19309 <infoflow type="read" weight="10"/>
19310 </interface>
19311 -<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="89057">
19312 +<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="89478">
19313 <summary>
19314 Do not audit attempts to receive trisoap_server packets.
19315 </summary>
19316 @@ -65322,7 +65942,7 @@ Domain allowed access.
19317 </param>
19318 <infoflow type="none"/>
19319 </interface>
19320 -<interface name="corenet_sendrecv_trisoap_server_packets" lineno="89076">
19321 +<interface name="corenet_sendrecv_trisoap_server_packets" lineno="89497">
19322 <summary>
19323 Send and receive trisoap_server packets.
19324 </summary>
19325 @@ -65333,7 +65953,7 @@ Domain allowed access.
19326 </param>
19327 <infoflow type="both" weight="10"/>
19328 </interface>
19329 -<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="89092">
19330 +<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="89513">
19331 <summary>
19332 Do not audit attempts to send and receive trisoap_server packets.
19333 </summary>
19334 @@ -65344,7 +65964,7 @@ Domain to not audit.
19335 </param>
19336 <infoflow type="none"/>
19337 </interface>
19338 -<interface name="corenet_relabelto_trisoap_server_packets" lineno="89107">
19339 +<interface name="corenet_relabelto_trisoap_server_packets" lineno="89528">
19340 <summary>
19341 Relabel packets to trisoap_server the packet type.
19342 </summary>
19343 @@ -65354,7 +65974,7 @@ Domain allowed access.
19344 </summary>
19345 </param>
19346 </interface>
19347 -<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="89129">
19348 +<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="89550">
19349 <summary>
19350 Send and receive TCP traffic on the trivnet1 port.
19351 </summary>
19352 @@ -65365,7 +65985,7 @@ Domain allowed access.
19353 </param>
19354 <infoflow type="both" weight="10"/>
19355 </interface>
19356 -<interface name="corenet_udp_send_trivnet1_port" lineno="89144">
19357 +<interface name="corenet_udp_send_trivnet1_port" lineno="89565">
19358 <summary>
19359 Send UDP traffic on the trivnet1 port.
19360 </summary>
19361 @@ -65376,7 +65996,7 @@ Domain allowed access.
19362 </param>
19363 <infoflow type="write" weight="10"/>
19364 </interface>
19365 -<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="89159">
19366 +<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="89580">
19367 <summary>
19368 Do not audit attempts to send UDP traffic on the trivnet1 port.
19369 </summary>
19370 @@ -65387,7 +66007,7 @@ Domain to not audit.
19371 </param>
19372 <infoflow type="none"/>
19373 </interface>
19374 -<interface name="corenet_udp_receive_trivnet1_port" lineno="89174">
19375 +<interface name="corenet_udp_receive_trivnet1_port" lineno="89595">
19376 <summary>
19377 Receive UDP traffic on the trivnet1 port.
19378 </summary>
19379 @@ -65398,7 +66018,7 @@ Domain allowed access.
19380 </param>
19381 <infoflow type="read" weight="10"/>
19382 </interface>
19383 -<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="89189">
19384 +<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="89610">
19385 <summary>
19386 Do not audit attempts to receive UDP traffic on the trivnet1 port.
19387 </summary>
19388 @@ -65409,7 +66029,7 @@ Domain to not audit.
19389 </param>
19390 <infoflow type="none"/>
19391 </interface>
19392 -<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="89204">
19393 +<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="89625">
19394 <summary>
19395 Send and receive UDP traffic on the trivnet1 port.
19396 </summary>
19397 @@ -65420,7 +66040,7 @@ Domain allowed access.
19398 </param>
19399 <infoflow type="both" weight="10"/>
19400 </interface>
19401 -<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="89220">
19402 +<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="89641">
19403 <summary>
19404 Do not audit attempts to send and receive
19405 UDP traffic on the trivnet1 port.
19406 @@ -65432,7 +66052,7 @@ Domain to not audit.
19407 </param>
19408 <infoflow type="none"/>
19409 </interface>
19410 -<interface name="corenet_tcp_bind_trivnet1_port" lineno="89235">
19411 +<interface name="corenet_tcp_bind_trivnet1_port" lineno="89656">
19412 <summary>
19413 Bind TCP sockets to the trivnet1 port.
19414 </summary>
19415 @@ -65443,7 +66063,7 @@ Domain allowed access.
19416 </param>
19417 <infoflow type="none"/>
19418 </interface>
19419 -<interface name="corenet_udp_bind_trivnet1_port" lineno="89255">
19420 +<interface name="corenet_udp_bind_trivnet1_port" lineno="89676">
19421 <summary>
19422 Bind UDP sockets to the trivnet1 port.
19423 </summary>
19424 @@ -65454,7 +66074,7 @@ Domain allowed access.
19425 </param>
19426 <infoflow type="none"/>
19427 </interface>
19428 -<interface name="corenet_tcp_connect_trivnet1_port" lineno="89274">
19429 +<interface name="corenet_tcp_connect_trivnet1_port" lineno="89695">
19430 <summary>
19431 Make a TCP connection to the trivnet1 port.
19432 </summary>
19433 @@ -65464,7 +66084,7 @@ Domain allowed access.
19434 </summary>
19435 </param>
19436 </interface>
19437 -<interface name="corenet_send_trivnet1_client_packets" lineno="89294">
19438 +<interface name="corenet_send_trivnet1_client_packets" lineno="89715">
19439 <summary>
19440 Send trivnet1_client packets.
19441 </summary>
19442 @@ -65475,7 +66095,7 @@ Domain allowed access.
19443 </param>
19444 <infoflow type="write" weight="10"/>
19445 </interface>
19446 -<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="89313">
19447 +<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="89734">
19448 <summary>
19449 Do not audit attempts to send trivnet1_client packets.
19450 </summary>
19451 @@ -65486,7 +66106,7 @@ Domain to not audit.
19452 </param>
19453 <infoflow type="none"/>
19454 </interface>
19455 -<interface name="corenet_receive_trivnet1_client_packets" lineno="89332">
19456 +<interface name="corenet_receive_trivnet1_client_packets" lineno="89753">
19457 <summary>
19458 Receive trivnet1_client packets.
19459 </summary>
19460 @@ -65497,7 +66117,7 @@ Domain allowed access.
19461 </param>
19462 <infoflow type="read" weight="10"/>
19463 </interface>
19464 -<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="89351">
19465 +<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="89772">
19466 <summary>
19467 Do not audit attempts to receive trivnet1_client packets.
19468 </summary>
19469 @@ -65508,7 +66128,7 @@ Domain allowed access.
19470 </param>
19471 <infoflow type="none"/>
19472 </interface>
19473 -<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="89370">
19474 +<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="89791">
19475 <summary>
19476 Send and receive trivnet1_client packets.
19477 </summary>
19478 @@ -65519,7 +66139,7 @@ Domain allowed access.
19479 </param>
19480 <infoflow type="both" weight="10"/>
19481 </interface>
19482 -<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="89386">
19483 +<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="89807">
19484 <summary>
19485 Do not audit attempts to send and receive trivnet1_client packets.
19486 </summary>
19487 @@ -65530,7 +66150,7 @@ Domain to not audit.
19488 </param>
19489 <infoflow type="none"/>
19490 </interface>
19491 -<interface name="corenet_relabelto_trivnet1_client_packets" lineno="89401">
19492 +<interface name="corenet_relabelto_trivnet1_client_packets" lineno="89822">
19493 <summary>
19494 Relabel packets to trivnet1_client the packet type.
19495 </summary>
19496 @@ -65540,7 +66160,7 @@ Domain allowed access.
19497 </summary>
19498 </param>
19499 </interface>
19500 -<interface name="corenet_send_trivnet1_server_packets" lineno="89421">
19501 +<interface name="corenet_send_trivnet1_server_packets" lineno="89842">
19502 <summary>
19503 Send trivnet1_server packets.
19504 </summary>
19505 @@ -65551,7 +66171,7 @@ Domain allowed access.
19506 </param>
19507 <infoflow type="write" weight="10"/>
19508 </interface>
19509 -<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="89440">
19510 +<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="89861">
19511 <summary>
19512 Do not audit attempts to send trivnet1_server packets.
19513 </summary>
19514 @@ -65562,7 +66182,7 @@ Domain to not audit.
19515 </param>
19516 <infoflow type="none"/>
19517 </interface>
19518 -<interface name="corenet_receive_trivnet1_server_packets" lineno="89459">
19519 +<interface name="corenet_receive_trivnet1_server_packets" lineno="89880">
19520 <summary>
19521 Receive trivnet1_server packets.
19522 </summary>
19523 @@ -65573,7 +66193,7 @@ Domain allowed access.
19524 </param>
19525 <infoflow type="read" weight="10"/>
19526 </interface>
19527 -<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="89478">
19528 +<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="89899">
19529 <summary>
19530 Do not audit attempts to receive trivnet1_server packets.
19531 </summary>
19532 @@ -65584,7 +66204,7 @@ Domain allowed access.
19533 </param>
19534 <infoflow type="none"/>
19535 </interface>
19536 -<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="89497">
19537 +<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="89918">
19538 <summary>
19539 Send and receive trivnet1_server packets.
19540 </summary>
19541 @@ -65595,7 +66215,7 @@ Domain allowed access.
19542 </param>
19543 <infoflow type="both" weight="10"/>
19544 </interface>
19545 -<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="89513">
19546 +<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="89934">
19547 <summary>
19548 Do not audit attempts to send and receive trivnet1_server packets.
19549 </summary>
19550 @@ -65606,7 +66226,7 @@ Domain to not audit.
19551 </param>
19552 <infoflow type="none"/>
19553 </interface>
19554 -<interface name="corenet_relabelto_trivnet1_server_packets" lineno="89528">
19555 +<interface name="corenet_relabelto_trivnet1_server_packets" lineno="89949">
19556 <summary>
19557 Relabel packets to trivnet1_server the packet type.
19558 </summary>
19559 @@ -65616,7 +66236,7 @@ Domain allowed access.
19560 </summary>
19561 </param>
19562 </interface>
19563 -<interface name="corenet_tcp_sendrecv_ups_port" lineno="89550">
19564 +<interface name="corenet_tcp_sendrecv_ups_port" lineno="89971">
19565 <summary>
19566 Send and receive TCP traffic on the ups port.
19567 </summary>
19568 @@ -65627,7 +66247,7 @@ Domain allowed access.
19569 </param>
19570 <infoflow type="both" weight="10"/>
19571 </interface>
19572 -<interface name="corenet_udp_send_ups_port" lineno="89565">
19573 +<interface name="corenet_udp_send_ups_port" lineno="89986">
19574 <summary>
19575 Send UDP traffic on the ups port.
19576 </summary>
19577 @@ -65638,7 +66258,7 @@ Domain allowed access.
19578 </param>
19579 <infoflow type="write" weight="10"/>
19580 </interface>
19581 -<interface name="corenet_dontaudit_udp_send_ups_port" lineno="89580">
19582 +<interface name="corenet_dontaudit_udp_send_ups_port" lineno="90001">
19583 <summary>
19584 Do not audit attempts to send UDP traffic on the ups port.
19585 </summary>
19586 @@ -65649,7 +66269,7 @@ Domain to not audit.
19587 </param>
19588 <infoflow type="none"/>
19589 </interface>
19590 -<interface name="corenet_udp_receive_ups_port" lineno="89595">
19591 +<interface name="corenet_udp_receive_ups_port" lineno="90016">
19592 <summary>
19593 Receive UDP traffic on the ups port.
19594 </summary>
19595 @@ -65660,7 +66280,7 @@ Domain allowed access.
19596 </param>
19597 <infoflow type="read" weight="10"/>
19598 </interface>
19599 -<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="89610">
19600 +<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="90031">
19601 <summary>
19602 Do not audit attempts to receive UDP traffic on the ups port.
19603 </summary>
19604 @@ -65671,7 +66291,7 @@ Domain to not audit.
19605 </param>
19606 <infoflow type="none"/>
19607 </interface>
19608 -<interface name="corenet_udp_sendrecv_ups_port" lineno="89625">
19609 +<interface name="corenet_udp_sendrecv_ups_port" lineno="90046">
19610 <summary>
19611 Send and receive UDP traffic on the ups port.
19612 </summary>
19613 @@ -65682,7 +66302,7 @@ Domain allowed access.
19614 </param>
19615 <infoflow type="both" weight="10"/>
19616 </interface>
19617 -<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="89641">
19618 +<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="90062">
19619 <summary>
19620 Do not audit attempts to send and receive
19621 UDP traffic on the ups port.
19622 @@ -65694,7 +66314,7 @@ Domain to not audit.
19623 </param>
19624 <infoflow type="none"/>
19625 </interface>
19626 -<interface name="corenet_tcp_bind_ups_port" lineno="89656">
19627 +<interface name="corenet_tcp_bind_ups_port" lineno="90077">
19628 <summary>
19629 Bind TCP sockets to the ups port.
19630 </summary>
19631 @@ -65705,7 +66325,7 @@ Domain allowed access.
19632 </param>
19633 <infoflow type="none"/>
19634 </interface>
19635 -<interface name="corenet_udp_bind_ups_port" lineno="89676">
19636 +<interface name="corenet_udp_bind_ups_port" lineno="90097">
19637 <summary>
19638 Bind UDP sockets to the ups port.
19639 </summary>
19640 @@ -65716,7 +66336,7 @@ Domain allowed access.
19641 </param>
19642 <infoflow type="none"/>
19643 </interface>
19644 -<interface name="corenet_tcp_connect_ups_port" lineno="89695">
19645 +<interface name="corenet_tcp_connect_ups_port" lineno="90116">
19646 <summary>
19647 Make a TCP connection to the ups port.
19648 </summary>
19649 @@ -65726,7 +66346,7 @@ Domain allowed access.
19650 </summary>
19651 </param>
19652 </interface>
19653 -<interface name="corenet_send_ups_client_packets" lineno="89715">
19654 +<interface name="corenet_send_ups_client_packets" lineno="90136">
19655 <summary>
19656 Send ups_client packets.
19657 </summary>
19658 @@ -65737,7 +66357,7 @@ Domain allowed access.
19659 </param>
19660 <infoflow type="write" weight="10"/>
19661 </interface>
19662 -<interface name="corenet_dontaudit_send_ups_client_packets" lineno="89734">
19663 +<interface name="corenet_dontaudit_send_ups_client_packets" lineno="90155">
19664 <summary>
19665 Do not audit attempts to send ups_client packets.
19666 </summary>
19667 @@ -65748,7 +66368,7 @@ Domain to not audit.
19668 </param>
19669 <infoflow type="none"/>
19670 </interface>
19671 -<interface name="corenet_receive_ups_client_packets" lineno="89753">
19672 +<interface name="corenet_receive_ups_client_packets" lineno="90174">
19673 <summary>
19674 Receive ups_client packets.
19675 </summary>
19676 @@ -65759,7 +66379,7 @@ Domain allowed access.
19677 </param>
19678 <infoflow type="read" weight="10"/>
19679 </interface>
19680 -<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="89772">
19681 +<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="90193">
19682 <summary>
19683 Do not audit attempts to receive ups_client packets.
19684 </summary>
19685 @@ -65770,7 +66390,7 @@ Domain allowed access.
19686 </param>
19687 <infoflow type="none"/>
19688 </interface>
19689 -<interface name="corenet_sendrecv_ups_client_packets" lineno="89791">
19690 +<interface name="corenet_sendrecv_ups_client_packets" lineno="90212">
19691 <summary>
19692 Send and receive ups_client packets.
19693 </summary>
19694 @@ -65781,7 +66401,7 @@ Domain allowed access.
19695 </param>
19696 <infoflow type="both" weight="10"/>
19697 </interface>
19698 -<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="89807">
19699 +<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="90228">
19700 <summary>
19701 Do not audit attempts to send and receive ups_client packets.
19702 </summary>
19703 @@ -65792,7 +66412,7 @@ Domain to not audit.
19704 </param>
19705 <infoflow type="none"/>
19706 </interface>
19707 -<interface name="corenet_relabelto_ups_client_packets" lineno="89822">
19708 +<interface name="corenet_relabelto_ups_client_packets" lineno="90243">
19709 <summary>
19710 Relabel packets to ups_client the packet type.
19711 </summary>
19712 @@ -65802,7 +66422,7 @@ Domain allowed access.
19713 </summary>
19714 </param>
19715 </interface>
19716 -<interface name="corenet_send_ups_server_packets" lineno="89842">
19717 +<interface name="corenet_send_ups_server_packets" lineno="90263">
19718 <summary>
19719 Send ups_server packets.
19720 </summary>
19721 @@ -65813,7 +66433,7 @@ Domain allowed access.
19722 </param>
19723 <infoflow type="write" weight="10"/>
19724 </interface>
19725 -<interface name="corenet_dontaudit_send_ups_server_packets" lineno="89861">
19726 +<interface name="corenet_dontaudit_send_ups_server_packets" lineno="90282">
19727 <summary>
19728 Do not audit attempts to send ups_server packets.
19729 </summary>
19730 @@ -65824,7 +66444,7 @@ Domain to not audit.
19731 </param>
19732 <infoflow type="none"/>
19733 </interface>
19734 -<interface name="corenet_receive_ups_server_packets" lineno="89880">
19735 +<interface name="corenet_receive_ups_server_packets" lineno="90301">
19736 <summary>
19737 Receive ups_server packets.
19738 </summary>
19739 @@ -65835,7 +66455,7 @@ Domain allowed access.
19740 </param>
19741 <infoflow type="read" weight="10"/>
19742 </interface>
19743 -<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="89899">
19744 +<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="90320">
19745 <summary>
19746 Do not audit attempts to receive ups_server packets.
19747 </summary>
19748 @@ -65846,7 +66466,7 @@ Domain allowed access.
19749 </param>
19750 <infoflow type="none"/>
19751 </interface>
19752 -<interface name="corenet_sendrecv_ups_server_packets" lineno="89918">
19753 +<interface name="corenet_sendrecv_ups_server_packets" lineno="90339">
19754 <summary>
19755 Send and receive ups_server packets.
19756 </summary>
19757 @@ -65857,7 +66477,7 @@ Domain allowed access.
19758 </param>
19759 <infoflow type="both" weight="10"/>
19760 </interface>
19761 -<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="89934">
19762 +<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="90355">
19763 <summary>
19764 Do not audit attempts to send and receive ups_server packets.
19765 </summary>
19766 @@ -65868,7 +66488,7 @@ Domain to not audit.
19767 </param>
19768 <infoflow type="none"/>
19769 </interface>
19770 -<interface name="corenet_relabelto_ups_server_packets" lineno="89949">
19771 +<interface name="corenet_relabelto_ups_server_packets" lineno="90370">
19772 <summary>
19773 Relabel packets to ups_server the packet type.
19774 </summary>
19775 @@ -65878,7 +66498,7 @@ Domain allowed access.
19776 </summary>
19777 </param>
19778 </interface>
19779 -<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="89971">
19780 +<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="90392">
19781 <summary>
19782 Send and receive TCP traffic on the utcpserver port.
19783 </summary>
19784 @@ -65889,7 +66509,7 @@ Domain allowed access.
19785 </param>
19786 <infoflow type="both" weight="10"/>
19787 </interface>
19788 -<interface name="corenet_udp_send_utcpserver_port" lineno="89986">
19789 +<interface name="corenet_udp_send_utcpserver_port" lineno="90407">
19790 <summary>
19791 Send UDP traffic on the utcpserver port.
19792 </summary>
19793 @@ -65900,7 +66520,7 @@ Domain allowed access.
19794 </param>
19795 <infoflow type="write" weight="10"/>
19796 </interface>
19797 -<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="90001">
19798 +<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="90422">
19799 <summary>
19800 Do not audit attempts to send UDP traffic on the utcpserver port.
19801 </summary>
19802 @@ -65911,7 +66531,7 @@ Domain to not audit.
19803 </param>
19804 <infoflow type="none"/>
19805 </interface>
19806 -<interface name="corenet_udp_receive_utcpserver_port" lineno="90016">
19807 +<interface name="corenet_udp_receive_utcpserver_port" lineno="90437">
19808 <summary>
19809 Receive UDP traffic on the utcpserver port.
19810 </summary>
19811 @@ -65922,7 +66542,7 @@ Domain allowed access.
19812 </param>
19813 <infoflow type="read" weight="10"/>
19814 </interface>
19815 -<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="90031">
19816 +<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="90452">
19817 <summary>
19818 Do not audit attempts to receive UDP traffic on the utcpserver port.
19819 </summary>
19820 @@ -65933,7 +66553,7 @@ Domain to not audit.
19821 </param>
19822 <infoflow type="none"/>
19823 </interface>
19824 -<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="90046">
19825 +<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="90467">
19826 <summary>
19827 Send and receive UDP traffic on the utcpserver port.
19828 </summary>
19829 @@ -65944,7 +66564,7 @@ Domain allowed access.
19830 </param>
19831 <infoflow type="both" weight="10"/>
19832 </interface>
19833 -<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="90062">
19834 +<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="90483">
19835 <summary>
19836 Do not audit attempts to send and receive
19837 UDP traffic on the utcpserver port.
19838 @@ -65956,7 +66576,7 @@ Domain to not audit.
19839 </param>
19840 <infoflow type="none"/>
19841 </interface>
19842 -<interface name="corenet_tcp_bind_utcpserver_port" lineno="90077">
19843 +<interface name="corenet_tcp_bind_utcpserver_port" lineno="90498">
19844 <summary>
19845 Bind TCP sockets to the utcpserver port.
19846 </summary>
19847 @@ -65967,7 +66587,7 @@ Domain allowed access.
19848 </param>
19849 <infoflow type="none"/>
19850 </interface>
19851 -<interface name="corenet_udp_bind_utcpserver_port" lineno="90097">
19852 +<interface name="corenet_udp_bind_utcpserver_port" lineno="90518">
19853 <summary>
19854 Bind UDP sockets to the utcpserver port.
19855 </summary>
19856 @@ -65978,7 +66598,7 @@ Domain allowed access.
19857 </param>
19858 <infoflow type="none"/>
19859 </interface>
19860 -<interface name="corenet_tcp_connect_utcpserver_port" lineno="90116">
19861 +<interface name="corenet_tcp_connect_utcpserver_port" lineno="90537">
19862 <summary>
19863 Make a TCP connection to the utcpserver port.
19864 </summary>
19865 @@ -65988,7 +66608,7 @@ Domain allowed access.
19866 </summary>
19867 </param>
19868 </interface>
19869 -<interface name="corenet_send_utcpserver_client_packets" lineno="90136">
19870 +<interface name="corenet_send_utcpserver_client_packets" lineno="90557">
19871 <summary>
19872 Send utcpserver_client packets.
19873 </summary>
19874 @@ -65999,7 +66619,7 @@ Domain allowed access.
19875 </param>
19876 <infoflow type="write" weight="10"/>
19877 </interface>
19878 -<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="90155">
19879 +<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="90576">
19880 <summary>
19881 Do not audit attempts to send utcpserver_client packets.
19882 </summary>
19883 @@ -66010,7 +66630,7 @@ Domain to not audit.
19884 </param>
19885 <infoflow type="none"/>
19886 </interface>
19887 -<interface name="corenet_receive_utcpserver_client_packets" lineno="90174">
19888 +<interface name="corenet_receive_utcpserver_client_packets" lineno="90595">
19889 <summary>
19890 Receive utcpserver_client packets.
19891 </summary>
19892 @@ -66021,7 +66641,7 @@ Domain allowed access.
19893 </param>
19894 <infoflow type="read" weight="10"/>
19895 </interface>
19896 -<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="90193">
19897 +<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="90614">
19898 <summary>
19899 Do not audit attempts to receive utcpserver_client packets.
19900 </summary>
19901 @@ -66032,7 +66652,7 @@ Domain allowed access.
19902 </param>
19903 <infoflow type="none"/>
19904 </interface>
19905 -<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="90212">
19906 +<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="90633">
19907 <summary>
19908 Send and receive utcpserver_client packets.
19909 </summary>
19910 @@ -66043,7 +66663,7 @@ Domain allowed access.
19911 </param>
19912 <infoflow type="both" weight="10"/>
19913 </interface>
19914 -<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="90228">
19915 +<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="90649">
19916 <summary>
19917 Do not audit attempts to send and receive utcpserver_client packets.
19918 </summary>
19919 @@ -66054,7 +66674,7 @@ Domain to not audit.
19920 </param>
19921 <infoflow type="none"/>
19922 </interface>
19923 -<interface name="corenet_relabelto_utcpserver_client_packets" lineno="90243">
19924 +<interface name="corenet_relabelto_utcpserver_client_packets" lineno="90664">
19925 <summary>
19926 Relabel packets to utcpserver_client the packet type.
19927 </summary>
19928 @@ -66064,7 +66684,7 @@ Domain allowed access.
19929 </summary>
19930 </param>
19931 </interface>
19932 -<interface name="corenet_send_utcpserver_server_packets" lineno="90263">
19933 +<interface name="corenet_send_utcpserver_server_packets" lineno="90684">
19934 <summary>
19935 Send utcpserver_server packets.
19936 </summary>
19937 @@ -66075,7 +66695,7 @@ Domain allowed access.
19938 </param>
19939 <infoflow type="write" weight="10"/>
19940 </interface>
19941 -<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="90282">
19942 +<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="90703">
19943 <summary>
19944 Do not audit attempts to send utcpserver_server packets.
19945 </summary>
19946 @@ -66086,7 +66706,7 @@ Domain to not audit.
19947 </param>
19948 <infoflow type="none"/>
19949 </interface>
19950 -<interface name="corenet_receive_utcpserver_server_packets" lineno="90301">
19951 +<interface name="corenet_receive_utcpserver_server_packets" lineno="90722">
19952 <summary>
19953 Receive utcpserver_server packets.
19954 </summary>
19955 @@ -66097,7 +66717,7 @@ Domain allowed access.
19956 </param>
19957 <infoflow type="read" weight="10"/>
19958 </interface>
19959 -<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="90320">
19960 +<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="90741">
19961 <summary>
19962 Do not audit attempts to receive utcpserver_server packets.
19963 </summary>
19964 @@ -66108,7 +66728,7 @@ Domain allowed access.
19965 </param>
19966 <infoflow type="none"/>
19967 </interface>
19968 -<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="90339">
19969 +<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="90760">
19970 <summary>
19971 Send and receive utcpserver_server packets.
19972 </summary>
19973 @@ -66119,7 +66739,7 @@ Domain allowed access.
19974 </param>
19975 <infoflow type="both" weight="10"/>
19976 </interface>
19977 -<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="90355">
19978 +<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="90776">
19979 <summary>
19980 Do not audit attempts to send and receive utcpserver_server packets.
19981 </summary>
19982 @@ -66130,7 +66750,7 @@ Domain to not audit.
19983 </param>
19984 <infoflow type="none"/>
19985 </interface>
19986 -<interface name="corenet_relabelto_utcpserver_server_packets" lineno="90370">
19987 +<interface name="corenet_relabelto_utcpserver_server_packets" lineno="90791">
19988 <summary>
19989 Relabel packets to utcpserver_server the packet type.
19990 </summary>
19991 @@ -66140,7 +66760,7 @@ Domain allowed access.
19992 </summary>
19993 </param>
19994 </interface>
19995 -<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="90392">
19996 +<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="90813">
19997 <summary>
19998 Send and receive TCP traffic on the uucpd port.
19999 </summary>
20000 @@ -66151,7 +66771,7 @@ Domain allowed access.
20001 </param>
20002 <infoflow type="both" weight="10"/>
20003 </interface>
20004 -<interface name="corenet_udp_send_uucpd_port" lineno="90407">
20005 +<interface name="corenet_udp_send_uucpd_port" lineno="90828">
20006 <summary>
20007 Send UDP traffic on the uucpd port.
20008 </summary>
20009 @@ -66162,7 +66782,7 @@ Domain allowed access.
20010 </param>
20011 <infoflow type="write" weight="10"/>
20012 </interface>
20013 -<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="90422">
20014 +<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="90843">
20015 <summary>
20016 Do not audit attempts to send UDP traffic on the uucpd port.
20017 </summary>
20018 @@ -66173,7 +66793,7 @@ Domain to not audit.
20019 </param>
20020 <infoflow type="none"/>
20021 </interface>
20022 -<interface name="corenet_udp_receive_uucpd_port" lineno="90437">
20023 +<interface name="corenet_udp_receive_uucpd_port" lineno="90858">
20024 <summary>
20025 Receive UDP traffic on the uucpd port.
20026 </summary>
20027 @@ -66184,7 +66804,7 @@ Domain allowed access.
20028 </param>
20029 <infoflow type="read" weight="10"/>
20030 </interface>
20031 -<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="90452">
20032 +<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="90873">
20033 <summary>
20034 Do not audit attempts to receive UDP traffic on the uucpd port.
20035 </summary>
20036 @@ -66195,7 +66815,7 @@ Domain to not audit.
20037 </param>
20038 <infoflow type="none"/>
20039 </interface>
20040 -<interface name="corenet_udp_sendrecv_uucpd_port" lineno="90467">
20041 +<interface name="corenet_udp_sendrecv_uucpd_port" lineno="90888">
20042 <summary>
20043 Send and receive UDP traffic on the uucpd port.
20044 </summary>
20045 @@ -66206,7 +66826,7 @@ Domain allowed access.
20046 </param>
20047 <infoflow type="both" weight="10"/>
20048 </interface>
20049 -<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="90483">
20050 +<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="90904">
20051 <summary>
20052 Do not audit attempts to send and receive
20053 UDP traffic on the uucpd port.
20054 @@ -66218,7 +66838,7 @@ Domain to not audit.
20055 </param>
20056 <infoflow type="none"/>
20057 </interface>
20058 -<interface name="corenet_tcp_bind_uucpd_port" lineno="90498">
20059 +<interface name="corenet_tcp_bind_uucpd_port" lineno="90919">
20060 <summary>
20061 Bind TCP sockets to the uucpd port.
20062 </summary>
20063 @@ -66229,7 +66849,7 @@ Domain allowed access.
20064 </param>
20065 <infoflow type="none"/>
20066 </interface>
20067 -<interface name="corenet_udp_bind_uucpd_port" lineno="90518">
20068 +<interface name="corenet_udp_bind_uucpd_port" lineno="90939">
20069 <summary>
20070 Bind UDP sockets to the uucpd port.
20071 </summary>
20072 @@ -66240,7 +66860,7 @@ Domain allowed access.
20073 </param>
20074 <infoflow type="none"/>
20075 </interface>
20076 -<interface name="corenet_tcp_connect_uucpd_port" lineno="90537">
20077 +<interface name="corenet_tcp_connect_uucpd_port" lineno="90958">
20078 <summary>
20079 Make a TCP connection to the uucpd port.
20080 </summary>
20081 @@ -66250,7 +66870,7 @@ Domain allowed access.
20082 </summary>
20083 </param>
20084 </interface>
20085 -<interface name="corenet_send_uucpd_client_packets" lineno="90557">
20086 +<interface name="corenet_send_uucpd_client_packets" lineno="90978">
20087 <summary>
20088 Send uucpd_client packets.
20089 </summary>
20090 @@ -66261,7 +66881,7 @@ Domain allowed access.
20091 </param>
20092 <infoflow type="write" weight="10"/>
20093 </interface>
20094 -<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="90576">
20095 +<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="90997">
20096 <summary>
20097 Do not audit attempts to send uucpd_client packets.
20098 </summary>
20099 @@ -66272,7 +66892,7 @@ Domain to not audit.
20100 </param>
20101 <infoflow type="none"/>
20102 </interface>
20103 -<interface name="corenet_receive_uucpd_client_packets" lineno="90595">
20104 +<interface name="corenet_receive_uucpd_client_packets" lineno="91016">
20105 <summary>
20106 Receive uucpd_client packets.
20107 </summary>
20108 @@ -66283,7 +66903,7 @@ Domain allowed access.
20109 </param>
20110 <infoflow type="read" weight="10"/>
20111 </interface>
20112 -<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="90614">
20113 +<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="91035">
20114 <summary>
20115 Do not audit attempts to receive uucpd_client packets.
20116 </summary>
20117 @@ -66294,7 +66914,7 @@ Domain allowed access.
20118 </param>
20119 <infoflow type="none"/>
20120 </interface>
20121 -<interface name="corenet_sendrecv_uucpd_client_packets" lineno="90633">
20122 +<interface name="corenet_sendrecv_uucpd_client_packets" lineno="91054">
20123 <summary>
20124 Send and receive uucpd_client packets.
20125 </summary>
20126 @@ -66305,7 +66925,7 @@ Domain allowed access.
20127 </param>
20128 <infoflow type="both" weight="10"/>
20129 </interface>
20130 -<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="90649">
20131 +<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="91070">
20132 <summary>
20133 Do not audit attempts to send and receive uucpd_client packets.
20134 </summary>
20135 @@ -66316,7 +66936,7 @@ Domain to not audit.
20136 </param>
20137 <infoflow type="none"/>
20138 </interface>
20139 -<interface name="corenet_relabelto_uucpd_client_packets" lineno="90664">
20140 +<interface name="corenet_relabelto_uucpd_client_packets" lineno="91085">
20141 <summary>
20142 Relabel packets to uucpd_client the packet type.
20143 </summary>
20144 @@ -66326,7 +66946,7 @@ Domain allowed access.
20145 </summary>
20146 </param>
20147 </interface>
20148 -<interface name="corenet_send_uucpd_server_packets" lineno="90684">
20149 +<interface name="corenet_send_uucpd_server_packets" lineno="91105">
20150 <summary>
20151 Send uucpd_server packets.
20152 </summary>
20153 @@ -66337,7 +66957,7 @@ Domain allowed access.
20154 </param>
20155 <infoflow type="write" weight="10"/>
20156 </interface>
20157 -<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="90703">
20158 +<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="91124">
20159 <summary>
20160 Do not audit attempts to send uucpd_server packets.
20161 </summary>
20162 @@ -66348,7 +66968,7 @@ Domain to not audit.
20163 </param>
20164 <infoflow type="none"/>
20165 </interface>
20166 -<interface name="corenet_receive_uucpd_server_packets" lineno="90722">
20167 +<interface name="corenet_receive_uucpd_server_packets" lineno="91143">
20168 <summary>
20169 Receive uucpd_server packets.
20170 </summary>
20171 @@ -66359,7 +66979,7 @@ Domain allowed access.
20172 </param>
20173 <infoflow type="read" weight="10"/>
20174 </interface>
20175 -<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="90741">
20176 +<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="91162">
20177 <summary>
20178 Do not audit attempts to receive uucpd_server packets.
20179 </summary>
20180 @@ -66370,7 +66990,7 @@ Domain allowed access.
20181 </param>
20182 <infoflow type="none"/>
20183 </interface>
20184 -<interface name="corenet_sendrecv_uucpd_server_packets" lineno="90760">
20185 +<interface name="corenet_sendrecv_uucpd_server_packets" lineno="91181">
20186 <summary>
20187 Send and receive uucpd_server packets.
20188 </summary>
20189 @@ -66381,7 +67001,7 @@ Domain allowed access.
20190 </param>
20191 <infoflow type="both" weight="10"/>
20192 </interface>
20193 -<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="90776">
20194 +<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="91197">
20195 <summary>
20196 Do not audit attempts to send and receive uucpd_server packets.
20197 </summary>
20198 @@ -66392,7 +67012,7 @@ Domain to not audit.
20199 </param>
20200 <infoflow type="none"/>
20201 </interface>
20202 -<interface name="corenet_relabelto_uucpd_server_packets" lineno="90791">
20203 +<interface name="corenet_relabelto_uucpd_server_packets" lineno="91212">
20204 <summary>
20205 Relabel packets to uucpd_server the packet type.
20206 </summary>
20207 @@ -66402,7 +67022,7 @@ Domain allowed access.
20208 </summary>
20209 </param>
20210 </interface>
20211 -<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="90813">
20212 +<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="91234">
20213 <summary>
20214 Send and receive TCP traffic on the varnishd port.
20215 </summary>
20216 @@ -66413,7 +67033,7 @@ Domain allowed access.
20217 </param>
20218 <infoflow type="both" weight="10"/>
20219 </interface>
20220 -<interface name="corenet_udp_send_varnishd_port" lineno="90828">
20221 +<interface name="corenet_udp_send_varnishd_port" lineno="91249">
20222 <summary>
20223 Send UDP traffic on the varnishd port.
20224 </summary>
20225 @@ -66424,7 +67044,7 @@ Domain allowed access.
20226 </param>
20227 <infoflow type="write" weight="10"/>
20228 </interface>
20229 -<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="90843">
20230 +<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="91264">
20231 <summary>
20232 Do not audit attempts to send UDP traffic on the varnishd port.
20233 </summary>
20234 @@ -66435,7 +67055,7 @@ Domain to not audit.
20235 </param>
20236 <infoflow type="none"/>
20237 </interface>
20238 -<interface name="corenet_udp_receive_varnishd_port" lineno="90858">
20239 +<interface name="corenet_udp_receive_varnishd_port" lineno="91279">
20240 <summary>
20241 Receive UDP traffic on the varnishd port.
20242 </summary>
20243 @@ -66446,7 +67066,7 @@ Domain allowed access.
20244 </param>
20245 <infoflow type="read" weight="10"/>
20246 </interface>
20247 -<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="90873">
20248 +<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="91294">
20249 <summary>
20250 Do not audit attempts to receive UDP traffic on the varnishd port.
20251 </summary>
20252 @@ -66457,7 +67077,7 @@ Domain to not audit.
20253 </param>
20254 <infoflow type="none"/>
20255 </interface>
20256 -<interface name="corenet_udp_sendrecv_varnishd_port" lineno="90888">
20257 +<interface name="corenet_udp_sendrecv_varnishd_port" lineno="91309">
20258 <summary>
20259 Send and receive UDP traffic on the varnishd port.
20260 </summary>
20261 @@ -66468,7 +67088,7 @@ Domain allowed access.
20262 </param>
20263 <infoflow type="both" weight="10"/>
20264 </interface>
20265 -<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="90904">
20266 +<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="91325">
20267 <summary>
20268 Do not audit attempts to send and receive
20269 UDP traffic on the varnishd port.
20270 @@ -66480,7 +67100,7 @@ Domain to not audit.
20271 </param>
20272 <infoflow type="none"/>
20273 </interface>
20274 -<interface name="corenet_tcp_bind_varnishd_port" lineno="90919">
20275 +<interface name="corenet_tcp_bind_varnishd_port" lineno="91340">
20276 <summary>
20277 Bind TCP sockets to the varnishd port.
20278 </summary>
20279 @@ -66491,7 +67111,7 @@ Domain allowed access.
20280 </param>
20281 <infoflow type="none"/>
20282 </interface>
20283 -<interface name="corenet_udp_bind_varnishd_port" lineno="90939">
20284 +<interface name="corenet_udp_bind_varnishd_port" lineno="91360">
20285 <summary>
20286 Bind UDP sockets to the varnishd port.
20287 </summary>
20288 @@ -66502,7 +67122,7 @@ Domain allowed access.
20289 </param>
20290 <infoflow type="none"/>
20291 </interface>
20292 -<interface name="corenet_tcp_connect_varnishd_port" lineno="90958">
20293 +<interface name="corenet_tcp_connect_varnishd_port" lineno="91379">
20294 <summary>
20295 Make a TCP connection to the varnishd port.
20296 </summary>
20297 @@ -66512,7 +67132,7 @@ Domain allowed access.
20298 </summary>
20299 </param>
20300 </interface>
20301 -<interface name="corenet_send_varnishd_client_packets" lineno="90978">
20302 +<interface name="corenet_send_varnishd_client_packets" lineno="91399">
20303 <summary>
20304 Send varnishd_client packets.
20305 </summary>
20306 @@ -66523,7 +67143,7 @@ Domain allowed access.
20307 </param>
20308 <infoflow type="write" weight="10"/>
20309 </interface>
20310 -<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="90997">
20311 +<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="91418">
20312 <summary>
20313 Do not audit attempts to send varnishd_client packets.
20314 </summary>
20315 @@ -66534,7 +67154,7 @@ Domain to not audit.
20316 </param>
20317 <infoflow type="none"/>
20318 </interface>
20319 -<interface name="corenet_receive_varnishd_client_packets" lineno="91016">
20320 +<interface name="corenet_receive_varnishd_client_packets" lineno="91437">
20321 <summary>
20322 Receive varnishd_client packets.
20323 </summary>
20324 @@ -66545,7 +67165,7 @@ Domain allowed access.
20325 </param>
20326 <infoflow type="read" weight="10"/>
20327 </interface>
20328 -<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="91035">
20329 +<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="91456">
20330 <summary>
20331 Do not audit attempts to receive varnishd_client packets.
20332 </summary>
20333 @@ -66556,7 +67176,7 @@ Domain allowed access.
20334 </param>
20335 <infoflow type="none"/>
20336 </interface>
20337 -<interface name="corenet_sendrecv_varnishd_client_packets" lineno="91054">
20338 +<interface name="corenet_sendrecv_varnishd_client_packets" lineno="91475">
20339 <summary>
20340 Send and receive varnishd_client packets.
20341 </summary>
20342 @@ -66567,7 +67187,7 @@ Domain allowed access.
20343 </param>
20344 <infoflow type="both" weight="10"/>
20345 </interface>
20346 -<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="91070">
20347 +<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="91491">
20348 <summary>
20349 Do not audit attempts to send and receive varnishd_client packets.
20350 </summary>
20351 @@ -66578,7 +67198,7 @@ Domain to not audit.
20352 </param>
20353 <infoflow type="none"/>
20354 </interface>
20355 -<interface name="corenet_relabelto_varnishd_client_packets" lineno="91085">
20356 +<interface name="corenet_relabelto_varnishd_client_packets" lineno="91506">
20357 <summary>
20358 Relabel packets to varnishd_client the packet type.
20359 </summary>
20360 @@ -66588,7 +67208,7 @@ Domain allowed access.
20361 </summary>
20362 </param>
20363 </interface>
20364 -<interface name="corenet_send_varnishd_server_packets" lineno="91105">
20365 +<interface name="corenet_send_varnishd_server_packets" lineno="91526">
20366 <summary>
20367 Send varnishd_server packets.
20368 </summary>
20369 @@ -66599,7 +67219,7 @@ Domain allowed access.
20370 </param>
20371 <infoflow type="write" weight="10"/>
20372 </interface>
20373 -<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="91124">
20374 +<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="91545">
20375 <summary>
20376 Do not audit attempts to send varnishd_server packets.
20377 </summary>
20378 @@ -66610,7 +67230,7 @@ Domain to not audit.
20379 </param>
20380 <infoflow type="none"/>
20381 </interface>
20382 -<interface name="corenet_receive_varnishd_server_packets" lineno="91143">
20383 +<interface name="corenet_receive_varnishd_server_packets" lineno="91564">
20384 <summary>
20385 Receive varnishd_server packets.
20386 </summary>
20387 @@ -66621,7 +67241,7 @@ Domain allowed access.
20388 </param>
20389 <infoflow type="read" weight="10"/>
20390 </interface>
20391 -<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="91162">
20392 +<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="91583">
20393 <summary>
20394 Do not audit attempts to receive varnishd_server packets.
20395 </summary>
20396 @@ -66632,7 +67252,7 @@ Domain allowed access.
20397 </param>
20398 <infoflow type="none"/>
20399 </interface>
20400 -<interface name="corenet_sendrecv_varnishd_server_packets" lineno="91181">
20401 +<interface name="corenet_sendrecv_varnishd_server_packets" lineno="91602">
20402 <summary>
20403 Send and receive varnishd_server packets.
20404 </summary>
20405 @@ -66643,7 +67263,7 @@ Domain allowed access.
20406 </param>
20407 <infoflow type="both" weight="10"/>
20408 </interface>
20409 -<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="91197">
20410 +<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="91618">
20411 <summary>
20412 Do not audit attempts to send and receive varnishd_server packets.
20413 </summary>
20414 @@ -66654,7 +67274,7 @@ Domain to not audit.
20415 </param>
20416 <infoflow type="none"/>
20417 </interface>
20418 -<interface name="corenet_relabelto_varnishd_server_packets" lineno="91212">
20419 +<interface name="corenet_relabelto_varnishd_server_packets" lineno="91633">
20420 <summary>
20421 Relabel packets to varnishd_server the packet type.
20422 </summary>
20423 @@ -66664,7 +67284,7 @@ Domain allowed access.
20424 </summary>
20425 </param>
20426 </interface>
20427 -<interface name="corenet_tcp_sendrecv_virt_port" lineno="91234">
20428 +<interface name="corenet_tcp_sendrecv_virt_port" lineno="91655">
20429 <summary>
20430 Send and receive TCP traffic on the virt port.
20431 </summary>
20432 @@ -66675,7 +67295,7 @@ Domain allowed access.
20433 </param>
20434 <infoflow type="both" weight="10"/>
20435 </interface>
20436 -<interface name="corenet_udp_send_virt_port" lineno="91249">
20437 +<interface name="corenet_udp_send_virt_port" lineno="91670">
20438 <summary>
20439 Send UDP traffic on the virt port.
20440 </summary>
20441 @@ -66686,7 +67306,7 @@ Domain allowed access.
20442 </param>
20443 <infoflow type="write" weight="10"/>
20444 </interface>
20445 -<interface name="corenet_dontaudit_udp_send_virt_port" lineno="91264">
20446 +<interface name="corenet_dontaudit_udp_send_virt_port" lineno="91685">
20447 <summary>
20448 Do not audit attempts to send UDP traffic on the virt port.
20449 </summary>
20450 @@ -66697,7 +67317,7 @@ Domain to not audit.
20451 </param>
20452 <infoflow type="none"/>
20453 </interface>
20454 -<interface name="corenet_udp_receive_virt_port" lineno="91279">
20455 +<interface name="corenet_udp_receive_virt_port" lineno="91700">
20456 <summary>
20457 Receive UDP traffic on the virt port.
20458 </summary>
20459 @@ -66708,7 +67328,7 @@ Domain allowed access.
20460 </param>
20461 <infoflow type="read" weight="10"/>
20462 </interface>
20463 -<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="91294">
20464 +<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="91715">
20465 <summary>
20466 Do not audit attempts to receive UDP traffic on the virt port.
20467 </summary>
20468 @@ -66719,7 +67339,7 @@ Domain to not audit.
20469 </param>
20470 <infoflow type="none"/>
20471 </interface>
20472 -<interface name="corenet_udp_sendrecv_virt_port" lineno="91309">
20473 +<interface name="corenet_udp_sendrecv_virt_port" lineno="91730">
20474 <summary>
20475 Send and receive UDP traffic on the virt port.
20476 </summary>
20477 @@ -66730,7 +67350,7 @@ Domain allowed access.
20478 </param>
20479 <infoflow type="both" weight="10"/>
20480 </interface>
20481 -<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="91325">
20482 +<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="91746">
20483 <summary>
20484 Do not audit attempts to send and receive
20485 UDP traffic on the virt port.
20486 @@ -66742,7 +67362,7 @@ Domain to not audit.
20487 </param>
20488 <infoflow type="none"/>
20489 </interface>
20490 -<interface name="corenet_tcp_bind_virt_port" lineno="91340">
20491 +<interface name="corenet_tcp_bind_virt_port" lineno="91761">
20492 <summary>
20493 Bind TCP sockets to the virt port.
20494 </summary>
20495 @@ -66753,7 +67373,7 @@ Domain allowed access.
20496 </param>
20497 <infoflow type="none"/>
20498 </interface>
20499 -<interface name="corenet_udp_bind_virt_port" lineno="91360">
20500 +<interface name="corenet_udp_bind_virt_port" lineno="91781">
20501 <summary>
20502 Bind UDP sockets to the virt port.
20503 </summary>
20504 @@ -66764,7 +67384,7 @@ Domain allowed access.
20505 </param>
20506 <infoflow type="none"/>
20507 </interface>
20508 -<interface name="corenet_tcp_connect_virt_port" lineno="91379">
20509 +<interface name="corenet_tcp_connect_virt_port" lineno="91800">
20510 <summary>
20511 Make a TCP connection to the virt port.
20512 </summary>
20513 @@ -66774,7 +67394,7 @@ Domain allowed access.
20514 </summary>
20515 </param>
20516 </interface>
20517 -<interface name="corenet_send_virt_client_packets" lineno="91399">
20518 +<interface name="corenet_send_virt_client_packets" lineno="91820">
20519 <summary>
20520 Send virt_client packets.
20521 </summary>
20522 @@ -66785,7 +67405,7 @@ Domain allowed access.
20523 </param>
20524 <infoflow type="write" weight="10"/>
20525 </interface>
20526 -<interface name="corenet_dontaudit_send_virt_client_packets" lineno="91418">
20527 +<interface name="corenet_dontaudit_send_virt_client_packets" lineno="91839">
20528 <summary>
20529 Do not audit attempts to send virt_client packets.
20530 </summary>
20531 @@ -66796,7 +67416,7 @@ Domain to not audit.
20532 </param>
20533 <infoflow type="none"/>
20534 </interface>
20535 -<interface name="corenet_receive_virt_client_packets" lineno="91437">
20536 +<interface name="corenet_receive_virt_client_packets" lineno="91858">
20537 <summary>
20538 Receive virt_client packets.
20539 </summary>
20540 @@ -66807,7 +67427,7 @@ Domain allowed access.
20541 </param>
20542 <infoflow type="read" weight="10"/>
20543 </interface>
20544 -<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="91456">
20545 +<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="91877">
20546 <summary>
20547 Do not audit attempts to receive virt_client packets.
20548 </summary>
20549 @@ -66818,7 +67438,7 @@ Domain allowed access.
20550 </param>
20551 <infoflow type="none"/>
20552 </interface>
20553 -<interface name="corenet_sendrecv_virt_client_packets" lineno="91475">
20554 +<interface name="corenet_sendrecv_virt_client_packets" lineno="91896">
20555 <summary>
20556 Send and receive virt_client packets.
20557 </summary>
20558 @@ -66829,7 +67449,7 @@ Domain allowed access.
20559 </param>
20560 <infoflow type="both" weight="10"/>
20561 </interface>
20562 -<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="91491">
20563 +<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="91912">
20564 <summary>
20565 Do not audit attempts to send and receive virt_client packets.
20566 </summary>
20567 @@ -66840,7 +67460,7 @@ Domain to not audit.
20568 </param>
20569 <infoflow type="none"/>
20570 </interface>
20571 -<interface name="corenet_relabelto_virt_client_packets" lineno="91506">
20572 +<interface name="corenet_relabelto_virt_client_packets" lineno="91927">
20573 <summary>
20574 Relabel packets to virt_client the packet type.
20575 </summary>
20576 @@ -66850,7 +67470,7 @@ Domain allowed access.
20577 </summary>
20578 </param>
20579 </interface>
20580 -<interface name="corenet_send_virt_server_packets" lineno="91526">
20581 +<interface name="corenet_send_virt_server_packets" lineno="91947">
20582 <summary>
20583 Send virt_server packets.
20584 </summary>
20585 @@ -66861,7 +67481,7 @@ Domain allowed access.
20586 </param>
20587 <infoflow type="write" weight="10"/>
20588 </interface>
20589 -<interface name="corenet_dontaudit_send_virt_server_packets" lineno="91545">
20590 +<interface name="corenet_dontaudit_send_virt_server_packets" lineno="91966">
20591 <summary>
20592 Do not audit attempts to send virt_server packets.
20593 </summary>
20594 @@ -66872,7 +67492,7 @@ Domain to not audit.
20595 </param>
20596 <infoflow type="none"/>
20597 </interface>
20598 -<interface name="corenet_receive_virt_server_packets" lineno="91564">
20599 +<interface name="corenet_receive_virt_server_packets" lineno="91985">
20600 <summary>
20601 Receive virt_server packets.
20602 </summary>
20603 @@ -66883,7 +67503,7 @@ Domain allowed access.
20604 </param>
20605 <infoflow type="read" weight="10"/>
20606 </interface>
20607 -<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="91583">
20608 +<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="92004">
20609 <summary>
20610 Do not audit attempts to receive virt_server packets.
20611 </summary>
20612 @@ -66894,7 +67514,7 @@ Domain allowed access.
20613 </param>
20614 <infoflow type="none"/>
20615 </interface>
20616 -<interface name="corenet_sendrecv_virt_server_packets" lineno="91602">
20617 +<interface name="corenet_sendrecv_virt_server_packets" lineno="92023">
20618 <summary>
20619 Send and receive virt_server packets.
20620 </summary>
20621 @@ -66905,7 +67525,7 @@ Domain allowed access.
20622 </param>
20623 <infoflow type="both" weight="10"/>
20624 </interface>
20625 -<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="91618">
20626 +<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="92039">
20627 <summary>
20628 Do not audit attempts to send and receive virt_server packets.
20629 </summary>
20630 @@ -66916,7 +67536,7 @@ Domain to not audit.
20631 </param>
20632 <infoflow type="none"/>
20633 </interface>
20634 -<interface name="corenet_relabelto_virt_server_packets" lineno="91633">
20635 +<interface name="corenet_relabelto_virt_server_packets" lineno="92054">
20636 <summary>
20637 Relabel packets to virt_server the packet type.
20638 </summary>
20639 @@ -66926,7 +67546,7 @@ Domain allowed access.
20640 </summary>
20641 </param>
20642 </interface>
20643 -<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="91655">
20644 +<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="92076">
20645 <summary>
20646 Send and receive TCP traffic on the virtual_places port.
20647 </summary>
20648 @@ -66937,7 +67557,7 @@ Domain allowed access.
20649 </param>
20650 <infoflow type="both" weight="10"/>
20651 </interface>
20652 -<interface name="corenet_udp_send_virtual_places_port" lineno="91670">
20653 +<interface name="corenet_udp_send_virtual_places_port" lineno="92091">
20654 <summary>
20655 Send UDP traffic on the virtual_places port.
20656 </summary>
20657 @@ -66948,7 +67568,7 @@ Domain allowed access.
20658 </param>
20659 <infoflow type="write" weight="10"/>
20660 </interface>
20661 -<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="91685">
20662 +<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="92106">
20663 <summary>
20664 Do not audit attempts to send UDP traffic on the virtual_places port.
20665 </summary>
20666 @@ -66959,7 +67579,7 @@ Domain to not audit.
20667 </param>
20668 <infoflow type="none"/>
20669 </interface>
20670 -<interface name="corenet_udp_receive_virtual_places_port" lineno="91700">
20671 +<interface name="corenet_udp_receive_virtual_places_port" lineno="92121">
20672 <summary>
20673 Receive UDP traffic on the virtual_places port.
20674 </summary>
20675 @@ -66970,7 +67590,7 @@ Domain allowed access.
20676 </param>
20677 <infoflow type="read" weight="10"/>
20678 </interface>
20679 -<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="91715">
20680 +<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="92136">
20681 <summary>
20682 Do not audit attempts to receive UDP traffic on the virtual_places port.
20683 </summary>
20684 @@ -66981,7 +67601,7 @@ Domain to not audit.
20685 </param>
20686 <infoflow type="none"/>
20687 </interface>
20688 -<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="91730">
20689 +<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="92151">
20690 <summary>
20691 Send and receive UDP traffic on the virtual_places port.
20692 </summary>
20693 @@ -66992,7 +67612,7 @@ Domain allowed access.
20694 </param>
20695 <infoflow type="both" weight="10"/>
20696 </interface>
20697 -<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="91746">
20698 +<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="92167">
20699 <summary>
20700 Do not audit attempts to send and receive
20701 UDP traffic on the virtual_places port.
20702 @@ -67004,7 +67624,7 @@ Domain to not audit.
20703 </param>
20704 <infoflow type="none"/>
20705 </interface>
20706 -<interface name="corenet_tcp_bind_virtual_places_port" lineno="91761">
20707 +<interface name="corenet_tcp_bind_virtual_places_port" lineno="92182">
20708 <summary>
20709 Bind TCP sockets to the virtual_places port.
20710 </summary>
20711 @@ -67015,7 +67635,7 @@ Domain allowed access.
20712 </param>
20713 <infoflow type="none"/>
20714 </interface>
20715 -<interface name="corenet_udp_bind_virtual_places_port" lineno="91781">
20716 +<interface name="corenet_udp_bind_virtual_places_port" lineno="92202">
20717 <summary>
20718 Bind UDP sockets to the virtual_places port.
20719 </summary>
20720 @@ -67026,7 +67646,7 @@ Domain allowed access.
20721 </param>
20722 <infoflow type="none"/>
20723 </interface>
20724 -<interface name="corenet_tcp_connect_virtual_places_port" lineno="91800">
20725 +<interface name="corenet_tcp_connect_virtual_places_port" lineno="92221">
20726 <summary>
20727 Make a TCP connection to the virtual_places port.
20728 </summary>
20729 @@ -67036,7 +67656,7 @@ Domain allowed access.
20730 </summary>
20731 </param>
20732 </interface>
20733 -<interface name="corenet_send_virtual_places_client_packets" lineno="91820">
20734 +<interface name="corenet_send_virtual_places_client_packets" lineno="92241">
20735 <summary>
20736 Send virtual_places_client packets.
20737 </summary>
20738 @@ -67047,7 +67667,7 @@ Domain allowed access.
20739 </param>
20740 <infoflow type="write" weight="10"/>
20741 </interface>
20742 -<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="91839">
20743 +<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="92260">
20744 <summary>
20745 Do not audit attempts to send virtual_places_client packets.
20746 </summary>
20747 @@ -67058,7 +67678,7 @@ Domain to not audit.
20748 </param>
20749 <infoflow type="none"/>
20750 </interface>
20751 -<interface name="corenet_receive_virtual_places_client_packets" lineno="91858">
20752 +<interface name="corenet_receive_virtual_places_client_packets" lineno="92279">
20753 <summary>
20754 Receive virtual_places_client packets.
20755 </summary>
20756 @@ -67069,7 +67689,7 @@ Domain allowed access.
20757 </param>
20758 <infoflow type="read" weight="10"/>
20759 </interface>
20760 -<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="91877">
20761 +<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="92298">
20762 <summary>
20763 Do not audit attempts to receive virtual_places_client packets.
20764 </summary>
20765 @@ -67080,7 +67700,7 @@ Domain allowed access.
20766 </param>
20767 <infoflow type="none"/>
20768 </interface>
20769 -<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="91896">
20770 +<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="92317">
20771 <summary>
20772 Send and receive virtual_places_client packets.
20773 </summary>
20774 @@ -67091,7 +67711,7 @@ Domain allowed access.
20775 </param>
20776 <infoflow type="both" weight="10"/>
20777 </interface>
20778 -<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="91912">
20779 +<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="92333">
20780 <summary>
20781 Do not audit attempts to send and receive virtual_places_client packets.
20782 </summary>
20783 @@ -67102,7 +67722,7 @@ Domain to not audit.
20784 </param>
20785 <infoflow type="none"/>
20786 </interface>
20787 -<interface name="corenet_relabelto_virtual_places_client_packets" lineno="91927">
20788 +<interface name="corenet_relabelto_virtual_places_client_packets" lineno="92348">
20789 <summary>
20790 Relabel packets to virtual_places_client the packet type.
20791 </summary>
20792 @@ -67112,7 +67732,7 @@ Domain allowed access.
20793 </summary>
20794 </param>
20795 </interface>
20796 -<interface name="corenet_send_virtual_places_server_packets" lineno="91947">
20797 +<interface name="corenet_send_virtual_places_server_packets" lineno="92368">
20798 <summary>
20799 Send virtual_places_server packets.
20800 </summary>
20801 @@ -67123,7 +67743,7 @@ Domain allowed access.
20802 </param>
20803 <infoflow type="write" weight="10"/>
20804 </interface>
20805 -<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="91966">
20806 +<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="92387">
20807 <summary>
20808 Do not audit attempts to send virtual_places_server packets.
20809 </summary>
20810 @@ -67134,7 +67754,7 @@ Domain to not audit.
20811 </param>
20812 <infoflow type="none"/>
20813 </interface>
20814 -<interface name="corenet_receive_virtual_places_server_packets" lineno="91985">
20815 +<interface name="corenet_receive_virtual_places_server_packets" lineno="92406">
20816 <summary>
20817 Receive virtual_places_server packets.
20818 </summary>
20819 @@ -67145,7 +67765,7 @@ Domain allowed access.
20820 </param>
20821 <infoflow type="read" weight="10"/>
20822 </interface>
20823 -<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="92004">
20824 +<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="92425">
20825 <summary>
20826 Do not audit attempts to receive virtual_places_server packets.
20827 </summary>
20828 @@ -67156,7 +67776,7 @@ Domain allowed access.
20829 </param>
20830 <infoflow type="none"/>
20831 </interface>
20832 -<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="92023">
20833 +<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="92444">
20834 <summary>
20835 Send and receive virtual_places_server packets.
20836 </summary>
20837 @@ -67167,7 +67787,7 @@ Domain allowed access.
20838 </param>
20839 <infoflow type="both" weight="10"/>
20840 </interface>
20841 -<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="92039">
20842 +<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="92460">
20843 <summary>
20844 Do not audit attempts to send and receive virtual_places_server packets.
20845 </summary>
20846 @@ -67178,7 +67798,7 @@ Domain to not audit.
20847 </param>
20848 <infoflow type="none"/>
20849 </interface>
20850 -<interface name="corenet_relabelto_virtual_places_server_packets" lineno="92054">
20851 +<interface name="corenet_relabelto_virtual_places_server_packets" lineno="92475">
20852 <summary>
20853 Relabel packets to virtual_places_server the packet type.
20854 </summary>
20855 @@ -67188,7 +67808,7 @@ Domain allowed access.
20856 </summary>
20857 </param>
20858 </interface>
20859 -<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="92076">
20860 +<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="92497">
20861 <summary>
20862 Send and receive TCP traffic on the virt_migration port.
20863 </summary>
20864 @@ -67199,7 +67819,7 @@ Domain allowed access.
20865 </param>
20866 <infoflow type="both" weight="10"/>
20867 </interface>
20868 -<interface name="corenet_udp_send_virt_migration_port" lineno="92091">
20869 +<interface name="corenet_udp_send_virt_migration_port" lineno="92512">
20870 <summary>
20871 Send UDP traffic on the virt_migration port.
20872 </summary>
20873 @@ -67210,7 +67830,7 @@ Domain allowed access.
20874 </param>
20875 <infoflow type="write" weight="10"/>
20876 </interface>
20877 -<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="92106">
20878 +<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="92527">
20879 <summary>
20880 Do not audit attempts to send UDP traffic on the virt_migration port.
20881 </summary>
20882 @@ -67221,7 +67841,7 @@ Domain to not audit.
20883 </param>
20884 <infoflow type="none"/>
20885 </interface>
20886 -<interface name="corenet_udp_receive_virt_migration_port" lineno="92121">
20887 +<interface name="corenet_udp_receive_virt_migration_port" lineno="92542">
20888 <summary>
20889 Receive UDP traffic on the virt_migration port.
20890 </summary>
20891 @@ -67232,7 +67852,7 @@ Domain allowed access.
20892 </param>
20893 <infoflow type="read" weight="10"/>
20894 </interface>
20895 -<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="92136">
20896 +<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="92557">
20897 <summary>
20898 Do not audit attempts to receive UDP traffic on the virt_migration port.
20899 </summary>
20900 @@ -67243,7 +67863,7 @@ Domain to not audit.
20901 </param>
20902 <infoflow type="none"/>
20903 </interface>
20904 -<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="92151">
20905 +<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="92572">
20906 <summary>
20907 Send and receive UDP traffic on the virt_migration port.
20908 </summary>
20909 @@ -67254,7 +67874,7 @@ Domain allowed access.
20910 </param>
20911 <infoflow type="both" weight="10"/>
20912 </interface>
20913 -<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="92167">
20914 +<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="92588">
20915 <summary>
20916 Do not audit attempts to send and receive
20917 UDP traffic on the virt_migration port.
20918 @@ -67266,7 +67886,7 @@ Domain to not audit.
20919 </param>
20920 <infoflow type="none"/>
20921 </interface>
20922 -<interface name="corenet_tcp_bind_virt_migration_port" lineno="92182">
20923 +<interface name="corenet_tcp_bind_virt_migration_port" lineno="92603">
20924 <summary>
20925 Bind TCP sockets to the virt_migration port.
20926 </summary>
20927 @@ -67277,7 +67897,7 @@ Domain allowed access.
20928 </param>
20929 <infoflow type="none"/>
20930 </interface>
20931 -<interface name="corenet_udp_bind_virt_migration_port" lineno="92202">
20932 +<interface name="corenet_udp_bind_virt_migration_port" lineno="92623">
20933 <summary>
20934 Bind UDP sockets to the virt_migration port.
20935 </summary>
20936 @@ -67288,7 +67908,7 @@ Domain allowed access.
20937 </param>
20938 <infoflow type="none"/>
20939 </interface>
20940 -<interface name="corenet_tcp_connect_virt_migration_port" lineno="92221">
20941 +<interface name="corenet_tcp_connect_virt_migration_port" lineno="92642">
20942 <summary>
20943 Make a TCP connection to the virt_migration port.
20944 </summary>
20945 @@ -67298,7 +67918,7 @@ Domain allowed access.
20946 </summary>
20947 </param>
20948 </interface>
20949 -<interface name="corenet_send_virt_migration_client_packets" lineno="92241">
20950 +<interface name="corenet_send_virt_migration_client_packets" lineno="92662">
20951 <summary>
20952 Send virt_migration_client packets.
20953 </summary>
20954 @@ -67309,7 +67929,7 @@ Domain allowed access.
20955 </param>
20956 <infoflow type="write" weight="10"/>
20957 </interface>
20958 -<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="92260">
20959 +<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="92681">
20960 <summary>
20961 Do not audit attempts to send virt_migration_client packets.
20962 </summary>
20963 @@ -67320,7 +67940,7 @@ Domain to not audit.
20964 </param>
20965 <infoflow type="none"/>
20966 </interface>
20967 -<interface name="corenet_receive_virt_migration_client_packets" lineno="92279">
20968 +<interface name="corenet_receive_virt_migration_client_packets" lineno="92700">
20969 <summary>
20970 Receive virt_migration_client packets.
20971 </summary>
20972 @@ -67331,7 +67951,7 @@ Domain allowed access.
20973 </param>
20974 <infoflow type="read" weight="10"/>
20975 </interface>
20976 -<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="92298">
20977 +<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="92719">
20978 <summary>
20979 Do not audit attempts to receive virt_migration_client packets.
20980 </summary>
20981 @@ -67342,7 +67962,7 @@ Domain allowed access.
20982 </param>
20983 <infoflow type="none"/>
20984 </interface>
20985 -<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="92317">
20986 +<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="92738">
20987 <summary>
20988 Send and receive virt_migration_client packets.
20989 </summary>
20990 @@ -67353,7 +67973,7 @@ Domain allowed access.
20991 </param>
20992 <infoflow type="both" weight="10"/>
20993 </interface>
20994 -<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="92333">
20995 +<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="92754">
20996 <summary>
20997 Do not audit attempts to send and receive virt_migration_client packets.
20998 </summary>
20999 @@ -67364,7 +67984,7 @@ Domain to not audit.
21000 </param>
21001 <infoflow type="none"/>
21002 </interface>
21003 -<interface name="corenet_relabelto_virt_migration_client_packets" lineno="92348">
21004 +<interface name="corenet_relabelto_virt_migration_client_packets" lineno="92769">
21005 <summary>
21006 Relabel packets to virt_migration_client the packet type.
21007 </summary>
21008 @@ -67374,7 +67994,7 @@ Domain allowed access.
21009 </summary>
21010 </param>
21011 </interface>
21012 -<interface name="corenet_send_virt_migration_server_packets" lineno="92368">
21013 +<interface name="corenet_send_virt_migration_server_packets" lineno="92789">
21014 <summary>
21015 Send virt_migration_server packets.
21016 </summary>
21017 @@ -67385,7 +68005,7 @@ Domain allowed access.
21018 </param>
21019 <infoflow type="write" weight="10"/>
21020 </interface>
21021 -<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="92387">
21022 +<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="92808">
21023 <summary>
21024 Do not audit attempts to send virt_migration_server packets.
21025 </summary>
21026 @@ -67396,7 +68016,7 @@ Domain to not audit.
21027 </param>
21028 <infoflow type="none"/>
21029 </interface>
21030 -<interface name="corenet_receive_virt_migration_server_packets" lineno="92406">
21031 +<interface name="corenet_receive_virt_migration_server_packets" lineno="92827">
21032 <summary>
21033 Receive virt_migration_server packets.
21034 </summary>
21035 @@ -67407,7 +68027,7 @@ Domain allowed access.
21036 </param>
21037 <infoflow type="read" weight="10"/>
21038 </interface>
21039 -<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="92425">
21040 +<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="92846">
21041 <summary>
21042 Do not audit attempts to receive virt_migration_server packets.
21043 </summary>
21044 @@ -67418,7 +68038,7 @@ Domain allowed access.
21045 </param>
21046 <infoflow type="none"/>
21047 </interface>
21048 -<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="92444">
21049 +<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="92865">
21050 <summary>
21051 Send and receive virt_migration_server packets.
21052 </summary>
21053 @@ -67429,7 +68049,7 @@ Domain allowed access.
21054 </param>
21055 <infoflow type="both" weight="10"/>
21056 </interface>
21057 -<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="92460">
21058 +<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="92881">
21059 <summary>
21060 Do not audit attempts to send and receive virt_migration_server packets.
21061 </summary>
21062 @@ -67440,7 +68060,7 @@ Domain to not audit.
21063 </param>
21064 <infoflow type="none"/>
21065 </interface>
21066 -<interface name="corenet_relabelto_virt_migration_server_packets" lineno="92475">
21067 +<interface name="corenet_relabelto_virt_migration_server_packets" lineno="92896">
21068 <summary>
21069 Relabel packets to virt_migration_server the packet type.
21070 </summary>
21071 @@ -67450,7 +68070,7 @@ Domain allowed access.
21072 </summary>
21073 </param>
21074 </interface>
21075 -<interface name="corenet_tcp_sendrecv_vnc_port" lineno="92497">
21076 +<interface name="corenet_tcp_sendrecv_vnc_port" lineno="92918">
21077 <summary>
21078 Send and receive TCP traffic on the vnc port.
21079 </summary>
21080 @@ -67461,7 +68081,7 @@ Domain allowed access.
21081 </param>
21082 <infoflow type="both" weight="10"/>
21083 </interface>
21084 -<interface name="corenet_udp_send_vnc_port" lineno="92512">
21085 +<interface name="corenet_udp_send_vnc_port" lineno="92933">
21086 <summary>
21087 Send UDP traffic on the vnc port.
21088 </summary>
21089 @@ -67472,7 +68092,7 @@ Domain allowed access.
21090 </param>
21091 <infoflow type="write" weight="10"/>
21092 </interface>
21093 -<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="92527">
21094 +<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="92948">
21095 <summary>
21096 Do not audit attempts to send UDP traffic on the vnc port.
21097 </summary>
21098 @@ -67483,7 +68103,7 @@ Domain to not audit.
21099 </param>
21100 <infoflow type="none"/>
21101 </interface>
21102 -<interface name="corenet_udp_receive_vnc_port" lineno="92542">
21103 +<interface name="corenet_udp_receive_vnc_port" lineno="92963">
21104 <summary>
21105 Receive UDP traffic on the vnc port.
21106 </summary>
21107 @@ -67494,7 +68114,7 @@ Domain allowed access.
21108 </param>
21109 <infoflow type="read" weight="10"/>
21110 </interface>
21111 -<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="92557">
21112 +<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="92978">
21113 <summary>
21114 Do not audit attempts to receive UDP traffic on the vnc port.
21115 </summary>
21116 @@ -67505,7 +68125,7 @@ Domain to not audit.
21117 </param>
21118 <infoflow type="none"/>
21119 </interface>
21120 -<interface name="corenet_udp_sendrecv_vnc_port" lineno="92572">
21121 +<interface name="corenet_udp_sendrecv_vnc_port" lineno="92993">
21122 <summary>
21123 Send and receive UDP traffic on the vnc port.
21124 </summary>
21125 @@ -67516,7 +68136,7 @@ Domain allowed access.
21126 </param>
21127 <infoflow type="both" weight="10"/>
21128 </interface>
21129 -<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="92588">
21130 +<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="93009">
21131 <summary>
21132 Do not audit attempts to send and receive
21133 UDP traffic on the vnc port.
21134 @@ -67528,7 +68148,7 @@ Domain to not audit.
21135 </param>
21136 <infoflow type="none"/>
21137 </interface>
21138 -<interface name="corenet_tcp_bind_vnc_port" lineno="92603">
21139 +<interface name="corenet_tcp_bind_vnc_port" lineno="93024">
21140 <summary>
21141 Bind TCP sockets to the vnc port.
21142 </summary>
21143 @@ -67539,7 +68159,7 @@ Domain allowed access.
21144 </param>
21145 <infoflow type="none"/>
21146 </interface>
21147 -<interface name="corenet_udp_bind_vnc_port" lineno="92623">
21148 +<interface name="corenet_udp_bind_vnc_port" lineno="93044">
21149 <summary>
21150 Bind UDP sockets to the vnc port.
21151 </summary>
21152 @@ -67550,7 +68170,7 @@ Domain allowed access.
21153 </param>
21154 <infoflow type="none"/>
21155 </interface>
21156 -<interface name="corenet_tcp_connect_vnc_port" lineno="92642">
21157 +<interface name="corenet_tcp_connect_vnc_port" lineno="93063">
21158 <summary>
21159 Make a TCP connection to the vnc port.
21160 </summary>
21161 @@ -67560,7 +68180,7 @@ Domain allowed access.
21162 </summary>
21163 </param>
21164 </interface>
21165 -<interface name="corenet_send_vnc_client_packets" lineno="92662">
21166 +<interface name="corenet_send_vnc_client_packets" lineno="93083">
21167 <summary>
21168 Send vnc_client packets.
21169 </summary>
21170 @@ -67571,7 +68191,7 @@ Domain allowed access.
21171 </param>
21172 <infoflow type="write" weight="10"/>
21173 </interface>
21174 -<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="92681">
21175 +<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="93102">
21176 <summary>
21177 Do not audit attempts to send vnc_client packets.
21178 </summary>
21179 @@ -67582,7 +68202,7 @@ Domain to not audit.
21180 </param>
21181 <infoflow type="none"/>
21182 </interface>
21183 -<interface name="corenet_receive_vnc_client_packets" lineno="92700">
21184 +<interface name="corenet_receive_vnc_client_packets" lineno="93121">
21185 <summary>
21186 Receive vnc_client packets.
21187 </summary>
21188 @@ -67593,7 +68213,7 @@ Domain allowed access.
21189 </param>
21190 <infoflow type="read" weight="10"/>
21191 </interface>
21192 -<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="92719">
21193 +<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="93140">
21194 <summary>
21195 Do not audit attempts to receive vnc_client packets.
21196 </summary>
21197 @@ -67604,7 +68224,7 @@ Domain allowed access.
21198 </param>
21199 <infoflow type="none"/>
21200 </interface>
21201 -<interface name="corenet_sendrecv_vnc_client_packets" lineno="92738">
21202 +<interface name="corenet_sendrecv_vnc_client_packets" lineno="93159">
21203 <summary>
21204 Send and receive vnc_client packets.
21205 </summary>
21206 @@ -67615,7 +68235,7 @@ Domain allowed access.
21207 </param>
21208 <infoflow type="both" weight="10"/>
21209 </interface>
21210 -<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="92754">
21211 +<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="93175">
21212 <summary>
21213 Do not audit attempts to send and receive vnc_client packets.
21214 </summary>
21215 @@ -67626,7 +68246,7 @@ Domain to not audit.
21216 </param>
21217 <infoflow type="none"/>
21218 </interface>
21219 -<interface name="corenet_relabelto_vnc_client_packets" lineno="92769">
21220 +<interface name="corenet_relabelto_vnc_client_packets" lineno="93190">
21221 <summary>
21222 Relabel packets to vnc_client the packet type.
21223 </summary>
21224 @@ -67636,7 +68256,7 @@ Domain allowed access.
21225 </summary>
21226 </param>
21227 </interface>
21228 -<interface name="corenet_send_vnc_server_packets" lineno="92789">
21229 +<interface name="corenet_send_vnc_server_packets" lineno="93210">
21230 <summary>
21231 Send vnc_server packets.
21232 </summary>
21233 @@ -67647,7 +68267,7 @@ Domain allowed access.
21234 </param>
21235 <infoflow type="write" weight="10"/>
21236 </interface>
21237 -<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="92808">
21238 +<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="93229">
21239 <summary>
21240 Do not audit attempts to send vnc_server packets.
21241 </summary>
21242 @@ -67658,7 +68278,7 @@ Domain to not audit.
21243 </param>
21244 <infoflow type="none"/>
21245 </interface>
21246 -<interface name="corenet_receive_vnc_server_packets" lineno="92827">
21247 +<interface name="corenet_receive_vnc_server_packets" lineno="93248">
21248 <summary>
21249 Receive vnc_server packets.
21250 </summary>
21251 @@ -67669,7 +68289,7 @@ Domain allowed access.
21252 </param>
21253 <infoflow type="read" weight="10"/>
21254 </interface>
21255 -<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="92846">
21256 +<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="93267">
21257 <summary>
21258 Do not audit attempts to receive vnc_server packets.
21259 </summary>
21260 @@ -67680,7 +68300,7 @@ Domain allowed access.
21261 </param>
21262 <infoflow type="none"/>
21263 </interface>
21264 -<interface name="corenet_sendrecv_vnc_server_packets" lineno="92865">
21265 +<interface name="corenet_sendrecv_vnc_server_packets" lineno="93286">
21266 <summary>
21267 Send and receive vnc_server packets.
21268 </summary>
21269 @@ -67691,7 +68311,7 @@ Domain allowed access.
21270 </param>
21271 <infoflow type="both" weight="10"/>
21272 </interface>
21273 -<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="92881">
21274 +<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="93302">
21275 <summary>
21276 Do not audit attempts to send and receive vnc_server packets.
21277 </summary>
21278 @@ -67702,7 +68322,7 @@ Domain to not audit.
21279 </param>
21280 <infoflow type="none"/>
21281 </interface>
21282 -<interface name="corenet_relabelto_vnc_server_packets" lineno="92896">
21283 +<interface name="corenet_relabelto_vnc_server_packets" lineno="93317">
21284 <summary>
21285 Relabel packets to vnc_server the packet type.
21286 </summary>
21287 @@ -67712,7 +68332,7 @@ Domain allowed access.
21288 </summary>
21289 </param>
21290 </interface>
21291 -<interface name="corenet_tcp_sendrecv_wccp_port" lineno="92918">
21292 +<interface name="corenet_tcp_sendrecv_wccp_port" lineno="93339">
21293 <summary>
21294 Send and receive TCP traffic on the wccp port.
21295 </summary>
21296 @@ -67723,7 +68343,7 @@ Domain allowed access.
21297 </param>
21298 <infoflow type="both" weight="10"/>
21299 </interface>
21300 -<interface name="corenet_udp_send_wccp_port" lineno="92933">
21301 +<interface name="corenet_udp_send_wccp_port" lineno="93354">
21302 <summary>
21303 Send UDP traffic on the wccp port.
21304 </summary>
21305 @@ -67734,7 +68354,7 @@ Domain allowed access.
21306 </param>
21307 <infoflow type="write" weight="10"/>
21308 </interface>
21309 -<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="92948">
21310 +<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="93369">
21311 <summary>
21312 Do not audit attempts to send UDP traffic on the wccp port.
21313 </summary>
21314 @@ -67745,7 +68365,7 @@ Domain to not audit.
21315 </param>
21316 <infoflow type="none"/>
21317 </interface>
21318 -<interface name="corenet_udp_receive_wccp_port" lineno="92963">
21319 +<interface name="corenet_udp_receive_wccp_port" lineno="93384">
21320 <summary>
21321 Receive UDP traffic on the wccp port.
21322 </summary>
21323 @@ -67756,7 +68376,7 @@ Domain allowed access.
21324 </param>
21325 <infoflow type="read" weight="10"/>
21326 </interface>
21327 -<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="92978">
21328 +<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="93399">
21329 <summary>
21330 Do not audit attempts to receive UDP traffic on the wccp port.
21331 </summary>
21332 @@ -67767,7 +68387,7 @@ Domain to not audit.
21333 </param>
21334 <infoflow type="none"/>
21335 </interface>
21336 -<interface name="corenet_udp_sendrecv_wccp_port" lineno="92993">
21337 +<interface name="corenet_udp_sendrecv_wccp_port" lineno="93414">
21338 <summary>
21339 Send and receive UDP traffic on the wccp port.
21340 </summary>
21341 @@ -67778,7 +68398,7 @@ Domain allowed access.
21342 </param>
21343 <infoflow type="both" weight="10"/>
21344 </interface>
21345 -<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="93009">
21346 +<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="93430">
21347 <summary>
21348 Do not audit attempts to send and receive
21349 UDP traffic on the wccp port.
21350 @@ -67790,7 +68410,7 @@ Domain to not audit.
21351 </param>
21352 <infoflow type="none"/>
21353 </interface>
21354 -<interface name="corenet_tcp_bind_wccp_port" lineno="93024">
21355 +<interface name="corenet_tcp_bind_wccp_port" lineno="93445">
21356 <summary>
21357 Bind TCP sockets to the wccp port.
21358 </summary>
21359 @@ -67801,7 +68421,7 @@ Domain allowed access.
21360 </param>
21361 <infoflow type="none"/>
21362 </interface>
21363 -<interface name="corenet_udp_bind_wccp_port" lineno="93044">
21364 +<interface name="corenet_udp_bind_wccp_port" lineno="93465">
21365 <summary>
21366 Bind UDP sockets to the wccp port.
21367 </summary>
21368 @@ -67812,7 +68432,7 @@ Domain allowed access.
21369 </param>
21370 <infoflow type="none"/>
21371 </interface>
21372 -<interface name="corenet_tcp_connect_wccp_port" lineno="93063">
21373 +<interface name="corenet_tcp_connect_wccp_port" lineno="93484">
21374 <summary>
21375 Make a TCP connection to the wccp port.
21376 </summary>
21377 @@ -67822,7 +68442,7 @@ Domain allowed access.
21378 </summary>
21379 </param>
21380 </interface>
21381 -<interface name="corenet_send_wccp_client_packets" lineno="93083">
21382 +<interface name="corenet_send_wccp_client_packets" lineno="93504">
21383 <summary>
21384 Send wccp_client packets.
21385 </summary>
21386 @@ -67833,7 +68453,7 @@ Domain allowed access.
21387 </param>
21388 <infoflow type="write" weight="10"/>
21389 </interface>
21390 -<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="93102">
21391 +<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="93523">
21392 <summary>
21393 Do not audit attempts to send wccp_client packets.
21394 </summary>
21395 @@ -67844,7 +68464,7 @@ Domain to not audit.
21396 </param>
21397 <infoflow type="none"/>
21398 </interface>
21399 -<interface name="corenet_receive_wccp_client_packets" lineno="93121">
21400 +<interface name="corenet_receive_wccp_client_packets" lineno="93542">
21401 <summary>
21402 Receive wccp_client packets.
21403 </summary>
21404 @@ -67855,7 +68475,7 @@ Domain allowed access.
21405 </param>
21406 <infoflow type="read" weight="10"/>
21407 </interface>
21408 -<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="93140">
21409 +<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="93561">
21410 <summary>
21411 Do not audit attempts to receive wccp_client packets.
21412 </summary>
21413 @@ -67866,7 +68486,7 @@ Domain allowed access.
21414 </param>
21415 <infoflow type="none"/>
21416 </interface>
21417 -<interface name="corenet_sendrecv_wccp_client_packets" lineno="93159">
21418 +<interface name="corenet_sendrecv_wccp_client_packets" lineno="93580">
21419 <summary>
21420 Send and receive wccp_client packets.
21421 </summary>
21422 @@ -67877,7 +68497,7 @@ Domain allowed access.
21423 </param>
21424 <infoflow type="both" weight="10"/>
21425 </interface>
21426 -<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="93175">
21427 +<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="93596">
21428 <summary>
21429 Do not audit attempts to send and receive wccp_client packets.
21430 </summary>
21431 @@ -67888,7 +68508,7 @@ Domain to not audit.
21432 </param>
21433 <infoflow type="none"/>
21434 </interface>
21435 -<interface name="corenet_relabelto_wccp_client_packets" lineno="93190">
21436 +<interface name="corenet_relabelto_wccp_client_packets" lineno="93611">
21437 <summary>
21438 Relabel packets to wccp_client the packet type.
21439 </summary>
21440 @@ -67898,7 +68518,7 @@ Domain allowed access.
21441 </summary>
21442 </param>
21443 </interface>
21444 -<interface name="corenet_send_wccp_server_packets" lineno="93210">
21445 +<interface name="corenet_send_wccp_server_packets" lineno="93631">
21446 <summary>
21447 Send wccp_server packets.
21448 </summary>
21449 @@ -67909,7 +68529,7 @@ Domain allowed access.
21450 </param>
21451 <infoflow type="write" weight="10"/>
21452 </interface>
21453 -<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="93229">
21454 +<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="93650">
21455 <summary>
21456 Do not audit attempts to send wccp_server packets.
21457 </summary>
21458 @@ -67920,7 +68540,7 @@ Domain to not audit.
21459 </param>
21460 <infoflow type="none"/>
21461 </interface>
21462 -<interface name="corenet_receive_wccp_server_packets" lineno="93248">
21463 +<interface name="corenet_receive_wccp_server_packets" lineno="93669">
21464 <summary>
21465 Receive wccp_server packets.
21466 </summary>
21467 @@ -67931,7 +68551,7 @@ Domain allowed access.
21468 </param>
21469 <infoflow type="read" weight="10"/>
21470 </interface>
21471 -<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="93267">
21472 +<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="93688">
21473 <summary>
21474 Do not audit attempts to receive wccp_server packets.
21475 </summary>
21476 @@ -67942,7 +68562,7 @@ Domain allowed access.
21477 </param>
21478 <infoflow type="none"/>
21479 </interface>
21480 -<interface name="corenet_sendrecv_wccp_server_packets" lineno="93286">
21481 +<interface name="corenet_sendrecv_wccp_server_packets" lineno="93707">
21482 <summary>
21483 Send and receive wccp_server packets.
21484 </summary>
21485 @@ -67953,7 +68573,7 @@ Domain allowed access.
21486 </param>
21487 <infoflow type="both" weight="10"/>
21488 </interface>
21489 -<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="93302">
21490 +<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="93723">
21491 <summary>
21492 Do not audit attempts to send and receive wccp_server packets.
21493 </summary>
21494 @@ -67964,7 +68584,7 @@ Domain to not audit.
21495 </param>
21496 <infoflow type="none"/>
21497 </interface>
21498 -<interface name="corenet_relabelto_wccp_server_packets" lineno="93317">
21499 +<interface name="corenet_relabelto_wccp_server_packets" lineno="93738">
21500 <summary>
21501 Relabel packets to wccp_server the packet type.
21502 </summary>
21503 @@ -67974,7 +68594,7 @@ Domain allowed access.
21504 </summary>
21505 </param>
21506 </interface>
21507 -<interface name="corenet_tcp_sendrecv_websm_port" lineno="93339">
21508 +<interface name="corenet_tcp_sendrecv_websm_port" lineno="93760">
21509 <summary>
21510 Send and receive TCP traffic on the websm port.
21511 </summary>
21512 @@ -67985,7 +68605,7 @@ Domain allowed access.
21513 </param>
21514 <infoflow type="both" weight="10"/>
21515 </interface>
21516 -<interface name="corenet_udp_send_websm_port" lineno="93354">
21517 +<interface name="corenet_udp_send_websm_port" lineno="93775">
21518 <summary>
21519 Send UDP traffic on the websm port.
21520 </summary>
21521 @@ -67996,7 +68616,7 @@ Domain allowed access.
21522 </param>
21523 <infoflow type="write" weight="10"/>
21524 </interface>
21525 -<interface name="corenet_dontaudit_udp_send_websm_port" lineno="93369">
21526 +<interface name="corenet_dontaudit_udp_send_websm_port" lineno="93790">
21527 <summary>
21528 Do not audit attempts to send UDP traffic on the websm port.
21529 </summary>
21530 @@ -68007,7 +68627,7 @@ Domain to not audit.
21531 </param>
21532 <infoflow type="none"/>
21533 </interface>
21534 -<interface name="corenet_udp_receive_websm_port" lineno="93384">
21535 +<interface name="corenet_udp_receive_websm_port" lineno="93805">
21536 <summary>
21537 Receive UDP traffic on the websm port.
21538 </summary>
21539 @@ -68018,7 +68638,7 @@ Domain allowed access.
21540 </param>
21541 <infoflow type="read" weight="10"/>
21542 </interface>
21543 -<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="93399">
21544 +<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="93820">
21545 <summary>
21546 Do not audit attempts to receive UDP traffic on the websm port.
21547 </summary>
21548 @@ -68029,7 +68649,7 @@ Domain to not audit.
21549 </param>
21550 <infoflow type="none"/>
21551 </interface>
21552 -<interface name="corenet_udp_sendrecv_websm_port" lineno="93414">
21553 +<interface name="corenet_udp_sendrecv_websm_port" lineno="93835">
21554 <summary>
21555 Send and receive UDP traffic on the websm port.
21556 </summary>
21557 @@ -68040,7 +68660,7 @@ Domain allowed access.
21558 </param>
21559 <infoflow type="both" weight="10"/>
21560 </interface>
21561 -<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="93430">
21562 +<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="93851">
21563 <summary>
21564 Do not audit attempts to send and receive
21565 UDP traffic on the websm port.
21566 @@ -68052,7 +68672,7 @@ Domain to not audit.
21567 </param>
21568 <infoflow type="none"/>
21569 </interface>
21570 -<interface name="corenet_tcp_bind_websm_port" lineno="93445">
21571 +<interface name="corenet_tcp_bind_websm_port" lineno="93866">
21572 <summary>
21573 Bind TCP sockets to the websm port.
21574 </summary>
21575 @@ -68063,7 +68683,7 @@ Domain allowed access.
21576 </param>
21577 <infoflow type="none"/>
21578 </interface>
21579 -<interface name="corenet_udp_bind_websm_port" lineno="93465">
21580 +<interface name="corenet_udp_bind_websm_port" lineno="93886">
21581 <summary>
21582 Bind UDP sockets to the websm port.
21583 </summary>
21584 @@ -68074,7 +68694,7 @@ Domain allowed access.
21585 </param>
21586 <infoflow type="none"/>
21587 </interface>
21588 -<interface name="corenet_tcp_connect_websm_port" lineno="93484">
21589 +<interface name="corenet_tcp_connect_websm_port" lineno="93905">
21590 <summary>
21591 Make a TCP connection to the websm port.
21592 </summary>
21593 @@ -68084,7 +68704,7 @@ Domain allowed access.
21594 </summary>
21595 </param>
21596 </interface>
21597 -<interface name="corenet_send_websm_client_packets" lineno="93504">
21598 +<interface name="corenet_send_websm_client_packets" lineno="93925">
21599 <summary>
21600 Send websm_client packets.
21601 </summary>
21602 @@ -68095,7 +68715,7 @@ Domain allowed access.
21603 </param>
21604 <infoflow type="write" weight="10"/>
21605 </interface>
21606 -<interface name="corenet_dontaudit_send_websm_client_packets" lineno="93523">
21607 +<interface name="corenet_dontaudit_send_websm_client_packets" lineno="93944">
21608 <summary>
21609 Do not audit attempts to send websm_client packets.
21610 </summary>
21611 @@ -68106,7 +68726,7 @@ Domain to not audit.
21612 </param>
21613 <infoflow type="none"/>
21614 </interface>
21615 -<interface name="corenet_receive_websm_client_packets" lineno="93542">
21616 +<interface name="corenet_receive_websm_client_packets" lineno="93963">
21617 <summary>
21618 Receive websm_client packets.
21619 </summary>
21620 @@ -68117,7 +68737,7 @@ Domain allowed access.
21621 </param>
21622 <infoflow type="read" weight="10"/>
21623 </interface>
21624 -<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="93561">
21625 +<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="93982">
21626 <summary>
21627 Do not audit attempts to receive websm_client packets.
21628 </summary>
21629 @@ -68128,7 +68748,7 @@ Domain allowed access.
21630 </param>
21631 <infoflow type="none"/>
21632 </interface>
21633 -<interface name="corenet_sendrecv_websm_client_packets" lineno="93580">
21634 +<interface name="corenet_sendrecv_websm_client_packets" lineno="94001">
21635 <summary>
21636 Send and receive websm_client packets.
21637 </summary>
21638 @@ -68139,7 +68759,7 @@ Domain allowed access.
21639 </param>
21640 <infoflow type="both" weight="10"/>
21641 </interface>
21642 -<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="93596">
21643 +<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="94017">
21644 <summary>
21645 Do not audit attempts to send and receive websm_client packets.
21646 </summary>
21647 @@ -68150,7 +68770,7 @@ Domain to not audit.
21648 </param>
21649 <infoflow type="none"/>
21650 </interface>
21651 -<interface name="corenet_relabelto_websm_client_packets" lineno="93611">
21652 +<interface name="corenet_relabelto_websm_client_packets" lineno="94032">
21653 <summary>
21654 Relabel packets to websm_client the packet type.
21655 </summary>
21656 @@ -68160,7 +68780,7 @@ Domain allowed access.
21657 </summary>
21658 </param>
21659 </interface>
21660 -<interface name="corenet_send_websm_server_packets" lineno="93631">
21661 +<interface name="corenet_send_websm_server_packets" lineno="94052">
21662 <summary>
21663 Send websm_server packets.
21664 </summary>
21665 @@ -68171,7 +68791,7 @@ Domain allowed access.
21666 </param>
21667 <infoflow type="write" weight="10"/>
21668 </interface>
21669 -<interface name="corenet_dontaudit_send_websm_server_packets" lineno="93650">
21670 +<interface name="corenet_dontaudit_send_websm_server_packets" lineno="94071">
21671 <summary>
21672 Do not audit attempts to send websm_server packets.
21673 </summary>
21674 @@ -68182,7 +68802,7 @@ Domain to not audit.
21675 </param>
21676 <infoflow type="none"/>
21677 </interface>
21678 -<interface name="corenet_receive_websm_server_packets" lineno="93669">
21679 +<interface name="corenet_receive_websm_server_packets" lineno="94090">
21680 <summary>
21681 Receive websm_server packets.
21682 </summary>
21683 @@ -68193,7 +68813,7 @@ Domain allowed access.
21684 </param>
21685 <infoflow type="read" weight="10"/>
21686 </interface>
21687 -<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="93688">
21688 +<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="94109">
21689 <summary>
21690 Do not audit attempts to receive websm_server packets.
21691 </summary>
21692 @@ -68204,7 +68824,7 @@ Domain allowed access.
21693 </param>
21694 <infoflow type="none"/>
21695 </interface>
21696 -<interface name="corenet_sendrecv_websm_server_packets" lineno="93707">
21697 +<interface name="corenet_sendrecv_websm_server_packets" lineno="94128">
21698 <summary>
21699 Send and receive websm_server packets.
21700 </summary>
21701 @@ -68215,7 +68835,7 @@ Domain allowed access.
21702 </param>
21703 <infoflow type="both" weight="10"/>
21704 </interface>
21705 -<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="93723">
21706 +<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="94144">
21707 <summary>
21708 Do not audit attempts to send and receive websm_server packets.
21709 </summary>
21710 @@ -68226,7 +68846,7 @@ Domain to not audit.
21711 </param>
21712 <infoflow type="none"/>
21713 </interface>
21714 -<interface name="corenet_relabelto_websm_server_packets" lineno="93738">
21715 +<interface name="corenet_relabelto_websm_server_packets" lineno="94159">
21716 <summary>
21717 Relabel packets to websm_server the packet type.
21718 </summary>
21719 @@ -68236,7 +68856,7 @@ Domain allowed access.
21720 </summary>
21721 </param>
21722 </interface>
21723 -<interface name="corenet_tcp_sendrecv_whois_port" lineno="93760">
21724 +<interface name="corenet_tcp_sendrecv_whois_port" lineno="94181">
21725 <summary>
21726 Send and receive TCP traffic on the whois port.
21727 </summary>
21728 @@ -68247,7 +68867,7 @@ Domain allowed access.
21729 </param>
21730 <infoflow type="both" weight="10"/>
21731 </interface>
21732 -<interface name="corenet_udp_send_whois_port" lineno="93775">
21733 +<interface name="corenet_udp_send_whois_port" lineno="94196">
21734 <summary>
21735 Send UDP traffic on the whois port.
21736 </summary>
21737 @@ -68258,7 +68878,7 @@ Domain allowed access.
21738 </param>
21739 <infoflow type="write" weight="10"/>
21740 </interface>
21741 -<interface name="corenet_dontaudit_udp_send_whois_port" lineno="93790">
21742 +<interface name="corenet_dontaudit_udp_send_whois_port" lineno="94211">
21743 <summary>
21744 Do not audit attempts to send UDP traffic on the whois port.
21745 </summary>
21746 @@ -68269,7 +68889,7 @@ Domain to not audit.
21747 </param>
21748 <infoflow type="none"/>
21749 </interface>
21750 -<interface name="corenet_udp_receive_whois_port" lineno="93805">
21751 +<interface name="corenet_udp_receive_whois_port" lineno="94226">
21752 <summary>
21753 Receive UDP traffic on the whois port.
21754 </summary>
21755 @@ -68280,7 +68900,7 @@ Domain allowed access.
21756 </param>
21757 <infoflow type="read" weight="10"/>
21758 </interface>
21759 -<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="93820">
21760 +<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="94241">
21761 <summary>
21762 Do not audit attempts to receive UDP traffic on the whois port.
21763 </summary>
21764 @@ -68291,7 +68911,7 @@ Domain to not audit.
21765 </param>
21766 <infoflow type="none"/>
21767 </interface>
21768 -<interface name="corenet_udp_sendrecv_whois_port" lineno="93835">
21769 +<interface name="corenet_udp_sendrecv_whois_port" lineno="94256">
21770 <summary>
21771 Send and receive UDP traffic on the whois port.
21772 </summary>
21773 @@ -68302,7 +68922,7 @@ Domain allowed access.
21774 </param>
21775 <infoflow type="both" weight="10"/>
21776 </interface>
21777 -<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="93851">
21778 +<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="94272">
21779 <summary>
21780 Do not audit attempts to send and receive
21781 UDP traffic on the whois port.
21782 @@ -68314,7 +68934,7 @@ Domain to not audit.
21783 </param>
21784 <infoflow type="none"/>
21785 </interface>
21786 -<interface name="corenet_tcp_bind_whois_port" lineno="93866">
21787 +<interface name="corenet_tcp_bind_whois_port" lineno="94287">
21788 <summary>
21789 Bind TCP sockets to the whois port.
21790 </summary>
21791 @@ -68325,7 +68945,7 @@ Domain allowed access.
21792 </param>
21793 <infoflow type="none"/>
21794 </interface>
21795 -<interface name="corenet_udp_bind_whois_port" lineno="93886">
21796 +<interface name="corenet_udp_bind_whois_port" lineno="94307">
21797 <summary>
21798 Bind UDP sockets to the whois port.
21799 </summary>
21800 @@ -68336,7 +68956,7 @@ Domain allowed access.
21801 </param>
21802 <infoflow type="none"/>
21803 </interface>
21804 -<interface name="corenet_tcp_connect_whois_port" lineno="93905">
21805 +<interface name="corenet_tcp_connect_whois_port" lineno="94326">
21806 <summary>
21807 Make a TCP connection to the whois port.
21808 </summary>
21809 @@ -68346,7 +68966,7 @@ Domain allowed access.
21810 </summary>
21811 </param>
21812 </interface>
21813 -<interface name="corenet_send_whois_client_packets" lineno="93925">
21814 +<interface name="corenet_send_whois_client_packets" lineno="94346">
21815 <summary>
21816 Send whois_client packets.
21817 </summary>
21818 @@ -68357,7 +68977,7 @@ Domain allowed access.
21819 </param>
21820 <infoflow type="write" weight="10"/>
21821 </interface>
21822 -<interface name="corenet_dontaudit_send_whois_client_packets" lineno="93944">
21823 +<interface name="corenet_dontaudit_send_whois_client_packets" lineno="94365">
21824 <summary>
21825 Do not audit attempts to send whois_client packets.
21826 </summary>
21827 @@ -68368,7 +68988,7 @@ Domain to not audit.
21828 </param>
21829 <infoflow type="none"/>
21830 </interface>
21831 -<interface name="corenet_receive_whois_client_packets" lineno="93963">
21832 +<interface name="corenet_receive_whois_client_packets" lineno="94384">
21833 <summary>
21834 Receive whois_client packets.
21835 </summary>
21836 @@ -68379,7 +68999,7 @@ Domain allowed access.
21837 </param>
21838 <infoflow type="read" weight="10"/>
21839 </interface>
21840 -<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="93982">
21841 +<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="94403">
21842 <summary>
21843 Do not audit attempts to receive whois_client packets.
21844 </summary>
21845 @@ -68390,7 +69010,7 @@ Domain allowed access.
21846 </param>
21847 <infoflow type="none"/>
21848 </interface>
21849 -<interface name="corenet_sendrecv_whois_client_packets" lineno="94001">
21850 +<interface name="corenet_sendrecv_whois_client_packets" lineno="94422">
21851 <summary>
21852 Send and receive whois_client packets.
21853 </summary>
21854 @@ -68401,7 +69021,7 @@ Domain allowed access.
21855 </param>
21856 <infoflow type="both" weight="10"/>
21857 </interface>
21858 -<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="94017">
21859 +<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="94438">
21860 <summary>
21861 Do not audit attempts to send and receive whois_client packets.
21862 </summary>
21863 @@ -68412,7 +69032,7 @@ Domain to not audit.
21864 </param>
21865 <infoflow type="none"/>
21866 </interface>
21867 -<interface name="corenet_relabelto_whois_client_packets" lineno="94032">
21868 +<interface name="corenet_relabelto_whois_client_packets" lineno="94453">
21869 <summary>
21870 Relabel packets to whois_client the packet type.
21871 </summary>
21872 @@ -68422,7 +69042,7 @@ Domain allowed access.
21873 </summary>
21874 </param>
21875 </interface>
21876 -<interface name="corenet_send_whois_server_packets" lineno="94052">
21877 +<interface name="corenet_send_whois_server_packets" lineno="94473">
21878 <summary>
21879 Send whois_server packets.
21880 </summary>
21881 @@ -68433,7 +69053,7 @@ Domain allowed access.
21882 </param>
21883 <infoflow type="write" weight="10"/>
21884 </interface>
21885 -<interface name="corenet_dontaudit_send_whois_server_packets" lineno="94071">
21886 +<interface name="corenet_dontaudit_send_whois_server_packets" lineno="94492">
21887 <summary>
21888 Do not audit attempts to send whois_server packets.
21889 </summary>
21890 @@ -68444,7 +69064,7 @@ Domain to not audit.
21891 </param>
21892 <infoflow type="none"/>
21893 </interface>
21894 -<interface name="corenet_receive_whois_server_packets" lineno="94090">
21895 +<interface name="corenet_receive_whois_server_packets" lineno="94511">
21896 <summary>
21897 Receive whois_server packets.
21898 </summary>
21899 @@ -68455,7 +69075,7 @@ Domain allowed access.
21900 </param>
21901 <infoflow type="read" weight="10"/>
21902 </interface>
21903 -<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="94109">
21904 +<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="94530">
21905 <summary>
21906 Do not audit attempts to receive whois_server packets.
21907 </summary>
21908 @@ -68466,7 +69086,7 @@ Domain allowed access.
21909 </param>
21910 <infoflow type="none"/>
21911 </interface>
21912 -<interface name="corenet_sendrecv_whois_server_packets" lineno="94128">
21913 +<interface name="corenet_sendrecv_whois_server_packets" lineno="94549">
21914 <summary>
21915 Send and receive whois_server packets.
21916 </summary>
21917 @@ -68477,7 +69097,7 @@ Domain allowed access.
21918 </param>
21919 <infoflow type="both" weight="10"/>
21920 </interface>
21921 -<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="94144">
21922 +<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="94565">
21923 <summary>
21924 Do not audit attempts to send and receive whois_server packets.
21925 </summary>
21926 @@ -68488,7 +69108,7 @@ Domain to not audit.
21927 </param>
21928 <infoflow type="none"/>
21929 </interface>
21930 -<interface name="corenet_relabelto_whois_server_packets" lineno="94159">
21931 +<interface name="corenet_relabelto_whois_server_packets" lineno="94580">
21932 <summary>
21933 Relabel packets to whois_server the packet type.
21934 </summary>
21935 @@ -68498,7 +69118,7 @@ Domain allowed access.
21936 </summary>
21937 </param>
21938 </interface>
21939 -<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="94181">
21940 +<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="94602">
21941 <summary>
21942 Send and receive TCP traffic on the winshadow port.
21943 </summary>
21944 @@ -68509,7 +69129,7 @@ Domain allowed access.
21945 </param>
21946 <infoflow type="both" weight="10"/>
21947 </interface>
21948 -<interface name="corenet_udp_send_winshadow_port" lineno="94196">
21949 +<interface name="corenet_udp_send_winshadow_port" lineno="94617">
21950 <summary>
21951 Send UDP traffic on the winshadow port.
21952 </summary>
21953 @@ -68520,7 +69140,7 @@ Domain allowed access.
21954 </param>
21955 <infoflow type="write" weight="10"/>
21956 </interface>
21957 -<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="94211">
21958 +<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="94632">
21959 <summary>
21960 Do not audit attempts to send UDP traffic on the winshadow port.
21961 </summary>
21962 @@ -68531,7 +69151,7 @@ Domain to not audit.
21963 </param>
21964 <infoflow type="none"/>
21965 </interface>
21966 -<interface name="corenet_udp_receive_winshadow_port" lineno="94226">
21967 +<interface name="corenet_udp_receive_winshadow_port" lineno="94647">
21968 <summary>
21969 Receive UDP traffic on the winshadow port.
21970 </summary>
21971 @@ -68542,7 +69162,7 @@ Domain allowed access.
21972 </param>
21973 <infoflow type="read" weight="10"/>
21974 </interface>
21975 -<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="94241">
21976 +<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="94662">
21977 <summary>
21978 Do not audit attempts to receive UDP traffic on the winshadow port.
21979 </summary>
21980 @@ -68553,7 +69173,7 @@ Domain to not audit.
21981 </param>
21982 <infoflow type="none"/>
21983 </interface>
21984 -<interface name="corenet_udp_sendrecv_winshadow_port" lineno="94256">
21985 +<interface name="corenet_udp_sendrecv_winshadow_port" lineno="94677">
21986 <summary>
21987 Send and receive UDP traffic on the winshadow port.
21988 </summary>
21989 @@ -68564,7 +69184,7 @@ Domain allowed access.
21990 </param>
21991 <infoflow type="both" weight="10"/>
21992 </interface>
21993 -<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="94272">
21994 +<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="94693">
21995 <summary>
21996 Do not audit attempts to send and receive
21997 UDP traffic on the winshadow port.
21998 @@ -68576,7 +69196,7 @@ Domain to not audit.
21999 </param>
22000 <infoflow type="none"/>
22001 </interface>
22002 -<interface name="corenet_tcp_bind_winshadow_port" lineno="94287">
22003 +<interface name="corenet_tcp_bind_winshadow_port" lineno="94708">
22004 <summary>
22005 Bind TCP sockets to the winshadow port.
22006 </summary>
22007 @@ -68587,7 +69207,7 @@ Domain allowed access.
22008 </param>
22009 <infoflow type="none"/>
22010 </interface>
22011 -<interface name="corenet_udp_bind_winshadow_port" lineno="94307">
22012 +<interface name="corenet_udp_bind_winshadow_port" lineno="94728">
22013 <summary>
22014 Bind UDP sockets to the winshadow port.
22015 </summary>
22016 @@ -68598,7 +69218,7 @@ Domain allowed access.
22017 </param>
22018 <infoflow type="none"/>
22019 </interface>
22020 -<interface name="corenet_tcp_connect_winshadow_port" lineno="94326">
22021 +<interface name="corenet_tcp_connect_winshadow_port" lineno="94747">
22022 <summary>
22023 Make a TCP connection to the winshadow port.
22024 </summary>
22025 @@ -68608,7 +69228,7 @@ Domain allowed access.
22026 </summary>
22027 </param>
22028 </interface>
22029 -<interface name="corenet_send_winshadow_client_packets" lineno="94346">
22030 +<interface name="corenet_send_winshadow_client_packets" lineno="94767">
22031 <summary>
22032 Send winshadow_client packets.
22033 </summary>
22034 @@ -68619,7 +69239,7 @@ Domain allowed access.
22035 </param>
22036 <infoflow type="write" weight="10"/>
22037 </interface>
22038 -<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="94365">
22039 +<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="94786">
22040 <summary>
22041 Do not audit attempts to send winshadow_client packets.
22042 </summary>
22043 @@ -68630,7 +69250,7 @@ Domain to not audit.
22044 </param>
22045 <infoflow type="none"/>
22046 </interface>
22047 -<interface name="corenet_receive_winshadow_client_packets" lineno="94384">
22048 +<interface name="corenet_receive_winshadow_client_packets" lineno="94805">
22049 <summary>
22050 Receive winshadow_client packets.
22051 </summary>
22052 @@ -68641,7 +69261,7 @@ Domain allowed access.
22053 </param>
22054 <infoflow type="read" weight="10"/>
22055 </interface>
22056 -<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="94403">
22057 +<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="94824">
22058 <summary>
22059 Do not audit attempts to receive winshadow_client packets.
22060 </summary>
22061 @@ -68652,7 +69272,7 @@ Domain allowed access.
22062 </param>
22063 <infoflow type="none"/>
22064 </interface>
22065 -<interface name="corenet_sendrecv_winshadow_client_packets" lineno="94422">
22066 +<interface name="corenet_sendrecv_winshadow_client_packets" lineno="94843">
22067 <summary>
22068 Send and receive winshadow_client packets.
22069 </summary>
22070 @@ -68663,7 +69283,7 @@ Domain allowed access.
22071 </param>
22072 <infoflow type="both" weight="10"/>
22073 </interface>
22074 -<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="94438">
22075 +<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="94859">
22076 <summary>
22077 Do not audit attempts to send and receive winshadow_client packets.
22078 </summary>
22079 @@ -68674,7 +69294,7 @@ Domain to not audit.
22080 </param>
22081 <infoflow type="none"/>
22082 </interface>
22083 -<interface name="corenet_relabelto_winshadow_client_packets" lineno="94453">
22084 +<interface name="corenet_relabelto_winshadow_client_packets" lineno="94874">
22085 <summary>
22086 Relabel packets to winshadow_client the packet type.
22087 </summary>
22088 @@ -68684,7 +69304,7 @@ Domain allowed access.
22089 </summary>
22090 </param>
22091 </interface>
22092 -<interface name="corenet_send_winshadow_server_packets" lineno="94473">
22093 +<interface name="corenet_send_winshadow_server_packets" lineno="94894">
22094 <summary>
22095 Send winshadow_server packets.
22096 </summary>
22097 @@ -68695,7 +69315,7 @@ Domain allowed access.
22098 </param>
22099 <infoflow type="write" weight="10"/>
22100 </interface>
22101 -<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="94492">
22102 +<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="94913">
22103 <summary>
22104 Do not audit attempts to send winshadow_server packets.
22105 </summary>
22106 @@ -68706,7 +69326,7 @@ Domain to not audit.
22107 </param>
22108 <infoflow type="none"/>
22109 </interface>
22110 -<interface name="corenet_receive_winshadow_server_packets" lineno="94511">
22111 +<interface name="corenet_receive_winshadow_server_packets" lineno="94932">
22112 <summary>
22113 Receive winshadow_server packets.
22114 </summary>
22115 @@ -68717,7 +69337,7 @@ Domain allowed access.
22116 </param>
22117 <infoflow type="read" weight="10"/>
22118 </interface>
22119 -<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="94530">
22120 +<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="94951">
22121 <summary>
22122 Do not audit attempts to receive winshadow_server packets.
22123 </summary>
22124 @@ -68728,7 +69348,7 @@ Domain allowed access.
22125 </param>
22126 <infoflow type="none"/>
22127 </interface>
22128 -<interface name="corenet_sendrecv_winshadow_server_packets" lineno="94549">
22129 +<interface name="corenet_sendrecv_winshadow_server_packets" lineno="94970">
22130 <summary>
22131 Send and receive winshadow_server packets.
22132 </summary>
22133 @@ -68739,7 +69359,7 @@ Domain allowed access.
22134 </param>
22135 <infoflow type="both" weight="10"/>
22136 </interface>
22137 -<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="94565">
22138 +<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="94986">
22139 <summary>
22140 Do not audit attempts to send and receive winshadow_server packets.
22141 </summary>
22142 @@ -68750,7 +69370,7 @@ Domain to not audit.
22143 </param>
22144 <infoflow type="none"/>
22145 </interface>
22146 -<interface name="corenet_relabelto_winshadow_server_packets" lineno="94580">
22147 +<interface name="corenet_relabelto_winshadow_server_packets" lineno="95001">
22148 <summary>
22149 Relabel packets to winshadow_server the packet type.
22150 </summary>
22151 @@ -68760,7 +69380,7 @@ Domain allowed access.
22152 </summary>
22153 </param>
22154 </interface>
22155 -<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="94602">
22156 +<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="95023">
22157 <summary>
22158 Send and receive TCP traffic on the wsdapi port.
22159 </summary>
22160 @@ -68771,7 +69391,7 @@ Domain allowed access.
22161 </param>
22162 <infoflow type="both" weight="10"/>
22163 </interface>
22164 -<interface name="corenet_udp_send_wsdapi_port" lineno="94617">
22165 +<interface name="corenet_udp_send_wsdapi_port" lineno="95038">
22166 <summary>
22167 Send UDP traffic on the wsdapi port.
22168 </summary>
22169 @@ -68782,7 +69402,7 @@ Domain allowed access.
22170 </param>
22171 <infoflow type="write" weight="10"/>
22172 </interface>
22173 -<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="94632">
22174 +<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="95053">
22175 <summary>
22176 Do not audit attempts to send UDP traffic on the wsdapi port.
22177 </summary>
22178 @@ -68793,7 +69413,7 @@ Domain to not audit.
22179 </param>
22180 <infoflow type="none"/>
22181 </interface>
22182 -<interface name="corenet_udp_receive_wsdapi_port" lineno="94647">
22183 +<interface name="corenet_udp_receive_wsdapi_port" lineno="95068">
22184 <summary>
22185 Receive UDP traffic on the wsdapi port.
22186 </summary>
22187 @@ -68804,7 +69424,7 @@ Domain allowed access.
22188 </param>
22189 <infoflow type="read" weight="10"/>
22190 </interface>
22191 -<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="94662">
22192 +<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="95083">
22193 <summary>
22194 Do not audit attempts to receive UDP traffic on the wsdapi port.
22195 </summary>
22196 @@ -68815,7 +69435,7 @@ Domain to not audit.
22197 </param>
22198 <infoflow type="none"/>
22199 </interface>
22200 -<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="94677">
22201 +<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="95098">
22202 <summary>
22203 Send and receive UDP traffic on the wsdapi port.
22204 </summary>
22205 @@ -68826,7 +69446,7 @@ Domain allowed access.
22206 </param>
22207 <infoflow type="both" weight="10"/>
22208 </interface>
22209 -<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="94693">
22210 +<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="95114">
22211 <summary>
22212 Do not audit attempts to send and receive
22213 UDP traffic on the wsdapi port.
22214 @@ -68838,7 +69458,7 @@ Domain to not audit.
22215 </param>
22216 <infoflow type="none"/>
22217 </interface>
22218 -<interface name="corenet_tcp_bind_wsdapi_port" lineno="94708">
22219 +<interface name="corenet_tcp_bind_wsdapi_port" lineno="95129">
22220 <summary>
22221 Bind TCP sockets to the wsdapi port.
22222 </summary>
22223 @@ -68849,7 +69469,7 @@ Domain allowed access.
22224 </param>
22225 <infoflow type="none"/>
22226 </interface>
22227 -<interface name="corenet_udp_bind_wsdapi_port" lineno="94728">
22228 +<interface name="corenet_udp_bind_wsdapi_port" lineno="95149">
22229 <summary>
22230 Bind UDP sockets to the wsdapi port.
22231 </summary>
22232 @@ -68860,7 +69480,7 @@ Domain allowed access.
22233 </param>
22234 <infoflow type="none"/>
22235 </interface>
22236 -<interface name="corenet_tcp_connect_wsdapi_port" lineno="94747">
22237 +<interface name="corenet_tcp_connect_wsdapi_port" lineno="95168">
22238 <summary>
22239 Make a TCP connection to the wsdapi port.
22240 </summary>
22241 @@ -68870,7 +69490,7 @@ Domain allowed access.
22242 </summary>
22243 </param>
22244 </interface>
22245 -<interface name="corenet_send_wsdapi_client_packets" lineno="94767">
22246 +<interface name="corenet_send_wsdapi_client_packets" lineno="95188">
22247 <summary>
22248 Send wsdapi_client packets.
22249 </summary>
22250 @@ -68881,7 +69501,7 @@ Domain allowed access.
22251 </param>
22252 <infoflow type="write" weight="10"/>
22253 </interface>
22254 -<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="94786">
22255 +<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="95207">
22256 <summary>
22257 Do not audit attempts to send wsdapi_client packets.
22258 </summary>
22259 @@ -68892,7 +69512,7 @@ Domain to not audit.
22260 </param>
22261 <infoflow type="none"/>
22262 </interface>
22263 -<interface name="corenet_receive_wsdapi_client_packets" lineno="94805">
22264 +<interface name="corenet_receive_wsdapi_client_packets" lineno="95226">
22265 <summary>
22266 Receive wsdapi_client packets.
22267 </summary>
22268 @@ -68903,7 +69523,7 @@ Domain allowed access.
22269 </param>
22270 <infoflow type="read" weight="10"/>
22271 </interface>
22272 -<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="94824">
22273 +<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="95245">
22274 <summary>
22275 Do not audit attempts to receive wsdapi_client packets.
22276 </summary>
22277 @@ -68914,7 +69534,7 @@ Domain allowed access.
22278 </param>
22279 <infoflow type="none"/>
22280 </interface>
22281 -<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="94843">
22282 +<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="95264">
22283 <summary>
22284 Send and receive wsdapi_client packets.
22285 </summary>
22286 @@ -68925,7 +69545,7 @@ Domain allowed access.
22287 </param>
22288 <infoflow type="both" weight="10"/>
22289 </interface>
22290 -<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="94859">
22291 +<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="95280">
22292 <summary>
22293 Do not audit attempts to send and receive wsdapi_client packets.
22294 </summary>
22295 @@ -68936,7 +69556,7 @@ Domain to not audit.
22296 </param>
22297 <infoflow type="none"/>
22298 </interface>
22299 -<interface name="corenet_relabelto_wsdapi_client_packets" lineno="94874">
22300 +<interface name="corenet_relabelto_wsdapi_client_packets" lineno="95295">
22301 <summary>
22302 Relabel packets to wsdapi_client the packet type.
22303 </summary>
22304 @@ -68946,7 +69566,7 @@ Domain allowed access.
22305 </summary>
22306 </param>
22307 </interface>
22308 -<interface name="corenet_send_wsdapi_server_packets" lineno="94894">
22309 +<interface name="corenet_send_wsdapi_server_packets" lineno="95315">
22310 <summary>
22311 Send wsdapi_server packets.
22312 </summary>
22313 @@ -68957,7 +69577,7 @@ Domain allowed access.
22314 </param>
22315 <infoflow type="write" weight="10"/>
22316 </interface>
22317 -<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="94913">
22318 +<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="95334">
22319 <summary>
22320 Do not audit attempts to send wsdapi_server packets.
22321 </summary>
22322 @@ -68968,7 +69588,7 @@ Domain to not audit.
22323 </param>
22324 <infoflow type="none"/>
22325 </interface>
22326 -<interface name="corenet_receive_wsdapi_server_packets" lineno="94932">
22327 +<interface name="corenet_receive_wsdapi_server_packets" lineno="95353">
22328 <summary>
22329 Receive wsdapi_server packets.
22330 </summary>
22331 @@ -68979,7 +69599,7 @@ Domain allowed access.
22332 </param>
22333 <infoflow type="read" weight="10"/>
22334 </interface>
22335 -<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="94951">
22336 +<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="95372">
22337 <summary>
22338 Do not audit attempts to receive wsdapi_server packets.
22339 </summary>
22340 @@ -68990,7 +69610,7 @@ Domain allowed access.
22341 </param>
22342 <infoflow type="none"/>
22343 </interface>
22344 -<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="94970">
22345 +<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="95391">
22346 <summary>
22347 Send and receive wsdapi_server packets.
22348 </summary>
22349 @@ -69001,7 +69621,7 @@ Domain allowed access.
22350 </param>
22351 <infoflow type="both" weight="10"/>
22352 </interface>
22353 -<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="94986">
22354 +<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="95407">
22355 <summary>
22356 Do not audit attempts to send and receive wsdapi_server packets.
22357 </summary>
22358 @@ -69012,7 +69632,7 @@ Domain to not audit.
22359 </param>
22360 <infoflow type="none"/>
22361 </interface>
22362 -<interface name="corenet_relabelto_wsdapi_server_packets" lineno="95001">
22363 +<interface name="corenet_relabelto_wsdapi_server_packets" lineno="95422">
22364 <summary>
22365 Relabel packets to wsdapi_server the packet type.
22366 </summary>
22367 @@ -69022,7 +69642,7 @@ Domain allowed access.
22368 </summary>
22369 </param>
22370 </interface>
22371 -<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="95023">
22372 +<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="95444">
22373 <summary>
22374 Send and receive TCP traffic on the wsicopy port.
22375 </summary>
22376 @@ -69033,7 +69653,7 @@ Domain allowed access.
22377 </param>
22378 <infoflow type="both" weight="10"/>
22379 </interface>
22380 -<interface name="corenet_udp_send_wsicopy_port" lineno="95038">
22381 +<interface name="corenet_udp_send_wsicopy_port" lineno="95459">
22382 <summary>
22383 Send UDP traffic on the wsicopy port.
22384 </summary>
22385 @@ -69044,7 +69664,7 @@ Domain allowed access.
22386 </param>
22387 <infoflow type="write" weight="10"/>
22388 </interface>
22389 -<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="95053">
22390 +<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="95474">
22391 <summary>
22392 Do not audit attempts to send UDP traffic on the wsicopy port.
22393 </summary>
22394 @@ -69055,7 +69675,7 @@ Domain to not audit.
22395 </param>
22396 <infoflow type="none"/>
22397 </interface>
22398 -<interface name="corenet_udp_receive_wsicopy_port" lineno="95068">
22399 +<interface name="corenet_udp_receive_wsicopy_port" lineno="95489">
22400 <summary>
22401 Receive UDP traffic on the wsicopy port.
22402 </summary>
22403 @@ -69066,7 +69686,7 @@ Domain allowed access.
22404 </param>
22405 <infoflow type="read" weight="10"/>
22406 </interface>
22407 -<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="95083">
22408 +<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="95504">
22409 <summary>
22410 Do not audit attempts to receive UDP traffic on the wsicopy port.
22411 </summary>
22412 @@ -69077,7 +69697,7 @@ Domain to not audit.
22413 </param>
22414 <infoflow type="none"/>
22415 </interface>
22416 -<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="95098">
22417 +<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="95519">
22418 <summary>
22419 Send and receive UDP traffic on the wsicopy port.
22420 </summary>
22421 @@ -69088,7 +69708,7 @@ Domain allowed access.
22422 </param>
22423 <infoflow type="both" weight="10"/>
22424 </interface>
22425 -<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="95114">
22426 +<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="95535">
22427 <summary>
22428 Do not audit attempts to send and receive
22429 UDP traffic on the wsicopy port.
22430 @@ -69100,7 +69720,7 @@ Domain to not audit.
22431 </param>
22432 <infoflow type="none"/>
22433 </interface>
22434 -<interface name="corenet_tcp_bind_wsicopy_port" lineno="95129">
22435 +<interface name="corenet_tcp_bind_wsicopy_port" lineno="95550">
22436 <summary>
22437 Bind TCP sockets to the wsicopy port.
22438 </summary>
22439 @@ -69111,7 +69731,7 @@ Domain allowed access.
22440 </param>
22441 <infoflow type="none"/>
22442 </interface>
22443 -<interface name="corenet_udp_bind_wsicopy_port" lineno="95149">
22444 +<interface name="corenet_udp_bind_wsicopy_port" lineno="95570">
22445 <summary>
22446 Bind UDP sockets to the wsicopy port.
22447 </summary>
22448 @@ -69122,7 +69742,7 @@ Domain allowed access.
22449 </param>
22450 <infoflow type="none"/>
22451 </interface>
22452 -<interface name="corenet_tcp_connect_wsicopy_port" lineno="95168">
22453 +<interface name="corenet_tcp_connect_wsicopy_port" lineno="95589">
22454 <summary>
22455 Make a TCP connection to the wsicopy port.
22456 </summary>
22457 @@ -69132,7 +69752,7 @@ Domain allowed access.
22458 </summary>
22459 </param>
22460 </interface>
22461 -<interface name="corenet_send_wsicopy_client_packets" lineno="95188">
22462 +<interface name="corenet_send_wsicopy_client_packets" lineno="95609">
22463 <summary>
22464 Send wsicopy_client packets.
22465 </summary>
22466 @@ -69143,7 +69763,7 @@ Domain allowed access.
22467 </param>
22468 <infoflow type="write" weight="10"/>
22469 </interface>
22470 -<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="95207">
22471 +<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="95628">
22472 <summary>
22473 Do not audit attempts to send wsicopy_client packets.
22474 </summary>
22475 @@ -69154,7 +69774,7 @@ Domain to not audit.
22476 </param>
22477 <infoflow type="none"/>
22478 </interface>
22479 -<interface name="corenet_receive_wsicopy_client_packets" lineno="95226">
22480 +<interface name="corenet_receive_wsicopy_client_packets" lineno="95647">
22481 <summary>
22482 Receive wsicopy_client packets.
22483 </summary>
22484 @@ -69165,7 +69785,7 @@ Domain allowed access.
22485 </param>
22486 <infoflow type="read" weight="10"/>
22487 </interface>
22488 -<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="95245">
22489 +<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="95666">
22490 <summary>
22491 Do not audit attempts to receive wsicopy_client packets.
22492 </summary>
22493 @@ -69176,7 +69796,7 @@ Domain allowed access.
22494 </param>
22495 <infoflow type="none"/>
22496 </interface>
22497 -<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="95264">
22498 +<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="95685">
22499 <summary>
22500 Send and receive wsicopy_client packets.
22501 </summary>
22502 @@ -69187,7 +69807,7 @@ Domain allowed access.
22503 </param>
22504 <infoflow type="both" weight="10"/>
22505 </interface>
22506 -<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="95280">
22507 +<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="95701">
22508 <summary>
22509 Do not audit attempts to send and receive wsicopy_client packets.
22510 </summary>
22511 @@ -69198,7 +69818,7 @@ Domain to not audit.
22512 </param>
22513 <infoflow type="none"/>
22514 </interface>
22515 -<interface name="corenet_relabelto_wsicopy_client_packets" lineno="95295">
22516 +<interface name="corenet_relabelto_wsicopy_client_packets" lineno="95716">
22517 <summary>
22518 Relabel packets to wsicopy_client the packet type.
22519 </summary>
22520 @@ -69208,7 +69828,7 @@ Domain allowed access.
22521 </summary>
22522 </param>
22523 </interface>
22524 -<interface name="corenet_send_wsicopy_server_packets" lineno="95315">
22525 +<interface name="corenet_send_wsicopy_server_packets" lineno="95736">
22526 <summary>
22527 Send wsicopy_server packets.
22528 </summary>
22529 @@ -69219,7 +69839,7 @@ Domain allowed access.
22530 </param>
22531 <infoflow type="write" weight="10"/>
22532 </interface>
22533 -<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="95334">
22534 +<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="95755">
22535 <summary>
22536 Do not audit attempts to send wsicopy_server packets.
22537 </summary>
22538 @@ -69230,7 +69850,7 @@ Domain to not audit.
22539 </param>
22540 <infoflow type="none"/>
22541 </interface>
22542 -<interface name="corenet_receive_wsicopy_server_packets" lineno="95353">
22543 +<interface name="corenet_receive_wsicopy_server_packets" lineno="95774">
22544 <summary>
22545 Receive wsicopy_server packets.
22546 </summary>
22547 @@ -69241,7 +69861,7 @@ Domain allowed access.
22548 </param>
22549 <infoflow type="read" weight="10"/>
22550 </interface>
22551 -<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="95372">
22552 +<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="95793">
22553 <summary>
22554 Do not audit attempts to receive wsicopy_server packets.
22555 </summary>
22556 @@ -69252,7 +69872,7 @@ Domain allowed access.
22557 </param>
22558 <infoflow type="none"/>
22559 </interface>
22560 -<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="95391">
22561 +<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="95812">
22562 <summary>
22563 Send and receive wsicopy_server packets.
22564 </summary>
22565 @@ -69263,7 +69883,7 @@ Domain allowed access.
22566 </param>
22567 <infoflow type="both" weight="10"/>
22568 </interface>
22569 -<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="95407">
22570 +<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="95828">
22571 <summary>
22572 Do not audit attempts to send and receive wsicopy_server packets.
22573 </summary>
22574 @@ -69274,7 +69894,7 @@ Domain to not audit.
22575 </param>
22576 <infoflow type="none"/>
22577 </interface>
22578 -<interface name="corenet_relabelto_wsicopy_server_packets" lineno="95422">
22579 +<interface name="corenet_relabelto_wsicopy_server_packets" lineno="95843">
22580 <summary>
22581 Relabel packets to wsicopy_server the packet type.
22582 </summary>
22583 @@ -69284,7 +69904,7 @@ Domain allowed access.
22584 </summary>
22585 </param>
22586 </interface>
22587 -<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="95444">
22588 +<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="95865">
22589 <summary>
22590 Send and receive TCP traffic on the xdmcp port.
22591 </summary>
22592 @@ -69295,7 +69915,7 @@ Domain allowed access.
22593 </param>
22594 <infoflow type="both" weight="10"/>
22595 </interface>
22596 -<interface name="corenet_udp_send_xdmcp_port" lineno="95459">
22597 +<interface name="corenet_udp_send_xdmcp_port" lineno="95880">
22598 <summary>
22599 Send UDP traffic on the xdmcp port.
22600 </summary>
22601 @@ -69306,7 +69926,7 @@ Domain allowed access.
22602 </param>
22603 <infoflow type="write" weight="10"/>
22604 </interface>
22605 -<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="95474">
22606 +<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="95895">
22607 <summary>
22608 Do not audit attempts to send UDP traffic on the xdmcp port.
22609 </summary>
22610 @@ -69317,7 +69937,7 @@ Domain to not audit.
22611 </param>
22612 <infoflow type="none"/>
22613 </interface>
22614 -<interface name="corenet_udp_receive_xdmcp_port" lineno="95489">
22615 +<interface name="corenet_udp_receive_xdmcp_port" lineno="95910">
22616 <summary>
22617 Receive UDP traffic on the xdmcp port.
22618 </summary>
22619 @@ -69328,7 +69948,7 @@ Domain allowed access.
22620 </param>
22621 <infoflow type="read" weight="10"/>
22622 </interface>
22623 -<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="95504">
22624 +<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="95925">
22625 <summary>
22626 Do not audit attempts to receive UDP traffic on the xdmcp port.
22627 </summary>
22628 @@ -69339,7 +69959,7 @@ Domain to not audit.
22629 </param>
22630 <infoflow type="none"/>
22631 </interface>
22632 -<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="95519">
22633 +<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="95940">
22634 <summary>
22635 Send and receive UDP traffic on the xdmcp port.
22636 </summary>
22637 @@ -69350,7 +69970,7 @@ Domain allowed access.
22638 </param>
22639 <infoflow type="both" weight="10"/>
22640 </interface>
22641 -<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="95535">
22642 +<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="95956">
22643 <summary>
22644 Do not audit attempts to send and receive
22645 UDP traffic on the xdmcp port.
22646 @@ -69362,7 +69982,7 @@ Domain to not audit.
22647 </param>
22648 <infoflow type="none"/>
22649 </interface>
22650 -<interface name="corenet_tcp_bind_xdmcp_port" lineno="95550">
22651 +<interface name="corenet_tcp_bind_xdmcp_port" lineno="95971">
22652 <summary>
22653 Bind TCP sockets to the xdmcp port.
22654 </summary>
22655 @@ -69373,7 +69993,7 @@ Domain allowed access.
22656 </param>
22657 <infoflow type="none"/>
22658 </interface>
22659 -<interface name="corenet_udp_bind_xdmcp_port" lineno="95570">
22660 +<interface name="corenet_udp_bind_xdmcp_port" lineno="95991">
22661 <summary>
22662 Bind UDP sockets to the xdmcp port.
22663 </summary>
22664 @@ -69384,7 +70004,7 @@ Domain allowed access.
22665 </param>
22666 <infoflow type="none"/>
22667 </interface>
22668 -<interface name="corenet_tcp_connect_xdmcp_port" lineno="95589">
22669 +<interface name="corenet_tcp_connect_xdmcp_port" lineno="96010">
22670 <summary>
22671 Make a TCP connection to the xdmcp port.
22672 </summary>
22673 @@ -69394,7 +70014,7 @@ Domain allowed access.
22674 </summary>
22675 </param>
22676 </interface>
22677 -<interface name="corenet_send_xdmcp_client_packets" lineno="95609">
22678 +<interface name="corenet_send_xdmcp_client_packets" lineno="96030">
22679 <summary>
22680 Send xdmcp_client packets.
22681 </summary>
22682 @@ -69405,7 +70025,7 @@ Domain allowed access.
22683 </param>
22684 <infoflow type="write" weight="10"/>
22685 </interface>
22686 -<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="95628">
22687 +<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="96049">
22688 <summary>
22689 Do not audit attempts to send xdmcp_client packets.
22690 </summary>
22691 @@ -69416,7 +70036,7 @@ Domain to not audit.
22692 </param>
22693 <infoflow type="none"/>
22694 </interface>
22695 -<interface name="corenet_receive_xdmcp_client_packets" lineno="95647">
22696 +<interface name="corenet_receive_xdmcp_client_packets" lineno="96068">
22697 <summary>
22698 Receive xdmcp_client packets.
22699 </summary>
22700 @@ -69427,7 +70047,7 @@ Domain allowed access.
22701 </param>
22702 <infoflow type="read" weight="10"/>
22703 </interface>
22704 -<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="95666">
22705 +<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="96087">
22706 <summary>
22707 Do not audit attempts to receive xdmcp_client packets.
22708 </summary>
22709 @@ -69438,7 +70058,7 @@ Domain allowed access.
22710 </param>
22711 <infoflow type="none"/>
22712 </interface>
22713 -<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="95685">
22714 +<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="96106">
22715 <summary>
22716 Send and receive xdmcp_client packets.
22717 </summary>
22718 @@ -69449,7 +70069,7 @@ Domain allowed access.
22719 </param>
22720 <infoflow type="both" weight="10"/>
22721 </interface>
22722 -<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="95701">
22723 +<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="96122">
22724 <summary>
22725 Do not audit attempts to send and receive xdmcp_client packets.
22726 </summary>
22727 @@ -69460,7 +70080,7 @@ Domain to not audit.
22728 </param>
22729 <infoflow type="none"/>
22730 </interface>
22731 -<interface name="corenet_relabelto_xdmcp_client_packets" lineno="95716">
22732 +<interface name="corenet_relabelto_xdmcp_client_packets" lineno="96137">
22733 <summary>
22734 Relabel packets to xdmcp_client the packet type.
22735 </summary>
22736 @@ -69470,7 +70090,7 @@ Domain allowed access.
22737 </summary>
22738 </param>
22739 </interface>
22740 -<interface name="corenet_send_xdmcp_server_packets" lineno="95736">
22741 +<interface name="corenet_send_xdmcp_server_packets" lineno="96157">
22742 <summary>
22743 Send xdmcp_server packets.
22744 </summary>
22745 @@ -69481,7 +70101,7 @@ Domain allowed access.
22746 </param>
22747 <infoflow type="write" weight="10"/>
22748 </interface>
22749 -<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="95755">
22750 +<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="96176">
22751 <summary>
22752 Do not audit attempts to send xdmcp_server packets.
22753 </summary>
22754 @@ -69492,7 +70112,7 @@ Domain to not audit.
22755 </param>
22756 <infoflow type="none"/>
22757 </interface>
22758 -<interface name="corenet_receive_xdmcp_server_packets" lineno="95774">
22759 +<interface name="corenet_receive_xdmcp_server_packets" lineno="96195">
22760 <summary>
22761 Receive xdmcp_server packets.
22762 </summary>
22763 @@ -69503,7 +70123,7 @@ Domain allowed access.
22764 </param>
22765 <infoflow type="read" weight="10"/>
22766 </interface>
22767 -<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="95793">
22768 +<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="96214">
22769 <summary>
22770 Do not audit attempts to receive xdmcp_server packets.
22771 </summary>
22772 @@ -69514,7 +70134,7 @@ Domain allowed access.
22773 </param>
22774 <infoflow type="none"/>
22775 </interface>
22776 -<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="95812">
22777 +<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="96233">
22778 <summary>
22779 Send and receive xdmcp_server packets.
22780 </summary>
22781 @@ -69525,7 +70145,7 @@ Domain allowed access.
22782 </param>
22783 <infoflow type="both" weight="10"/>
22784 </interface>
22785 -<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="95828">
22786 +<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="96249">
22787 <summary>
22788 Do not audit attempts to send and receive xdmcp_server packets.
22789 </summary>
22790 @@ -69536,7 +70156,7 @@ Domain to not audit.
22791 </param>
22792 <infoflow type="none"/>
22793 </interface>
22794 -<interface name="corenet_relabelto_xdmcp_server_packets" lineno="95843">
22795 +<interface name="corenet_relabelto_xdmcp_server_packets" lineno="96264">
22796 <summary>
22797 Relabel packets to xdmcp_server the packet type.
22798 </summary>
22799 @@ -69546,7 +70166,7 @@ Domain allowed access.
22800 </summary>
22801 </param>
22802 </interface>
22803 -<interface name="corenet_tcp_sendrecv_xen_port" lineno="95865">
22804 +<interface name="corenet_tcp_sendrecv_xen_port" lineno="96286">
22805 <summary>
22806 Send and receive TCP traffic on the xen port.
22807 </summary>
22808 @@ -69557,7 +70177,7 @@ Domain allowed access.
22809 </param>
22810 <infoflow type="both" weight="10"/>
22811 </interface>
22812 -<interface name="corenet_udp_send_xen_port" lineno="95880">
22813 +<interface name="corenet_udp_send_xen_port" lineno="96301">
22814 <summary>
22815 Send UDP traffic on the xen port.
22816 </summary>
22817 @@ -69568,7 +70188,7 @@ Domain allowed access.
22818 </param>
22819 <infoflow type="write" weight="10"/>
22820 </interface>
22821 -<interface name="corenet_dontaudit_udp_send_xen_port" lineno="95895">
22822 +<interface name="corenet_dontaudit_udp_send_xen_port" lineno="96316">
22823 <summary>
22824 Do not audit attempts to send UDP traffic on the xen port.
22825 </summary>
22826 @@ -69579,7 +70199,7 @@ Domain to not audit.
22827 </param>
22828 <infoflow type="none"/>
22829 </interface>
22830 -<interface name="corenet_udp_receive_xen_port" lineno="95910">
22831 +<interface name="corenet_udp_receive_xen_port" lineno="96331">
22832 <summary>
22833 Receive UDP traffic on the xen port.
22834 </summary>
22835 @@ -69590,7 +70210,7 @@ Domain allowed access.
22836 </param>
22837 <infoflow type="read" weight="10"/>
22838 </interface>
22839 -<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="95925">
22840 +<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="96346">
22841 <summary>
22842 Do not audit attempts to receive UDP traffic on the xen port.
22843 </summary>
22844 @@ -69601,7 +70221,7 @@ Domain to not audit.
22845 </param>
22846 <infoflow type="none"/>
22847 </interface>
22848 -<interface name="corenet_udp_sendrecv_xen_port" lineno="95940">
22849 +<interface name="corenet_udp_sendrecv_xen_port" lineno="96361">
22850 <summary>
22851 Send and receive UDP traffic on the xen port.
22852 </summary>
22853 @@ -69612,7 +70232,7 @@ Domain allowed access.
22854 </param>
22855 <infoflow type="both" weight="10"/>
22856 </interface>
22857 -<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="95956">
22858 +<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="96377">
22859 <summary>
22860 Do not audit attempts to send and receive
22861 UDP traffic on the xen port.
22862 @@ -69624,7 +70244,7 @@ Domain to not audit.
22863 </param>
22864 <infoflow type="none"/>
22865 </interface>
22866 -<interface name="corenet_tcp_bind_xen_port" lineno="95971">
22867 +<interface name="corenet_tcp_bind_xen_port" lineno="96392">
22868 <summary>
22869 Bind TCP sockets to the xen port.
22870 </summary>
22871 @@ -69635,7 +70255,7 @@ Domain allowed access.
22872 </param>
22873 <infoflow type="none"/>
22874 </interface>
22875 -<interface name="corenet_udp_bind_xen_port" lineno="95991">
22876 +<interface name="corenet_udp_bind_xen_port" lineno="96412">
22877 <summary>
22878 Bind UDP sockets to the xen port.
22879 </summary>
22880 @@ -69646,7 +70266,7 @@ Domain allowed access.
22881 </param>
22882 <infoflow type="none"/>
22883 </interface>
22884 -<interface name="corenet_tcp_connect_xen_port" lineno="96010">
22885 +<interface name="corenet_tcp_connect_xen_port" lineno="96431">
22886 <summary>
22887 Make a TCP connection to the xen port.
22888 </summary>
22889 @@ -69656,7 +70276,7 @@ Domain allowed access.
22890 </summary>
22891 </param>
22892 </interface>
22893 -<interface name="corenet_send_xen_client_packets" lineno="96030">
22894 +<interface name="corenet_send_xen_client_packets" lineno="96451">
22895 <summary>
22896 Send xen_client packets.
22897 </summary>
22898 @@ -69667,7 +70287,7 @@ Domain allowed access.
22899 </param>
22900 <infoflow type="write" weight="10"/>
22901 </interface>
22902 -<interface name="corenet_dontaudit_send_xen_client_packets" lineno="96049">
22903 +<interface name="corenet_dontaudit_send_xen_client_packets" lineno="96470">
22904 <summary>
22905 Do not audit attempts to send xen_client packets.
22906 </summary>
22907 @@ -69678,7 +70298,7 @@ Domain to not audit.
22908 </param>
22909 <infoflow type="none"/>
22910 </interface>
22911 -<interface name="corenet_receive_xen_client_packets" lineno="96068">
22912 +<interface name="corenet_receive_xen_client_packets" lineno="96489">
22913 <summary>
22914 Receive xen_client packets.
22915 </summary>
22916 @@ -69689,7 +70309,7 @@ Domain allowed access.
22917 </param>
22918 <infoflow type="read" weight="10"/>
22919 </interface>
22920 -<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="96087">
22921 +<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="96508">
22922 <summary>
22923 Do not audit attempts to receive xen_client packets.
22924 </summary>
22925 @@ -69700,7 +70320,7 @@ Domain allowed access.
22926 </param>
22927 <infoflow type="none"/>
22928 </interface>
22929 -<interface name="corenet_sendrecv_xen_client_packets" lineno="96106">
22930 +<interface name="corenet_sendrecv_xen_client_packets" lineno="96527">
22931 <summary>
22932 Send and receive xen_client packets.
22933 </summary>
22934 @@ -69711,7 +70331,7 @@ Domain allowed access.
22935 </param>
22936 <infoflow type="both" weight="10"/>
22937 </interface>
22938 -<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="96122">
22939 +<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="96543">
22940 <summary>
22941 Do not audit attempts to send and receive xen_client packets.
22942 </summary>
22943 @@ -69722,7 +70342,7 @@ Domain to not audit.
22944 </param>
22945 <infoflow type="none"/>
22946 </interface>
22947 -<interface name="corenet_relabelto_xen_client_packets" lineno="96137">
22948 +<interface name="corenet_relabelto_xen_client_packets" lineno="96558">
22949 <summary>
22950 Relabel packets to xen_client the packet type.
22951 </summary>
22952 @@ -69732,7 +70352,7 @@ Domain allowed access.
22953 </summary>
22954 </param>
22955 </interface>
22956 -<interface name="corenet_send_xen_server_packets" lineno="96157">
22957 +<interface name="corenet_send_xen_server_packets" lineno="96578">
22958 <summary>
22959 Send xen_server packets.
22960 </summary>
22961 @@ -69743,7 +70363,7 @@ Domain allowed access.
22962 </param>
22963 <infoflow type="write" weight="10"/>
22964 </interface>
22965 -<interface name="corenet_dontaudit_send_xen_server_packets" lineno="96176">
22966 +<interface name="corenet_dontaudit_send_xen_server_packets" lineno="96597">
22967 <summary>
22968 Do not audit attempts to send xen_server packets.
22969 </summary>
22970 @@ -69754,7 +70374,7 @@ Domain to not audit.
22971 </param>
22972 <infoflow type="none"/>
22973 </interface>
22974 -<interface name="corenet_receive_xen_server_packets" lineno="96195">
22975 +<interface name="corenet_receive_xen_server_packets" lineno="96616">
22976 <summary>
22977 Receive xen_server packets.
22978 </summary>
22979 @@ -69765,7 +70385,7 @@ Domain allowed access.
22980 </param>
22981 <infoflow type="read" weight="10"/>
22982 </interface>
22983 -<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="96214">
22984 +<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="96635">
22985 <summary>
22986 Do not audit attempts to receive xen_server packets.
22987 </summary>
22988 @@ -69776,7 +70396,7 @@ Domain allowed access.
22989 </param>
22990 <infoflow type="none"/>
22991 </interface>
22992 -<interface name="corenet_sendrecv_xen_server_packets" lineno="96233">
22993 +<interface name="corenet_sendrecv_xen_server_packets" lineno="96654">
22994 <summary>
22995 Send and receive xen_server packets.
22996 </summary>
22997 @@ -69787,7 +70407,7 @@ Domain allowed access.
22998 </param>
22999 <infoflow type="both" weight="10"/>
23000 </interface>
23001 -<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="96249">
23002 +<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="96670">
23003 <summary>
23004 Do not audit attempts to send and receive xen_server packets.
23005 </summary>
23006 @@ -69798,7 +70418,7 @@ Domain to not audit.
23007 </param>
23008 <infoflow type="none"/>
23009 </interface>
23010 -<interface name="corenet_relabelto_xen_server_packets" lineno="96264">
23011 +<interface name="corenet_relabelto_xen_server_packets" lineno="96685">
23012 <summary>
23013 Relabel packets to xen_server the packet type.
23014 </summary>
23015 @@ -69808,7 +70428,7 @@ Domain allowed access.
23016 </summary>
23017 </param>
23018 </interface>
23019 -<interface name="corenet_tcp_sendrecv_xfs_port" lineno="96286">
23020 +<interface name="corenet_tcp_sendrecv_xfs_port" lineno="96707">
23021 <summary>
23022 Send and receive TCP traffic on the xfs port.
23023 </summary>
23024 @@ -69819,7 +70439,7 @@ Domain allowed access.
23025 </param>
23026 <infoflow type="both" weight="10"/>
23027 </interface>
23028 -<interface name="corenet_udp_send_xfs_port" lineno="96301">
23029 +<interface name="corenet_udp_send_xfs_port" lineno="96722">
23030 <summary>
23031 Send UDP traffic on the xfs port.
23032 </summary>
23033 @@ -69830,7 +70450,7 @@ Domain allowed access.
23034 </param>
23035 <infoflow type="write" weight="10"/>
23036 </interface>
23037 -<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="96316">
23038 +<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="96737">
23039 <summary>
23040 Do not audit attempts to send UDP traffic on the xfs port.
23041 </summary>
23042 @@ -69841,7 +70461,7 @@ Domain to not audit.
23043 </param>
23044 <infoflow type="none"/>
23045 </interface>
23046 -<interface name="corenet_udp_receive_xfs_port" lineno="96331">
23047 +<interface name="corenet_udp_receive_xfs_port" lineno="96752">
23048 <summary>
23049 Receive UDP traffic on the xfs port.
23050 </summary>
23051 @@ -69852,7 +70472,7 @@ Domain allowed access.
23052 </param>
23053 <infoflow type="read" weight="10"/>
23054 </interface>
23055 -<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="96346">
23056 +<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="96767">
23057 <summary>
23058 Do not audit attempts to receive UDP traffic on the xfs port.
23059 </summary>
23060 @@ -69863,7 +70483,7 @@ Domain to not audit.
23061 </param>
23062 <infoflow type="none"/>
23063 </interface>
23064 -<interface name="corenet_udp_sendrecv_xfs_port" lineno="96361">
23065 +<interface name="corenet_udp_sendrecv_xfs_port" lineno="96782">
23066 <summary>
23067 Send and receive UDP traffic on the xfs port.
23068 </summary>
23069 @@ -69874,7 +70494,7 @@ Domain allowed access.
23070 </param>
23071 <infoflow type="both" weight="10"/>
23072 </interface>
23073 -<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="96377">
23074 +<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="96798">
23075 <summary>
23076 Do not audit attempts to send and receive
23077 UDP traffic on the xfs port.
23078 @@ -69886,7 +70506,7 @@ Domain to not audit.
23079 </param>
23080 <infoflow type="none"/>
23081 </interface>
23082 -<interface name="corenet_tcp_bind_xfs_port" lineno="96392">
23083 +<interface name="corenet_tcp_bind_xfs_port" lineno="96813">
23084 <summary>
23085 Bind TCP sockets to the xfs port.
23086 </summary>
23087 @@ -69897,7 +70517,7 @@ Domain allowed access.
23088 </param>
23089 <infoflow type="none"/>
23090 </interface>
23091 -<interface name="corenet_udp_bind_xfs_port" lineno="96412">
23092 +<interface name="corenet_udp_bind_xfs_port" lineno="96833">
23093 <summary>
23094 Bind UDP sockets to the xfs port.
23095 </summary>
23096 @@ -69908,7 +70528,7 @@ Domain allowed access.
23097 </param>
23098 <infoflow type="none"/>
23099 </interface>
23100 -<interface name="corenet_tcp_connect_xfs_port" lineno="96431">
23101 +<interface name="corenet_tcp_connect_xfs_port" lineno="96852">
23102 <summary>
23103 Make a TCP connection to the xfs port.
23104 </summary>
23105 @@ -69918,7 +70538,7 @@ Domain allowed access.
23106 </summary>
23107 </param>
23108 </interface>
23109 -<interface name="corenet_send_xfs_client_packets" lineno="96451">
23110 +<interface name="corenet_send_xfs_client_packets" lineno="96872">
23111 <summary>
23112 Send xfs_client packets.
23113 </summary>
23114 @@ -69929,7 +70549,7 @@ Domain allowed access.
23115 </param>
23116 <infoflow type="write" weight="10"/>
23117 </interface>
23118 -<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="96470">
23119 +<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="96891">
23120 <summary>
23121 Do not audit attempts to send xfs_client packets.
23122 </summary>
23123 @@ -69940,7 +70560,7 @@ Domain to not audit.
23124 </param>
23125 <infoflow type="none"/>
23126 </interface>
23127 -<interface name="corenet_receive_xfs_client_packets" lineno="96489">
23128 +<interface name="corenet_receive_xfs_client_packets" lineno="96910">
23129 <summary>
23130 Receive xfs_client packets.
23131 </summary>
23132 @@ -69951,7 +70571,7 @@ Domain allowed access.
23133 </param>
23134 <infoflow type="read" weight="10"/>
23135 </interface>
23136 -<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="96508">
23137 +<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="96929">
23138 <summary>
23139 Do not audit attempts to receive xfs_client packets.
23140 </summary>
23141 @@ -69962,7 +70582,7 @@ Domain allowed access.
23142 </param>
23143 <infoflow type="none"/>
23144 </interface>
23145 -<interface name="corenet_sendrecv_xfs_client_packets" lineno="96527">
23146 +<interface name="corenet_sendrecv_xfs_client_packets" lineno="96948">
23147 <summary>
23148 Send and receive xfs_client packets.
23149 </summary>
23150 @@ -69973,7 +70593,7 @@ Domain allowed access.
23151 </param>
23152 <infoflow type="both" weight="10"/>
23153 </interface>
23154 -<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="96543">
23155 +<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="96964">
23156 <summary>
23157 Do not audit attempts to send and receive xfs_client packets.
23158 </summary>
23159 @@ -69984,7 +70604,7 @@ Domain to not audit.
23160 </param>
23161 <infoflow type="none"/>
23162 </interface>
23163 -<interface name="corenet_relabelto_xfs_client_packets" lineno="96558">
23164 +<interface name="corenet_relabelto_xfs_client_packets" lineno="96979">
23165 <summary>
23166 Relabel packets to xfs_client the packet type.
23167 </summary>
23168 @@ -69994,7 +70614,7 @@ Domain allowed access.
23169 </summary>
23170 </param>
23171 </interface>
23172 -<interface name="corenet_send_xfs_server_packets" lineno="96578">
23173 +<interface name="corenet_send_xfs_server_packets" lineno="96999">
23174 <summary>
23175 Send xfs_server packets.
23176 </summary>
23177 @@ -70005,7 +70625,7 @@ Domain allowed access.
23178 </param>
23179 <infoflow type="write" weight="10"/>
23180 </interface>
23181 -<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="96597">
23182 +<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="97018">
23183 <summary>
23184 Do not audit attempts to send xfs_server packets.
23185 </summary>
23186 @@ -70016,7 +70636,7 @@ Domain to not audit.
23187 </param>
23188 <infoflow type="none"/>
23189 </interface>
23190 -<interface name="corenet_receive_xfs_server_packets" lineno="96616">
23191 +<interface name="corenet_receive_xfs_server_packets" lineno="97037">
23192 <summary>
23193 Receive xfs_server packets.
23194 </summary>
23195 @@ -70027,7 +70647,7 @@ Domain allowed access.
23196 </param>
23197 <infoflow type="read" weight="10"/>
23198 </interface>
23199 -<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="96635">
23200 +<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="97056">
23201 <summary>
23202 Do not audit attempts to receive xfs_server packets.
23203 </summary>
23204 @@ -70038,7 +70658,7 @@ Domain allowed access.
23205 </param>
23206 <infoflow type="none"/>
23207 </interface>
23208 -<interface name="corenet_sendrecv_xfs_server_packets" lineno="96654">
23209 +<interface name="corenet_sendrecv_xfs_server_packets" lineno="97075">
23210 <summary>
23211 Send and receive xfs_server packets.
23212 </summary>
23213 @@ -70049,7 +70669,7 @@ Domain allowed access.
23214 </param>
23215 <infoflow type="both" weight="10"/>
23216 </interface>
23217 -<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="96670">
23218 +<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="97091">
23219 <summary>
23220 Do not audit attempts to send and receive xfs_server packets.
23221 </summary>
23222 @@ -70060,7 +70680,7 @@ Domain to not audit.
23223 </param>
23224 <infoflow type="none"/>
23225 </interface>
23226 -<interface name="corenet_relabelto_xfs_server_packets" lineno="96685">
23227 +<interface name="corenet_relabelto_xfs_server_packets" lineno="97106">
23228 <summary>
23229 Relabel packets to xfs_server the packet type.
23230 </summary>
23231 @@ -70070,7 +70690,7 @@ Domain allowed access.
23232 </summary>
23233 </param>
23234 </interface>
23235 -<interface name="corenet_tcp_sendrecv_xserver_port" lineno="96707">
23236 +<interface name="corenet_tcp_sendrecv_xserver_port" lineno="97128">
23237 <summary>
23238 Send and receive TCP traffic on the xserver port.
23239 </summary>
23240 @@ -70081,7 +70701,7 @@ Domain allowed access.
23241 </param>
23242 <infoflow type="both" weight="10"/>
23243 </interface>
23244 -<interface name="corenet_udp_send_xserver_port" lineno="96722">
23245 +<interface name="corenet_udp_send_xserver_port" lineno="97143">
23246 <summary>
23247 Send UDP traffic on the xserver port.
23248 </summary>
23249 @@ -70092,7 +70712,7 @@ Domain allowed access.
23250 </param>
23251 <infoflow type="write" weight="10"/>
23252 </interface>
23253 -<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="96737">
23254 +<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="97158">
23255 <summary>
23256 Do not audit attempts to send UDP traffic on the xserver port.
23257 </summary>
23258 @@ -70103,7 +70723,7 @@ Domain to not audit.
23259 </param>
23260 <infoflow type="none"/>
23261 </interface>
23262 -<interface name="corenet_udp_receive_xserver_port" lineno="96752">
23263 +<interface name="corenet_udp_receive_xserver_port" lineno="97173">
23264 <summary>
23265 Receive UDP traffic on the xserver port.
23266 </summary>
23267 @@ -70114,7 +70734,7 @@ Domain allowed access.
23268 </param>
23269 <infoflow type="read" weight="10"/>
23270 </interface>
23271 -<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="96767">
23272 +<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="97188">
23273 <summary>
23274 Do not audit attempts to receive UDP traffic on the xserver port.
23275 </summary>
23276 @@ -70125,7 +70745,7 @@ Domain to not audit.
23277 </param>
23278 <infoflow type="none"/>
23279 </interface>
23280 -<interface name="corenet_udp_sendrecv_xserver_port" lineno="96782">
23281 +<interface name="corenet_udp_sendrecv_xserver_port" lineno="97203">
23282 <summary>
23283 Send and receive UDP traffic on the xserver port.
23284 </summary>
23285 @@ -70136,7 +70756,7 @@ Domain allowed access.
23286 </param>
23287 <infoflow type="both" weight="10"/>
23288 </interface>
23289 -<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="96798">
23290 +<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="97219">
23291 <summary>
23292 Do not audit attempts to send and receive
23293 UDP traffic on the xserver port.
23294 @@ -70148,7 +70768,7 @@ Domain to not audit.
23295 </param>
23296 <infoflow type="none"/>
23297 </interface>
23298 -<interface name="corenet_tcp_bind_xserver_port" lineno="96813">
23299 +<interface name="corenet_tcp_bind_xserver_port" lineno="97234">
23300 <summary>
23301 Bind TCP sockets to the xserver port.
23302 </summary>
23303 @@ -70159,7 +70779,7 @@ Domain allowed access.
23304 </param>
23305 <infoflow type="none"/>
23306 </interface>
23307 -<interface name="corenet_udp_bind_xserver_port" lineno="96833">
23308 +<interface name="corenet_udp_bind_xserver_port" lineno="97254">
23309 <summary>
23310 Bind UDP sockets to the xserver port.
23311 </summary>
23312 @@ -70170,7 +70790,7 @@ Domain allowed access.
23313 </param>
23314 <infoflow type="none"/>
23315 </interface>
23316 -<interface name="corenet_tcp_connect_xserver_port" lineno="96852">
23317 +<interface name="corenet_tcp_connect_xserver_port" lineno="97273">
23318 <summary>
23319 Make a TCP connection to the xserver port.
23320 </summary>
23321 @@ -70180,7 +70800,7 @@ Domain allowed access.
23322 </summary>
23323 </param>
23324 </interface>
23325 -<interface name="corenet_send_xserver_client_packets" lineno="96872">
23326 +<interface name="corenet_send_xserver_client_packets" lineno="97293">
23327 <summary>
23328 Send xserver_client packets.
23329 </summary>
23330 @@ -70191,7 +70811,7 @@ Domain allowed access.
23331 </param>
23332 <infoflow type="write" weight="10"/>
23333 </interface>
23334 -<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="96891">
23335 +<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="97312">
23336 <summary>
23337 Do not audit attempts to send xserver_client packets.
23338 </summary>
23339 @@ -70202,7 +70822,7 @@ Domain to not audit.
23340 </param>
23341 <infoflow type="none"/>
23342 </interface>
23343 -<interface name="corenet_receive_xserver_client_packets" lineno="96910">
23344 +<interface name="corenet_receive_xserver_client_packets" lineno="97331">
23345 <summary>
23346 Receive xserver_client packets.
23347 </summary>
23348 @@ -70213,7 +70833,7 @@ Domain allowed access.
23349 </param>
23350 <infoflow type="read" weight="10"/>
23351 </interface>
23352 -<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="96929">
23353 +<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="97350">
23354 <summary>
23355 Do not audit attempts to receive xserver_client packets.
23356 </summary>
23357 @@ -70224,7 +70844,7 @@ Domain allowed access.
23358 </param>
23359 <infoflow type="none"/>
23360 </interface>
23361 -<interface name="corenet_sendrecv_xserver_client_packets" lineno="96948">
23362 +<interface name="corenet_sendrecv_xserver_client_packets" lineno="97369">
23363 <summary>
23364 Send and receive xserver_client packets.
23365 </summary>
23366 @@ -70235,7 +70855,7 @@ Domain allowed access.
23367 </param>
23368 <infoflow type="both" weight="10"/>
23369 </interface>
23370 -<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="96964">
23371 +<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="97385">
23372 <summary>
23373 Do not audit attempts to send and receive xserver_client packets.
23374 </summary>
23375 @@ -70246,7 +70866,7 @@ Domain to not audit.
23376 </param>
23377 <infoflow type="none"/>
23378 </interface>
23379 -<interface name="corenet_relabelto_xserver_client_packets" lineno="96979">
23380 +<interface name="corenet_relabelto_xserver_client_packets" lineno="97400">
23381 <summary>
23382 Relabel packets to xserver_client the packet type.
23383 </summary>
23384 @@ -70256,7 +70876,7 @@ Domain allowed access.
23385 </summary>
23386 </param>
23387 </interface>
23388 -<interface name="corenet_send_xserver_server_packets" lineno="96999">
23389 +<interface name="corenet_send_xserver_server_packets" lineno="97420">
23390 <summary>
23391 Send xserver_server packets.
23392 </summary>
23393 @@ -70267,7 +70887,7 @@ Domain allowed access.
23394 </param>
23395 <infoflow type="write" weight="10"/>
23396 </interface>
23397 -<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="97018">
23398 +<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="97439">
23399 <summary>
23400 Do not audit attempts to send xserver_server packets.
23401 </summary>
23402 @@ -70278,7 +70898,7 @@ Domain to not audit.
23403 </param>
23404 <infoflow type="none"/>
23405 </interface>
23406 -<interface name="corenet_receive_xserver_server_packets" lineno="97037">
23407 +<interface name="corenet_receive_xserver_server_packets" lineno="97458">
23408 <summary>
23409 Receive xserver_server packets.
23410 </summary>
23411 @@ -70289,7 +70909,7 @@ Domain allowed access.
23412 </param>
23413 <infoflow type="read" weight="10"/>
23414 </interface>
23415 -<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="97056">
23416 +<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="97477">
23417 <summary>
23418 Do not audit attempts to receive xserver_server packets.
23419 </summary>
23420 @@ -70300,7 +70920,7 @@ Domain allowed access.
23421 </param>
23422 <infoflow type="none"/>
23423 </interface>
23424 -<interface name="corenet_sendrecv_xserver_server_packets" lineno="97075">
23425 +<interface name="corenet_sendrecv_xserver_server_packets" lineno="97496">
23426 <summary>
23427 Send and receive xserver_server packets.
23428 </summary>
23429 @@ -70311,7 +70931,7 @@ Domain allowed access.
23430 </param>
23431 <infoflow type="both" weight="10"/>
23432 </interface>
23433 -<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="97091">
23434 +<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="97512">
23435 <summary>
23436 Do not audit attempts to send and receive xserver_server packets.
23437 </summary>
23438 @@ -70322,7 +70942,7 @@ Domain to not audit.
23439 </param>
23440 <infoflow type="none"/>
23441 </interface>
23442 -<interface name="corenet_relabelto_xserver_server_packets" lineno="97106">
23443 +<interface name="corenet_relabelto_xserver_server_packets" lineno="97527">
23444 <summary>
23445 Relabel packets to xserver_server the packet type.
23446 </summary>
23447 @@ -70332,7 +70952,7 @@ Domain allowed access.
23448 </summary>
23449 </param>
23450 </interface>
23451 -<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="97128">
23452 +<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="97549">
23453 <summary>
23454 Send and receive TCP traffic on the zarafa port.
23455 </summary>
23456 @@ -70343,7 +70963,7 @@ Domain allowed access.
23457 </param>
23458 <infoflow type="both" weight="10"/>
23459 </interface>
23460 -<interface name="corenet_udp_send_zarafa_port" lineno="97143">
23461 +<interface name="corenet_udp_send_zarafa_port" lineno="97564">
23462 <summary>
23463 Send UDP traffic on the zarafa port.
23464 </summary>
23465 @@ -70354,7 +70974,7 @@ Domain allowed access.
23466 </param>
23467 <infoflow type="write" weight="10"/>
23468 </interface>
23469 -<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="97158">
23470 +<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="97579">
23471 <summary>
23472 Do not audit attempts to send UDP traffic on the zarafa port.
23473 </summary>
23474 @@ -70365,7 +70985,7 @@ Domain to not audit.
23475 </param>
23476 <infoflow type="none"/>
23477 </interface>
23478 -<interface name="corenet_udp_receive_zarafa_port" lineno="97173">
23479 +<interface name="corenet_udp_receive_zarafa_port" lineno="97594">
23480 <summary>
23481 Receive UDP traffic on the zarafa port.
23482 </summary>
23483 @@ -70376,7 +70996,7 @@ Domain allowed access.
23484 </param>
23485 <infoflow type="read" weight="10"/>
23486 </interface>
23487 -<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="97188">
23488 +<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="97609">
23489 <summary>
23490 Do not audit attempts to receive UDP traffic on the zarafa port.
23491 </summary>
23492 @@ -70387,7 +71007,7 @@ Domain to not audit.
23493 </param>
23494 <infoflow type="none"/>
23495 </interface>
23496 -<interface name="corenet_udp_sendrecv_zarafa_port" lineno="97203">
23497 +<interface name="corenet_udp_sendrecv_zarafa_port" lineno="97624">
23498 <summary>
23499 Send and receive UDP traffic on the zarafa port.
23500 </summary>
23501 @@ -70398,7 +71018,7 @@ Domain allowed access.
23502 </param>
23503 <infoflow type="both" weight="10"/>
23504 </interface>
23505 -<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="97219">
23506 +<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="97640">
23507 <summary>
23508 Do not audit attempts to send and receive
23509 UDP traffic on the zarafa port.
23510 @@ -70410,7 +71030,7 @@ Domain to not audit.
23511 </param>
23512 <infoflow type="none"/>
23513 </interface>
23514 -<interface name="corenet_tcp_bind_zarafa_port" lineno="97234">
23515 +<interface name="corenet_tcp_bind_zarafa_port" lineno="97655">
23516 <summary>
23517 Bind TCP sockets to the zarafa port.
23518 </summary>
23519 @@ -70421,7 +71041,7 @@ Domain allowed access.
23520 </param>
23521 <infoflow type="none"/>
23522 </interface>
23523 -<interface name="corenet_udp_bind_zarafa_port" lineno="97254">
23524 +<interface name="corenet_udp_bind_zarafa_port" lineno="97675">
23525 <summary>
23526 Bind UDP sockets to the zarafa port.
23527 </summary>
23528 @@ -70432,7 +71052,7 @@ Domain allowed access.
23529 </param>
23530 <infoflow type="none"/>
23531 </interface>
23532 -<interface name="corenet_tcp_connect_zarafa_port" lineno="97273">
23533 +<interface name="corenet_tcp_connect_zarafa_port" lineno="97694">
23534 <summary>
23535 Make a TCP connection to the zarafa port.
23536 </summary>
23537 @@ -70442,7 +71062,7 @@ Domain allowed access.
23538 </summary>
23539 </param>
23540 </interface>
23541 -<interface name="corenet_send_zarafa_client_packets" lineno="97293">
23542 +<interface name="corenet_send_zarafa_client_packets" lineno="97714">
23543 <summary>
23544 Send zarafa_client packets.
23545 </summary>
23546 @@ -70453,7 +71073,7 @@ Domain allowed access.
23547 </param>
23548 <infoflow type="write" weight="10"/>
23549 </interface>
23550 -<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="97312">
23551 +<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="97733">
23552 <summary>
23553 Do not audit attempts to send zarafa_client packets.
23554 </summary>
23555 @@ -70464,7 +71084,7 @@ Domain to not audit.
23556 </param>
23557 <infoflow type="none"/>
23558 </interface>
23559 -<interface name="corenet_receive_zarafa_client_packets" lineno="97331">
23560 +<interface name="corenet_receive_zarafa_client_packets" lineno="97752">
23561 <summary>
23562 Receive zarafa_client packets.
23563 </summary>
23564 @@ -70475,7 +71095,7 @@ Domain allowed access.
23565 </param>
23566 <infoflow type="read" weight="10"/>
23567 </interface>
23568 -<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="97350">
23569 +<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="97771">
23570 <summary>
23571 Do not audit attempts to receive zarafa_client packets.
23572 </summary>
23573 @@ -70486,7 +71106,7 @@ Domain allowed access.
23574 </param>
23575 <infoflow type="none"/>
23576 </interface>
23577 -<interface name="corenet_sendrecv_zarafa_client_packets" lineno="97369">
23578 +<interface name="corenet_sendrecv_zarafa_client_packets" lineno="97790">
23579 <summary>
23580 Send and receive zarafa_client packets.
23581 </summary>
23582 @@ -70497,7 +71117,7 @@ Domain allowed access.
23583 </param>
23584 <infoflow type="both" weight="10"/>
23585 </interface>
23586 -<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="97385">
23587 +<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="97806">
23588 <summary>
23589 Do not audit attempts to send and receive zarafa_client packets.
23590 </summary>
23591 @@ -70508,7 +71128,7 @@ Domain to not audit.
23592 </param>
23593 <infoflow type="none"/>
23594 </interface>
23595 -<interface name="corenet_relabelto_zarafa_client_packets" lineno="97400">
23596 +<interface name="corenet_relabelto_zarafa_client_packets" lineno="97821">
23597 <summary>
23598 Relabel packets to zarafa_client the packet type.
23599 </summary>
23600 @@ -70518,7 +71138,7 @@ Domain allowed access.
23601 </summary>
23602 </param>
23603 </interface>
23604 -<interface name="corenet_send_zarafa_server_packets" lineno="97420">
23605 +<interface name="corenet_send_zarafa_server_packets" lineno="97841">
23606 <summary>
23607 Send zarafa_server packets.
23608 </summary>
23609 @@ -70529,7 +71149,7 @@ Domain allowed access.
23610 </param>
23611 <infoflow type="write" weight="10"/>
23612 </interface>
23613 -<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="97439">
23614 +<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="97860">
23615 <summary>
23616 Do not audit attempts to send zarafa_server packets.
23617 </summary>
23618 @@ -70540,7 +71160,7 @@ Domain to not audit.
23619 </param>
23620 <infoflow type="none"/>
23621 </interface>
23622 -<interface name="corenet_receive_zarafa_server_packets" lineno="97458">
23623 +<interface name="corenet_receive_zarafa_server_packets" lineno="97879">
23624 <summary>
23625 Receive zarafa_server packets.
23626 </summary>
23627 @@ -70551,7 +71171,7 @@ Domain allowed access.
23628 </param>
23629 <infoflow type="read" weight="10"/>
23630 </interface>
23631 -<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="97477">
23632 +<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="97898">
23633 <summary>
23634 Do not audit attempts to receive zarafa_server packets.
23635 </summary>
23636 @@ -70562,7 +71182,7 @@ Domain allowed access.
23637 </param>
23638 <infoflow type="none"/>
23639 </interface>
23640 -<interface name="corenet_sendrecv_zarafa_server_packets" lineno="97496">
23641 +<interface name="corenet_sendrecv_zarafa_server_packets" lineno="97917">
23642 <summary>
23643 Send and receive zarafa_server packets.
23644 </summary>
23645 @@ -70573,7 +71193,7 @@ Domain allowed access.
23646 </param>
23647 <infoflow type="both" weight="10"/>
23648 </interface>
23649 -<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="97512">
23650 +<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="97933">
23651 <summary>
23652 Do not audit attempts to send and receive zarafa_server packets.
23653 </summary>
23654 @@ -70584,7 +71204,7 @@ Domain to not audit.
23655 </param>
23656 <infoflow type="none"/>
23657 </interface>
23658 -<interface name="corenet_relabelto_zarafa_server_packets" lineno="97527">
23659 +<interface name="corenet_relabelto_zarafa_server_packets" lineno="97948">
23660 <summary>
23661 Relabel packets to zarafa_server the packet type.
23662 </summary>
23663 @@ -70594,7 +71214,7 @@ Domain allowed access.
23664 </summary>
23665 </param>
23666 </interface>
23667 -<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="97549">
23668 +<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="97970">
23669 <summary>
23670 Send and receive TCP traffic on the zabbix port.
23671 </summary>
23672 @@ -70605,7 +71225,7 @@ Domain allowed access.
23673 </param>
23674 <infoflow type="both" weight="10"/>
23675 </interface>
23676 -<interface name="corenet_udp_send_zabbix_port" lineno="97564">
23677 +<interface name="corenet_udp_send_zabbix_port" lineno="97985">
23678 <summary>
23679 Send UDP traffic on the zabbix port.
23680 </summary>
23681 @@ -70616,7 +71236,7 @@ Domain allowed access.
23682 </param>
23683 <infoflow type="write" weight="10"/>
23684 </interface>
23685 -<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="97579">
23686 +<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="98000">
23687 <summary>
23688 Do not audit attempts to send UDP traffic on the zabbix port.
23689 </summary>
23690 @@ -70627,7 +71247,7 @@ Domain to not audit.
23691 </param>
23692 <infoflow type="none"/>
23693 </interface>
23694 -<interface name="corenet_udp_receive_zabbix_port" lineno="97594">
23695 +<interface name="corenet_udp_receive_zabbix_port" lineno="98015">
23696 <summary>
23697 Receive UDP traffic on the zabbix port.
23698 </summary>
23699 @@ -70638,7 +71258,7 @@ Domain allowed access.
23700 </param>
23701 <infoflow type="read" weight="10"/>
23702 </interface>
23703 -<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="97609">
23704 +<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="98030">
23705 <summary>
23706 Do not audit attempts to receive UDP traffic on the zabbix port.
23707 </summary>
23708 @@ -70649,7 +71269,7 @@ Domain to not audit.
23709 </param>
23710 <infoflow type="none"/>
23711 </interface>
23712 -<interface name="corenet_udp_sendrecv_zabbix_port" lineno="97624">
23713 +<interface name="corenet_udp_sendrecv_zabbix_port" lineno="98045">
23714 <summary>
23715 Send and receive UDP traffic on the zabbix port.
23716 </summary>
23717 @@ -70660,7 +71280,7 @@ Domain allowed access.
23718 </param>
23719 <infoflow type="both" weight="10"/>
23720 </interface>
23721 -<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="97640">
23722 +<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="98061">
23723 <summary>
23724 Do not audit attempts to send and receive
23725 UDP traffic on the zabbix port.
23726 @@ -70672,7 +71292,7 @@ Domain to not audit.
23727 </param>
23728 <infoflow type="none"/>
23729 </interface>
23730 -<interface name="corenet_tcp_bind_zabbix_port" lineno="97655">
23731 +<interface name="corenet_tcp_bind_zabbix_port" lineno="98076">
23732 <summary>
23733 Bind TCP sockets to the zabbix port.
23734 </summary>
23735 @@ -70683,7 +71303,7 @@ Domain allowed access.
23736 </param>
23737 <infoflow type="none"/>
23738 </interface>
23739 -<interface name="corenet_udp_bind_zabbix_port" lineno="97675">
23740 +<interface name="corenet_udp_bind_zabbix_port" lineno="98096">
23741 <summary>
23742 Bind UDP sockets to the zabbix port.
23743 </summary>
23744 @@ -70694,7 +71314,7 @@ Domain allowed access.
23745 </param>
23746 <infoflow type="none"/>
23747 </interface>
23748 -<interface name="corenet_tcp_connect_zabbix_port" lineno="97694">
23749 +<interface name="corenet_tcp_connect_zabbix_port" lineno="98115">
23750 <summary>
23751 Make a TCP connection to the zabbix port.
23752 </summary>
23753 @@ -70704,7 +71324,7 @@ Domain allowed access.
23754 </summary>
23755 </param>
23756 </interface>
23757 -<interface name="corenet_send_zabbix_client_packets" lineno="97714">
23758 +<interface name="corenet_send_zabbix_client_packets" lineno="98135">
23759 <summary>
23760 Send zabbix_client packets.
23761 </summary>
23762 @@ -70715,7 +71335,7 @@ Domain allowed access.
23763 </param>
23764 <infoflow type="write" weight="10"/>
23765 </interface>
23766 -<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="97733">
23767 +<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="98154">
23768 <summary>
23769 Do not audit attempts to send zabbix_client packets.
23770 </summary>
23771 @@ -70726,7 +71346,7 @@ Domain to not audit.
23772 </param>
23773 <infoflow type="none"/>
23774 </interface>
23775 -<interface name="corenet_receive_zabbix_client_packets" lineno="97752">
23776 +<interface name="corenet_receive_zabbix_client_packets" lineno="98173">
23777 <summary>
23778 Receive zabbix_client packets.
23779 </summary>
23780 @@ -70737,7 +71357,7 @@ Domain allowed access.
23781 </param>
23782 <infoflow type="read" weight="10"/>
23783 </interface>
23784 -<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="97771">
23785 +<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="98192">
23786 <summary>
23787 Do not audit attempts to receive zabbix_client packets.
23788 </summary>
23789 @@ -70748,7 +71368,7 @@ Domain allowed access.
23790 </param>
23791 <infoflow type="none"/>
23792 </interface>
23793 -<interface name="corenet_sendrecv_zabbix_client_packets" lineno="97790">
23794 +<interface name="corenet_sendrecv_zabbix_client_packets" lineno="98211">
23795 <summary>
23796 Send and receive zabbix_client packets.
23797 </summary>
23798 @@ -70759,7 +71379,7 @@ Domain allowed access.
23799 </param>
23800 <infoflow type="both" weight="10"/>
23801 </interface>
23802 -<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="97806">
23803 +<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="98227">
23804 <summary>
23805 Do not audit attempts to send and receive zabbix_client packets.
23806 </summary>
23807 @@ -70770,7 +71390,7 @@ Domain to not audit.
23808 </param>
23809 <infoflow type="none"/>
23810 </interface>
23811 -<interface name="corenet_relabelto_zabbix_client_packets" lineno="97821">
23812 +<interface name="corenet_relabelto_zabbix_client_packets" lineno="98242">
23813 <summary>
23814 Relabel packets to zabbix_client the packet type.
23815 </summary>
23816 @@ -70780,7 +71400,7 @@ Domain allowed access.
23817 </summary>
23818 </param>
23819 </interface>
23820 -<interface name="corenet_send_zabbix_server_packets" lineno="97841">
23821 +<interface name="corenet_send_zabbix_server_packets" lineno="98262">
23822 <summary>
23823 Send zabbix_server packets.
23824 </summary>
23825 @@ -70791,7 +71411,7 @@ Domain allowed access.
23826 </param>
23827 <infoflow type="write" weight="10"/>
23828 </interface>
23829 -<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="97860">
23830 +<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="98281">
23831 <summary>
23832 Do not audit attempts to send zabbix_server packets.
23833 </summary>
23834 @@ -70802,7 +71422,7 @@ Domain to not audit.
23835 </param>
23836 <infoflow type="none"/>
23837 </interface>
23838 -<interface name="corenet_receive_zabbix_server_packets" lineno="97879">
23839 +<interface name="corenet_receive_zabbix_server_packets" lineno="98300">
23840 <summary>
23841 Receive zabbix_server packets.
23842 </summary>
23843 @@ -70813,7 +71433,7 @@ Domain allowed access.
23844 </param>
23845 <infoflow type="read" weight="10"/>
23846 </interface>
23847 -<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="97898">
23848 +<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="98319">
23849 <summary>
23850 Do not audit attempts to receive zabbix_server packets.
23851 </summary>
23852 @@ -70824,7 +71444,7 @@ Domain allowed access.
23853 </param>
23854 <infoflow type="none"/>
23855 </interface>
23856 -<interface name="corenet_sendrecv_zabbix_server_packets" lineno="97917">
23857 +<interface name="corenet_sendrecv_zabbix_server_packets" lineno="98338">
23858 <summary>
23859 Send and receive zabbix_server packets.
23860 </summary>
23861 @@ -70835,7 +71455,7 @@ Domain allowed access.
23862 </param>
23863 <infoflow type="both" weight="10"/>
23864 </interface>
23865 -<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="97933">
23866 +<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="98354">
23867 <summary>
23868 Do not audit attempts to send and receive zabbix_server packets.
23869 </summary>
23870 @@ -70846,7 +71466,7 @@ Domain to not audit.
23871 </param>
23872 <infoflow type="none"/>
23873 </interface>
23874 -<interface name="corenet_relabelto_zabbix_server_packets" lineno="97948">
23875 +<interface name="corenet_relabelto_zabbix_server_packets" lineno="98369">
23876 <summary>
23877 Relabel packets to zabbix_server the packet type.
23878 </summary>
23879 @@ -70856,7 +71476,7 @@ Domain allowed access.
23880 </summary>
23881 </param>
23882 </interface>
23883 -<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="97970">
23884 +<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="98391">
23885 <summary>
23886 Send and receive TCP traffic on the zabbix_agent port.
23887 </summary>
23888 @@ -70867,7 +71487,7 @@ Domain allowed access.
23889 </param>
23890 <infoflow type="both" weight="10"/>
23891 </interface>
23892 -<interface name="corenet_udp_send_zabbix_agent_port" lineno="97985">
23893 +<interface name="corenet_udp_send_zabbix_agent_port" lineno="98406">
23894 <summary>
23895 Send UDP traffic on the zabbix_agent port.
23896 </summary>
23897 @@ -70878,7 +71498,7 @@ Domain allowed access.
23898 </param>
23899 <infoflow type="write" weight="10"/>
23900 </interface>
23901 -<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="98000">
23902 +<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="98421">
23903 <summary>
23904 Do not audit attempts to send UDP traffic on the zabbix_agent port.
23905 </summary>
23906 @@ -70889,7 +71509,7 @@ Domain to not audit.
23907 </param>
23908 <infoflow type="none"/>
23909 </interface>
23910 -<interface name="corenet_udp_receive_zabbix_agent_port" lineno="98015">
23911 +<interface name="corenet_udp_receive_zabbix_agent_port" lineno="98436">
23912 <summary>
23913 Receive UDP traffic on the zabbix_agent port.
23914 </summary>
23915 @@ -70900,7 +71520,7 @@ Domain allowed access.
23916 </param>
23917 <infoflow type="read" weight="10"/>
23918 </interface>
23919 -<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="98030">
23920 +<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="98451">
23921 <summary>
23922 Do not audit attempts to receive UDP traffic on the zabbix_agent port.
23923 </summary>
23924 @@ -70911,7 +71531,7 @@ Domain to not audit.
23925 </param>
23926 <infoflow type="none"/>
23927 </interface>
23928 -<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="98045">
23929 +<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="98466">
23930 <summary>
23931 Send and receive UDP traffic on the zabbix_agent port.
23932 </summary>
23933 @@ -70922,7 +71542,7 @@ Domain allowed access.
23934 </param>
23935 <infoflow type="both" weight="10"/>
23936 </interface>
23937 -<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="98061">
23938 +<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="98482">
23939 <summary>
23940 Do not audit attempts to send and receive
23941 UDP traffic on the zabbix_agent port.
23942 @@ -70934,7 +71554,7 @@ Domain to not audit.
23943 </param>
23944 <infoflow type="none"/>
23945 </interface>
23946 -<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="98076">
23947 +<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="98497">
23948 <summary>
23949 Bind TCP sockets to the zabbix_agent port.
23950 </summary>
23951 @@ -70945,7 +71565,7 @@ Domain allowed access.
23952 </param>
23953 <infoflow type="none"/>
23954 </interface>
23955 -<interface name="corenet_udp_bind_zabbix_agent_port" lineno="98096">
23956 +<interface name="corenet_udp_bind_zabbix_agent_port" lineno="98517">
23957 <summary>
23958 Bind UDP sockets to the zabbix_agent port.
23959 </summary>
23960 @@ -70956,7 +71576,7 @@ Domain allowed access.
23961 </param>
23962 <infoflow type="none"/>
23963 </interface>
23964 -<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="98115">
23965 +<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="98536">
23966 <summary>
23967 Make a TCP connection to the zabbix_agent port.
23968 </summary>
23969 @@ -70966,7 +71586,7 @@ Domain allowed access.
23970 </summary>
23971 </param>
23972 </interface>
23973 -<interface name="corenet_send_zabbix_agent_client_packets" lineno="98135">
23974 +<interface name="corenet_send_zabbix_agent_client_packets" lineno="98556">
23975 <summary>
23976 Send zabbix_agent_client packets.
23977 </summary>
23978 @@ -70977,7 +71597,7 @@ Domain allowed access.
23979 </param>
23980 <infoflow type="write" weight="10"/>
23981 </interface>
23982 -<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="98154">
23983 +<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="98575">
23984 <summary>
23985 Do not audit attempts to send zabbix_agent_client packets.
23986 </summary>
23987 @@ -70988,7 +71608,7 @@ Domain to not audit.
23988 </param>
23989 <infoflow type="none"/>
23990 </interface>
23991 -<interface name="corenet_receive_zabbix_agent_client_packets" lineno="98173">
23992 +<interface name="corenet_receive_zabbix_agent_client_packets" lineno="98594">
23993 <summary>
23994 Receive zabbix_agent_client packets.
23995 </summary>
23996 @@ -70999,7 +71619,7 @@ Domain allowed access.
23997 </param>
23998 <infoflow type="read" weight="10"/>
23999 </interface>
24000 -<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="98192">
24001 +<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="98613">
24002 <summary>
24003 Do not audit attempts to receive zabbix_agent_client packets.
24004 </summary>
24005 @@ -71010,7 +71630,7 @@ Domain allowed access.
24006 </param>
24007 <infoflow type="none"/>
24008 </interface>
24009 -<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="98211">
24010 +<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="98632">
24011 <summary>
24012 Send and receive zabbix_agent_client packets.
24013 </summary>
24014 @@ -71021,7 +71641,7 @@ Domain allowed access.
24015 </param>
24016 <infoflow type="both" weight="10"/>
24017 </interface>
24018 -<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="98227">
24019 +<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="98648">
24020 <summary>
24021 Do not audit attempts to send and receive zabbix_agent_client packets.
24022 </summary>
24023 @@ -71032,7 +71652,7 @@ Domain to not audit.
24024 </param>
24025 <infoflow type="none"/>
24026 </interface>
24027 -<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="98242">
24028 +<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="98663">
24029 <summary>
24030 Relabel packets to zabbix_agent_client the packet type.
24031 </summary>
24032 @@ -71042,7 +71662,7 @@ Domain allowed access.
24033 </summary>
24034 </param>
24035 </interface>
24036 -<interface name="corenet_send_zabbix_agent_server_packets" lineno="98262">
24037 +<interface name="corenet_send_zabbix_agent_server_packets" lineno="98683">
24038 <summary>
24039 Send zabbix_agent_server packets.
24040 </summary>
24041 @@ -71053,7 +71673,7 @@ Domain allowed access.
24042 </param>
24043 <infoflow type="write" weight="10"/>
24044 </interface>
24045 -<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="98281">
24046 +<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="98702">
24047 <summary>
24048 Do not audit attempts to send zabbix_agent_server packets.
24049 </summary>
24050 @@ -71064,7 +71684,7 @@ Domain to not audit.
24051 </param>
24052 <infoflow type="none"/>
24053 </interface>
24054 -<interface name="corenet_receive_zabbix_agent_server_packets" lineno="98300">
24055 +<interface name="corenet_receive_zabbix_agent_server_packets" lineno="98721">
24056 <summary>
24057 Receive zabbix_agent_server packets.
24058 </summary>
24059 @@ -71075,7 +71695,7 @@ Domain allowed access.
24060 </param>
24061 <infoflow type="read" weight="10"/>
24062 </interface>
24063 -<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="98319">
24064 +<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="98740">
24065 <summary>
24066 Do not audit attempts to receive zabbix_agent_server packets.
24067 </summary>
24068 @@ -71086,7 +71706,7 @@ Domain allowed access.
24069 </param>
24070 <infoflow type="none"/>
24071 </interface>
24072 -<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="98338">
24073 +<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="98759">
24074 <summary>
24075 Send and receive zabbix_agent_server packets.
24076 </summary>
24077 @@ -71097,7 +71717,7 @@ Domain allowed access.
24078 </param>
24079 <infoflow type="both" weight="10"/>
24080 </interface>
24081 -<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="98354">
24082 +<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="98775">
24083 <summary>
24084 Do not audit attempts to send and receive zabbix_agent_server packets.
24085 </summary>
24086 @@ -71108,7 +71728,7 @@ Domain to not audit.
24087 </param>
24088 <infoflow type="none"/>
24089 </interface>
24090 -<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="98369">
24091 +<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="98790">
24092 <summary>
24093 Relabel packets to zabbix_agent_server the packet type.
24094 </summary>
24095 @@ -71118,7 +71738,7 @@ Domain allowed access.
24096 </summary>
24097 </param>
24098 </interface>
24099 -<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="98391">
24100 +<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="98812">
24101 <summary>
24102 Send and receive TCP traffic on the zookeeper_client port.
24103 </summary>
24104 @@ -71129,7 +71749,7 @@ Domain allowed access.
24105 </param>
24106 <infoflow type="both" weight="10"/>
24107 </interface>
24108 -<interface name="corenet_udp_send_zookeeper_client_port" lineno="98406">
24109 +<interface name="corenet_udp_send_zookeeper_client_port" lineno="98827">
24110 <summary>
24111 Send UDP traffic on the zookeeper_client port.
24112 </summary>
24113 @@ -71140,7 +71760,7 @@ Domain allowed access.
24114 </param>
24115 <infoflow type="write" weight="10"/>
24116 </interface>
24117 -<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="98421">
24118 +<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="98842">
24119 <summary>
24120 Do not audit attempts to send UDP traffic on the zookeeper_client port.
24121 </summary>
24122 @@ -71151,7 +71771,7 @@ Domain to not audit.
24123 </param>
24124 <infoflow type="none"/>
24125 </interface>
24126 -<interface name="corenet_udp_receive_zookeeper_client_port" lineno="98436">
24127 +<interface name="corenet_udp_receive_zookeeper_client_port" lineno="98857">
24128 <summary>
24129 Receive UDP traffic on the zookeeper_client port.
24130 </summary>
24131 @@ -71162,7 +71782,7 @@ Domain allowed access.
24132 </param>
24133 <infoflow type="read" weight="10"/>
24134 </interface>
24135 -<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="98451">
24136 +<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="98872">
24137 <summary>
24138 Do not audit attempts to receive UDP traffic on the zookeeper_client port.
24139 </summary>
24140 @@ -71173,7 +71793,7 @@ Domain to not audit.
24141 </param>
24142 <infoflow type="none"/>
24143 </interface>
24144 -<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="98466">
24145 +<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="98887">
24146 <summary>
24147 Send and receive UDP traffic on the zookeeper_client port.
24148 </summary>
24149 @@ -71184,7 +71804,7 @@ Domain allowed access.
24150 </param>
24151 <infoflow type="both" weight="10"/>
24152 </interface>
24153 -<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="98482">
24154 +<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="98903">
24155 <summary>
24156 Do not audit attempts to send and receive
24157 UDP traffic on the zookeeper_client port.
24158 @@ -71196,7 +71816,7 @@ Domain to not audit.
24159 </param>
24160 <infoflow type="none"/>
24161 </interface>
24162 -<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="98497">
24163 +<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="98918">
24164 <summary>
24165 Bind TCP sockets to the zookeeper_client port.
24166 </summary>
24167 @@ -71207,7 +71827,7 @@ Domain allowed access.
24168 </param>
24169 <infoflow type="none"/>
24170 </interface>
24171 -<interface name="corenet_udp_bind_zookeeper_client_port" lineno="98517">
24172 +<interface name="corenet_udp_bind_zookeeper_client_port" lineno="98938">
24173 <summary>
24174 Bind UDP sockets to the zookeeper_client port.
24175 </summary>
24176 @@ -71218,7 +71838,7 @@ Domain allowed access.
24177 </param>
24178 <infoflow type="none"/>
24179 </interface>
24180 -<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="98536">
24181 +<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="98957">
24182 <summary>
24183 Make a TCP connection to the zookeeper_client port.
24184 </summary>
24185 @@ -71228,7 +71848,7 @@ Domain allowed access.
24186 </summary>
24187 </param>
24188 </interface>
24189 -<interface name="corenet_send_zookeeper_client_client_packets" lineno="98556">
24190 +<interface name="corenet_send_zookeeper_client_client_packets" lineno="98977">
24191 <summary>
24192 Send zookeeper_client_client packets.
24193 </summary>
24194 @@ -71239,7 +71859,7 @@ Domain allowed access.
24195 </param>
24196 <infoflow type="write" weight="10"/>
24197 </interface>
24198 -<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="98575">
24199 +<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="98996">
24200 <summary>
24201 Do not audit attempts to send zookeeper_client_client packets.
24202 </summary>
24203 @@ -71250,7 +71870,7 @@ Domain to not audit.
24204 </param>
24205 <infoflow type="none"/>
24206 </interface>
24207 -<interface name="corenet_receive_zookeeper_client_client_packets" lineno="98594">
24208 +<interface name="corenet_receive_zookeeper_client_client_packets" lineno="99015">
24209 <summary>
24210 Receive zookeeper_client_client packets.
24211 </summary>
24212 @@ -71261,7 +71881,7 @@ Domain allowed access.
24213 </param>
24214 <infoflow type="read" weight="10"/>
24215 </interface>
24216 -<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="98613">
24217 +<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="99034">
24218 <summary>
24219 Do not audit attempts to receive zookeeper_client_client packets.
24220 </summary>
24221 @@ -71272,7 +71892,7 @@ Domain allowed access.
24222 </param>
24223 <infoflow type="none"/>
24224 </interface>
24225 -<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="98632">
24226 +<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="99053">
24227 <summary>
24228 Send and receive zookeeper_client_client packets.
24229 </summary>
24230 @@ -71283,7 +71903,7 @@ Domain allowed access.
24231 </param>
24232 <infoflow type="both" weight="10"/>
24233 </interface>
24234 -<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="98648">
24235 +<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="99069">
24236 <summary>
24237 Do not audit attempts to send and receive zookeeper_client_client packets.
24238 </summary>
24239 @@ -71294,7 +71914,7 @@ Domain to not audit.
24240 </param>
24241 <infoflow type="none"/>
24242 </interface>
24243 -<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="98663">
24244 +<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="99084">
24245 <summary>
24246 Relabel packets to zookeeper_client_client the packet type.
24247 </summary>
24248 @@ -71304,7 +71924,7 @@ Domain allowed access.
24249 </summary>
24250 </param>
24251 </interface>
24252 -<interface name="corenet_send_zookeeper_client_server_packets" lineno="98683">
24253 +<interface name="corenet_send_zookeeper_client_server_packets" lineno="99104">
24254 <summary>
24255 Send zookeeper_client_server packets.
24256 </summary>
24257 @@ -71315,7 +71935,7 @@ Domain allowed access.
24258 </param>
24259 <infoflow type="write" weight="10"/>
24260 </interface>
24261 -<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="98702">
24262 +<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="99123">
24263 <summary>
24264 Do not audit attempts to send zookeeper_client_server packets.
24265 </summary>
24266 @@ -71326,7 +71946,7 @@ Domain to not audit.
24267 </param>
24268 <infoflow type="none"/>
24269 </interface>
24270 -<interface name="corenet_receive_zookeeper_client_server_packets" lineno="98721">
24271 +<interface name="corenet_receive_zookeeper_client_server_packets" lineno="99142">
24272 <summary>
24273 Receive zookeeper_client_server packets.
24274 </summary>
24275 @@ -71337,7 +71957,7 @@ Domain allowed access.
24276 </param>
24277 <infoflow type="read" weight="10"/>
24278 </interface>
24279 -<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="98740">
24280 +<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="99161">
24281 <summary>
24282 Do not audit attempts to receive zookeeper_client_server packets.
24283 </summary>
24284 @@ -71348,7 +71968,7 @@ Domain allowed access.
24285 </param>
24286 <infoflow type="none"/>
24287 </interface>
24288 -<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="98759">
24289 +<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="99180">
24290 <summary>
24291 Send and receive zookeeper_client_server packets.
24292 </summary>
24293 @@ -71359,7 +71979,7 @@ Domain allowed access.
24294 </param>
24295 <infoflow type="both" weight="10"/>
24296 </interface>
24297 -<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="98775">
24298 +<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="99196">
24299 <summary>
24300 Do not audit attempts to send and receive zookeeper_client_server packets.
24301 </summary>
24302 @@ -71370,7 +71990,7 @@ Domain to not audit.
24303 </param>
24304 <infoflow type="none"/>
24305 </interface>
24306 -<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="98790">
24307 +<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="99211">
24308 <summary>
24309 Relabel packets to zookeeper_client_server the packet type.
24310 </summary>
24311 @@ -71380,7 +72000,7 @@ Domain allowed access.
24312 </summary>
24313 </param>
24314 </interface>
24315 -<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="98812">
24316 +<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="99233">
24317 <summary>
24318 Send and receive TCP traffic on the zookeeper_election port.
24319 </summary>
24320 @@ -71391,7 +72011,7 @@ Domain allowed access.
24321 </param>
24322 <infoflow type="both" weight="10"/>
24323 </interface>
24324 -<interface name="corenet_udp_send_zookeeper_election_port" lineno="98827">
24325 +<interface name="corenet_udp_send_zookeeper_election_port" lineno="99248">
24326 <summary>
24327 Send UDP traffic on the zookeeper_election port.
24328 </summary>
24329 @@ -71402,7 +72022,7 @@ Domain allowed access.
24330 </param>
24331 <infoflow type="write" weight="10"/>
24332 </interface>
24333 -<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="98842">
24334 +<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="99263">
24335 <summary>
24336 Do not audit attempts to send UDP traffic on the zookeeper_election port.
24337 </summary>
24338 @@ -71413,7 +72033,7 @@ Domain to not audit.
24339 </param>
24340 <infoflow type="none"/>
24341 </interface>
24342 -<interface name="corenet_udp_receive_zookeeper_election_port" lineno="98857">
24343 +<interface name="corenet_udp_receive_zookeeper_election_port" lineno="99278">
24344 <summary>
24345 Receive UDP traffic on the zookeeper_election port.
24346 </summary>
24347 @@ -71424,7 +72044,7 @@ Domain allowed access.
24348 </param>
24349 <infoflow type="read" weight="10"/>
24350 </interface>
24351 -<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="98872">
24352 +<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="99293">
24353 <summary>
24354 Do not audit attempts to receive UDP traffic on the zookeeper_election port.
24355 </summary>
24356 @@ -71435,7 +72055,7 @@ Domain to not audit.
24357 </param>
24358 <infoflow type="none"/>
24359 </interface>
24360 -<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="98887">
24361 +<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="99308">
24362 <summary>
24363 Send and receive UDP traffic on the zookeeper_election port.
24364 </summary>
24365 @@ -71446,7 +72066,7 @@ Domain allowed access.
24366 </param>
24367 <infoflow type="both" weight="10"/>
24368 </interface>
24369 -<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="98903">
24370 +<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="99324">
24371 <summary>
24372 Do not audit attempts to send and receive
24373 UDP traffic on the zookeeper_election port.
24374 @@ -71458,7 +72078,7 @@ Domain to not audit.
24375 </param>
24376 <infoflow type="none"/>
24377 </interface>
24378 -<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="98918">
24379 +<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="99339">
24380 <summary>
24381 Bind TCP sockets to the zookeeper_election port.
24382 </summary>
24383 @@ -71469,7 +72089,7 @@ Domain allowed access.
24384 </param>
24385 <infoflow type="none"/>
24386 </interface>
24387 -<interface name="corenet_udp_bind_zookeeper_election_port" lineno="98938">
24388 +<interface name="corenet_udp_bind_zookeeper_election_port" lineno="99359">
24389 <summary>
24390 Bind UDP sockets to the zookeeper_election port.
24391 </summary>
24392 @@ -71480,7 +72100,7 @@ Domain allowed access.
24393 </param>
24394 <infoflow type="none"/>
24395 </interface>
24396 -<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="98957">
24397 +<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="99378">
24398 <summary>
24399 Make a TCP connection to the zookeeper_election port.
24400 </summary>
24401 @@ -71490,7 +72110,7 @@ Domain allowed access.
24402 </summary>
24403 </param>
24404 </interface>
24405 -<interface name="corenet_send_zookeeper_election_client_packets" lineno="98977">
24406 +<interface name="corenet_send_zookeeper_election_client_packets" lineno="99398">
24407 <summary>
24408 Send zookeeper_election_client packets.
24409 </summary>
24410 @@ -71501,7 +72121,7 @@ Domain allowed access.
24411 </param>
24412 <infoflow type="write" weight="10"/>
24413 </interface>
24414 -<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="98996">
24415 +<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="99417">
24416 <summary>
24417 Do not audit attempts to send zookeeper_election_client packets.
24418 </summary>
24419 @@ -71512,7 +72132,7 @@ Domain to not audit.
24420 </param>
24421 <infoflow type="none"/>
24422 </interface>
24423 -<interface name="corenet_receive_zookeeper_election_client_packets" lineno="99015">
24424 +<interface name="corenet_receive_zookeeper_election_client_packets" lineno="99436">
24425 <summary>
24426 Receive zookeeper_election_client packets.
24427 </summary>
24428 @@ -71523,7 +72143,7 @@ Domain allowed access.
24429 </param>
24430 <infoflow type="read" weight="10"/>
24431 </interface>
24432 -<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="99034">
24433 +<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="99455">
24434 <summary>
24435 Do not audit attempts to receive zookeeper_election_client packets.
24436 </summary>
24437 @@ -71534,7 +72154,7 @@ Domain allowed access.
24438 </param>
24439 <infoflow type="none"/>
24440 </interface>
24441 -<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="99053">
24442 +<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="99474">
24443 <summary>
24444 Send and receive zookeeper_election_client packets.
24445 </summary>
24446 @@ -71545,7 +72165,7 @@ Domain allowed access.
24447 </param>
24448 <infoflow type="both" weight="10"/>
24449 </interface>
24450 -<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="99069">
24451 +<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="99490">
24452 <summary>
24453 Do not audit attempts to send and receive zookeeper_election_client packets.
24454 </summary>
24455 @@ -71556,7 +72176,7 @@ Domain to not audit.
24456 </param>
24457 <infoflow type="none"/>
24458 </interface>
24459 -<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="99084">
24460 +<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="99505">
24461 <summary>
24462 Relabel packets to zookeeper_election_client the packet type.
24463 </summary>
24464 @@ -71566,7 +72186,7 @@ Domain allowed access.
24465 </summary>
24466 </param>
24467 </interface>
24468 -<interface name="corenet_send_zookeeper_election_server_packets" lineno="99104">
24469 +<interface name="corenet_send_zookeeper_election_server_packets" lineno="99525">
24470 <summary>
24471 Send zookeeper_election_server packets.
24472 </summary>
24473 @@ -71577,7 +72197,7 @@ Domain allowed access.
24474 </param>
24475 <infoflow type="write" weight="10"/>
24476 </interface>
24477 -<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="99123">
24478 +<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="99544">
24479 <summary>
24480 Do not audit attempts to send zookeeper_election_server packets.
24481 </summary>
24482 @@ -71588,7 +72208,7 @@ Domain to not audit.
24483 </param>
24484 <infoflow type="none"/>
24485 </interface>
24486 -<interface name="corenet_receive_zookeeper_election_server_packets" lineno="99142">
24487 +<interface name="corenet_receive_zookeeper_election_server_packets" lineno="99563">
24488 <summary>
24489 Receive zookeeper_election_server packets.
24490 </summary>
24491 @@ -71599,7 +72219,7 @@ Domain allowed access.
24492 </param>
24493 <infoflow type="read" weight="10"/>
24494 </interface>
24495 -<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="99161">
24496 +<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="99582">
24497 <summary>
24498 Do not audit attempts to receive zookeeper_election_server packets.
24499 </summary>
24500 @@ -71610,7 +72230,7 @@ Domain allowed access.
24501 </param>
24502 <infoflow type="none"/>
24503 </interface>
24504 -<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="99180">
24505 +<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="99601">
24506 <summary>
24507 Send and receive zookeeper_election_server packets.
24508 </summary>
24509 @@ -71621,7 +72241,7 @@ Domain allowed access.
24510 </param>
24511 <infoflow type="both" weight="10"/>
24512 </interface>
24513 -<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="99196">
24514 +<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="99617">
24515 <summary>
24516 Do not audit attempts to send and receive zookeeper_election_server packets.
24517 </summary>
24518 @@ -71632,7 +72252,7 @@ Domain to not audit.
24519 </param>
24520 <infoflow type="none"/>
24521 </interface>
24522 -<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="99211">
24523 +<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="99632">
24524 <summary>
24525 Relabel packets to zookeeper_election_server the packet type.
24526 </summary>
24527 @@ -71642,7 +72262,7 @@ Domain allowed access.
24528 </summary>
24529 </param>
24530 </interface>
24531 -<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="99233">
24532 +<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="99654">
24533 <summary>
24534 Send and receive TCP traffic on the zookeeper_leader port.
24535 </summary>
24536 @@ -71653,7 +72273,7 @@ Domain allowed access.
24537 </param>
24538 <infoflow type="both" weight="10"/>
24539 </interface>
24540 -<interface name="corenet_udp_send_zookeeper_leader_port" lineno="99248">
24541 +<interface name="corenet_udp_send_zookeeper_leader_port" lineno="99669">
24542 <summary>
24543 Send UDP traffic on the zookeeper_leader port.
24544 </summary>
24545 @@ -71664,7 +72284,7 @@ Domain allowed access.
24546 </param>
24547 <infoflow type="write" weight="10"/>
24548 </interface>
24549 -<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="99263">
24550 +<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="99684">
24551 <summary>
24552 Do not audit attempts to send UDP traffic on the zookeeper_leader port.
24553 </summary>
24554 @@ -71675,7 +72295,7 @@ Domain to not audit.
24555 </param>
24556 <infoflow type="none"/>
24557 </interface>
24558 -<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="99278">
24559 +<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="99699">
24560 <summary>
24561 Receive UDP traffic on the zookeeper_leader port.
24562 </summary>
24563 @@ -71686,7 +72306,7 @@ Domain allowed access.
24564 </param>
24565 <infoflow type="read" weight="10"/>
24566 </interface>
24567 -<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="99293">
24568 +<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="99714">
24569 <summary>
24570 Do not audit attempts to receive UDP traffic on the zookeeper_leader port.
24571 </summary>
24572 @@ -71697,7 +72317,7 @@ Domain to not audit.
24573 </param>
24574 <infoflow type="none"/>
24575 </interface>
24576 -<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="99308">
24577 +<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="99729">
24578 <summary>
24579 Send and receive UDP traffic on the zookeeper_leader port.
24580 </summary>
24581 @@ -71708,7 +72328,7 @@ Domain allowed access.
24582 </param>
24583 <infoflow type="both" weight="10"/>
24584 </interface>
24585 -<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="99324">
24586 +<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="99745">
24587 <summary>
24588 Do not audit attempts to send and receive
24589 UDP traffic on the zookeeper_leader port.
24590 @@ -71720,7 +72340,7 @@ Domain to not audit.
24591 </param>
24592 <infoflow type="none"/>
24593 </interface>
24594 -<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="99339">
24595 +<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="99760">
24596 <summary>
24597 Bind TCP sockets to the zookeeper_leader port.
24598 </summary>
24599 @@ -71731,7 +72351,7 @@ Domain allowed access.
24600 </param>
24601 <infoflow type="none"/>
24602 </interface>
24603 -<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="99359">
24604 +<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="99780">
24605 <summary>
24606 Bind UDP sockets to the zookeeper_leader port.
24607 </summary>
24608 @@ -71742,7 +72362,7 @@ Domain allowed access.
24609 </param>
24610 <infoflow type="none"/>
24611 </interface>
24612 -<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="99378">
24613 +<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="99799">
24614 <summary>
24615 Make a TCP connection to the zookeeper_leader port.
24616 </summary>
24617 @@ -71752,7 +72372,7 @@ Domain allowed access.
24618 </summary>
24619 </param>
24620 </interface>
24621 -<interface name="corenet_send_zookeeper_leader_client_packets" lineno="99398">
24622 +<interface name="corenet_send_zookeeper_leader_client_packets" lineno="99819">
24623 <summary>
24624 Send zookeeper_leader_client packets.
24625 </summary>
24626 @@ -71763,7 +72383,7 @@ Domain allowed access.
24627 </param>
24628 <infoflow type="write" weight="10"/>
24629 </interface>
24630 -<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="99417">
24631 +<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="99838">
24632 <summary>
24633 Do not audit attempts to send zookeeper_leader_client packets.
24634 </summary>
24635 @@ -71774,7 +72394,7 @@ Domain to not audit.
24636 </param>
24637 <infoflow type="none"/>
24638 </interface>
24639 -<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="99436">
24640 +<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="99857">
24641 <summary>
24642 Receive zookeeper_leader_client packets.
24643 </summary>
24644 @@ -71785,7 +72405,7 @@ Domain allowed access.
24645 </param>
24646 <infoflow type="read" weight="10"/>
24647 </interface>
24648 -<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="99455">
24649 +<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="99876">
24650 <summary>
24651 Do not audit attempts to receive zookeeper_leader_client packets.
24652 </summary>
24653 @@ -71796,7 +72416,7 @@ Domain allowed access.
24654 </param>
24655 <infoflow type="none"/>
24656 </interface>
24657 -<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="99474">
24658 +<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="99895">
24659 <summary>
24660 Send and receive zookeeper_leader_client packets.
24661 </summary>
24662 @@ -71807,7 +72427,7 @@ Domain allowed access.
24663 </param>
24664 <infoflow type="both" weight="10"/>
24665 </interface>
24666 -<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="99490">
24667 +<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="99911">
24668 <summary>
24669 Do not audit attempts to send and receive zookeeper_leader_client packets.
24670 </summary>
24671 @@ -71818,7 +72438,7 @@ Domain to not audit.
24672 </param>
24673 <infoflow type="none"/>
24674 </interface>
24675 -<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="99505">
24676 +<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="99926">
24677 <summary>
24678 Relabel packets to zookeeper_leader_client the packet type.
24679 </summary>
24680 @@ -71828,7 +72448,7 @@ Domain allowed access.
24681 </summary>
24682 </param>
24683 </interface>
24684 -<interface name="corenet_send_zookeeper_leader_server_packets" lineno="99525">
24685 +<interface name="corenet_send_zookeeper_leader_server_packets" lineno="99946">
24686 <summary>
24687 Send zookeeper_leader_server packets.
24688 </summary>
24689 @@ -71839,7 +72459,7 @@ Domain allowed access.
24690 </param>
24691 <infoflow type="write" weight="10"/>
24692 </interface>
24693 -<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="99544">
24694 +<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="99965">
24695 <summary>
24696 Do not audit attempts to send zookeeper_leader_server packets.
24697 </summary>
24698 @@ -71850,7 +72470,7 @@ Domain to not audit.
24699 </param>
24700 <infoflow type="none"/>
24701 </interface>
24702 -<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="99563">
24703 +<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="99984">
24704 <summary>
24705 Receive zookeeper_leader_server packets.
24706 </summary>
24707 @@ -71861,7 +72481,7 @@ Domain allowed access.
24708 </param>
24709 <infoflow type="read" weight="10"/>
24710 </interface>
24711 -<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="99582">
24712 +<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="100003">
24713 <summary>
24714 Do not audit attempts to receive zookeeper_leader_server packets.
24715 </summary>
24716 @@ -71872,7 +72492,7 @@ Domain allowed access.
24717 </param>
24718 <infoflow type="none"/>
24719 </interface>
24720 -<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="99601">
24721 +<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="100022">
24722 <summary>
24723 Send and receive zookeeper_leader_server packets.
24724 </summary>
24725 @@ -71883,7 +72503,7 @@ Domain allowed access.
24726 </param>
24727 <infoflow type="both" weight="10"/>
24728 </interface>
24729 -<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="99617">
24730 +<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="100038">
24731 <summary>
24732 Do not audit attempts to send and receive zookeeper_leader_server packets.
24733 </summary>
24734 @@ -71894,7 +72514,7 @@ Domain to not audit.
24735 </param>
24736 <infoflow type="none"/>
24737 </interface>
24738 -<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="99632">
24739 +<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="100053">
24740 <summary>
24741 Relabel packets to zookeeper_leader_server the packet type.
24742 </summary>
24743 @@ -71904,7 +72524,7 @@ Domain allowed access.
24744 </summary>
24745 </param>
24746 </interface>
24747 -<interface name="corenet_tcp_sendrecv_zebra_port" lineno="99654">
24748 +<interface name="corenet_tcp_sendrecv_zebra_port" lineno="100075">
24749 <summary>
24750 Send and receive TCP traffic on the zebra port.
24751 </summary>
24752 @@ -71915,7 +72535,7 @@ Domain allowed access.
24753 </param>
24754 <infoflow type="both" weight="10"/>
24755 </interface>
24756 -<interface name="corenet_udp_send_zebra_port" lineno="99669">
24757 +<interface name="corenet_udp_send_zebra_port" lineno="100090">
24758 <summary>
24759 Send UDP traffic on the zebra port.
24760 </summary>
24761 @@ -71926,7 +72546,7 @@ Domain allowed access.
24762 </param>
24763 <infoflow type="write" weight="10"/>
24764 </interface>
24765 -<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="99684">
24766 +<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="100105">
24767 <summary>
24768 Do not audit attempts to send UDP traffic on the zebra port.
24769 </summary>
24770 @@ -71937,7 +72557,7 @@ Domain to not audit.
24771 </param>
24772 <infoflow type="none"/>
24773 </interface>
24774 -<interface name="corenet_udp_receive_zebra_port" lineno="99699">
24775 +<interface name="corenet_udp_receive_zebra_port" lineno="100120">
24776 <summary>
24777 Receive UDP traffic on the zebra port.
24778 </summary>
24779 @@ -71948,7 +72568,7 @@ Domain allowed access.
24780 </param>
24781 <infoflow type="read" weight="10"/>
24782 </interface>
24783 -<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="99714">
24784 +<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="100135">
24785 <summary>
24786 Do not audit attempts to receive UDP traffic on the zebra port.
24787 </summary>
24788 @@ -71959,7 +72579,7 @@ Domain to not audit.
24789 </param>
24790 <infoflow type="none"/>
24791 </interface>
24792 -<interface name="corenet_udp_sendrecv_zebra_port" lineno="99729">
24793 +<interface name="corenet_udp_sendrecv_zebra_port" lineno="100150">
24794 <summary>
24795 Send and receive UDP traffic on the zebra port.
24796 </summary>
24797 @@ -71970,7 +72590,7 @@ Domain allowed access.
24798 </param>
24799 <infoflow type="both" weight="10"/>
24800 </interface>
24801 -<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="99745">
24802 +<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="100166">
24803 <summary>
24804 Do not audit attempts to send and receive
24805 UDP traffic on the zebra port.
24806 @@ -71982,7 +72602,7 @@ Domain to not audit.
24807 </param>
24808 <infoflow type="none"/>
24809 </interface>
24810 -<interface name="corenet_tcp_bind_zebra_port" lineno="99760">
24811 +<interface name="corenet_tcp_bind_zebra_port" lineno="100181">
24812 <summary>
24813 Bind TCP sockets to the zebra port.
24814 </summary>
24815 @@ -71993,7 +72613,7 @@ Domain allowed access.
24816 </param>
24817 <infoflow type="none"/>
24818 </interface>
24819 -<interface name="corenet_udp_bind_zebra_port" lineno="99780">
24820 +<interface name="corenet_udp_bind_zebra_port" lineno="100201">
24821 <summary>
24822 Bind UDP sockets to the zebra port.
24823 </summary>
24824 @@ -72004,7 +72624,7 @@ Domain allowed access.
24825 </param>
24826 <infoflow type="none"/>
24827 </interface>
24828 -<interface name="corenet_tcp_connect_zebra_port" lineno="99799">
24829 +<interface name="corenet_tcp_connect_zebra_port" lineno="100220">
24830 <summary>
24831 Make a TCP connection to the zebra port.
24832 </summary>
24833 @@ -72014,7 +72634,7 @@ Domain allowed access.
24834 </summary>
24835 </param>
24836 </interface>
24837 -<interface name="corenet_send_zebra_client_packets" lineno="99819">
24838 +<interface name="corenet_send_zebra_client_packets" lineno="100240">
24839 <summary>
24840 Send zebra_client packets.
24841 </summary>
24842 @@ -72025,7 +72645,7 @@ Domain allowed access.
24843 </param>
24844 <infoflow type="write" weight="10"/>
24845 </interface>
24846 -<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="99838">
24847 +<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="100259">
24848 <summary>
24849 Do not audit attempts to send zebra_client packets.
24850 </summary>
24851 @@ -72036,7 +72656,7 @@ Domain to not audit.
24852 </param>
24853 <infoflow type="none"/>
24854 </interface>
24855 -<interface name="corenet_receive_zebra_client_packets" lineno="99857">
24856 +<interface name="corenet_receive_zebra_client_packets" lineno="100278">
24857 <summary>
24858 Receive zebra_client packets.
24859 </summary>
24860 @@ -72047,7 +72667,7 @@ Domain allowed access.
24861 </param>
24862 <infoflow type="read" weight="10"/>
24863 </interface>
24864 -<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="99876">
24865 +<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="100297">
24866 <summary>
24867 Do not audit attempts to receive zebra_client packets.
24868 </summary>
24869 @@ -72058,7 +72678,7 @@ Domain allowed access.
24870 </param>
24871 <infoflow type="none"/>
24872 </interface>
24873 -<interface name="corenet_sendrecv_zebra_client_packets" lineno="99895">
24874 +<interface name="corenet_sendrecv_zebra_client_packets" lineno="100316">
24875 <summary>
24876 Send and receive zebra_client packets.
24877 </summary>
24878 @@ -72069,7 +72689,7 @@ Domain allowed access.
24879 </param>
24880 <infoflow type="both" weight="10"/>
24881 </interface>
24882 -<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="99911">
24883 +<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="100332">
24884 <summary>
24885 Do not audit attempts to send and receive zebra_client packets.
24886 </summary>
24887 @@ -72080,7 +72700,7 @@ Domain to not audit.
24888 </param>
24889 <infoflow type="none"/>
24890 </interface>
24891 -<interface name="corenet_relabelto_zebra_client_packets" lineno="99926">
24892 +<interface name="corenet_relabelto_zebra_client_packets" lineno="100347">
24893 <summary>
24894 Relabel packets to zebra_client the packet type.
24895 </summary>
24896 @@ -72090,7 +72710,7 @@ Domain allowed access.
24897 </summary>
24898 </param>
24899 </interface>
24900 -<interface name="corenet_send_zebra_server_packets" lineno="99946">
24901 +<interface name="corenet_send_zebra_server_packets" lineno="100367">
24902 <summary>
24903 Send zebra_server packets.
24904 </summary>
24905 @@ -72101,7 +72721,7 @@ Domain allowed access.
24906 </param>
24907 <infoflow type="write" weight="10"/>
24908 </interface>
24909 -<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="99965">
24910 +<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="100386">
24911 <summary>
24912 Do not audit attempts to send zebra_server packets.
24913 </summary>
24914 @@ -72112,7 +72732,7 @@ Domain to not audit.
24915 </param>
24916 <infoflow type="none"/>
24917 </interface>
24918 -<interface name="corenet_receive_zebra_server_packets" lineno="99984">
24919 +<interface name="corenet_receive_zebra_server_packets" lineno="100405">
24920 <summary>
24921 Receive zebra_server packets.
24922 </summary>
24923 @@ -72123,7 +72743,7 @@ Domain allowed access.
24924 </param>
24925 <infoflow type="read" weight="10"/>
24926 </interface>
24927 -<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="100003">
24928 +<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="100424">
24929 <summary>
24930 Do not audit attempts to receive zebra_server packets.
24931 </summary>
24932 @@ -72134,7 +72754,7 @@ Domain allowed access.
24933 </param>
24934 <infoflow type="none"/>
24935 </interface>
24936 -<interface name="corenet_sendrecv_zebra_server_packets" lineno="100022">
24937 +<interface name="corenet_sendrecv_zebra_server_packets" lineno="100443">
24938 <summary>
24939 Send and receive zebra_server packets.
24940 </summary>
24941 @@ -72145,7 +72765,7 @@ Domain allowed access.
24942 </param>
24943 <infoflow type="both" weight="10"/>
24944 </interface>
24945 -<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="100038">
24946 +<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="100459">
24947 <summary>
24948 Do not audit attempts to send and receive zebra_server packets.
24949 </summary>
24950 @@ -72156,7 +72776,7 @@ Domain to not audit.
24951 </param>
24952 <infoflow type="none"/>
24953 </interface>
24954 -<interface name="corenet_relabelto_zebra_server_packets" lineno="100053">
24955 +<interface name="corenet_relabelto_zebra_server_packets" lineno="100474">
24956 <summary>
24957 Relabel packets to zebra_server the packet type.
24958 </summary>
24959 @@ -72166,7 +72786,7 @@ Domain allowed access.
24960 </summary>
24961 </param>
24962 </interface>
24963 -<interface name="corenet_tcp_sendrecv_zented_port" lineno="100075">
24964 +<interface name="corenet_tcp_sendrecv_zented_port" lineno="100496">
24965 <summary>
24966 Send and receive TCP traffic on the zented port.
24967 </summary>
24968 @@ -72177,7 +72797,7 @@ Domain allowed access.
24969 </param>
24970 <infoflow type="both" weight="10"/>
24971 </interface>
24972 -<interface name="corenet_udp_send_zented_port" lineno="100090">
24973 +<interface name="corenet_udp_send_zented_port" lineno="100511">
24974 <summary>
24975 Send UDP traffic on the zented port.
24976 </summary>
24977 @@ -72188,7 +72808,7 @@ Domain allowed access.
24978 </param>
24979 <infoflow type="write" weight="10"/>
24980 </interface>
24981 -<interface name="corenet_dontaudit_udp_send_zented_port" lineno="100105">
24982 +<interface name="corenet_dontaudit_udp_send_zented_port" lineno="100526">
24983 <summary>
24984 Do not audit attempts to send UDP traffic on the zented port.
24985 </summary>
24986 @@ -72199,7 +72819,7 @@ Domain to not audit.
24987 </param>
24988 <infoflow type="none"/>
24989 </interface>
24990 -<interface name="corenet_udp_receive_zented_port" lineno="100120">
24991 +<interface name="corenet_udp_receive_zented_port" lineno="100541">
24992 <summary>
24993 Receive UDP traffic on the zented port.
24994 </summary>
24995 @@ -72210,7 +72830,7 @@ Domain allowed access.
24996 </param>
24997 <infoflow type="read" weight="10"/>
24998 </interface>
24999 -<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="100135">
25000 +<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="100556">
25001 <summary>
25002 Do not audit attempts to receive UDP traffic on the zented port.
25003 </summary>
25004 @@ -72221,7 +72841,7 @@ Domain to not audit.
25005 </param>
25006 <infoflow type="none"/>
25007 </interface>
25008 -<interface name="corenet_udp_sendrecv_zented_port" lineno="100150">
25009 +<interface name="corenet_udp_sendrecv_zented_port" lineno="100571">
25010 <summary>
25011 Send and receive UDP traffic on the zented port.
25012 </summary>
25013 @@ -72232,7 +72852,7 @@ Domain allowed access.
25014 </param>
25015 <infoflow type="both" weight="10"/>
25016 </interface>
25017 -<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="100166">
25018 +<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="100587">
25019 <summary>
25020 Do not audit attempts to send and receive
25021 UDP traffic on the zented port.
25022 @@ -72244,7 +72864,7 @@ Domain to not audit.
25023 </param>
25024 <infoflow type="none"/>
25025 </interface>
25026 -<interface name="corenet_tcp_bind_zented_port" lineno="100181">
25027 +<interface name="corenet_tcp_bind_zented_port" lineno="100602">
25028 <summary>
25029 Bind TCP sockets to the zented port.
25030 </summary>
25031 @@ -72255,7 +72875,7 @@ Domain allowed access.
25032 </param>
25033 <infoflow type="none"/>
25034 </interface>
25035 -<interface name="corenet_udp_bind_zented_port" lineno="100201">
25036 +<interface name="corenet_udp_bind_zented_port" lineno="100622">
25037 <summary>
25038 Bind UDP sockets to the zented port.
25039 </summary>
25040 @@ -72266,7 +72886,7 @@ Domain allowed access.
25041 </param>
25042 <infoflow type="none"/>
25043 </interface>
25044 -<interface name="corenet_tcp_connect_zented_port" lineno="100220">
25045 +<interface name="corenet_tcp_connect_zented_port" lineno="100641">
25046 <summary>
25047 Make a TCP connection to the zented port.
25048 </summary>
25049 @@ -72276,7 +72896,7 @@ Domain allowed access.
25050 </summary>
25051 </param>
25052 </interface>
25053 -<interface name="corenet_send_zented_client_packets" lineno="100240">
25054 +<interface name="corenet_send_zented_client_packets" lineno="100661">
25055 <summary>
25056 Send zented_client packets.
25057 </summary>
25058 @@ -72287,7 +72907,7 @@ Domain allowed access.
25059 </param>
25060 <infoflow type="write" weight="10"/>
25061 </interface>
25062 -<interface name="corenet_dontaudit_send_zented_client_packets" lineno="100259">
25063 +<interface name="corenet_dontaudit_send_zented_client_packets" lineno="100680">
25064 <summary>
25065 Do not audit attempts to send zented_client packets.
25066 </summary>
25067 @@ -72298,7 +72918,7 @@ Domain to not audit.
25068 </param>
25069 <infoflow type="none"/>
25070 </interface>
25071 -<interface name="corenet_receive_zented_client_packets" lineno="100278">
25072 +<interface name="corenet_receive_zented_client_packets" lineno="100699">
25073 <summary>
25074 Receive zented_client packets.
25075 </summary>
25076 @@ -72309,7 +72929,7 @@ Domain allowed access.
25077 </param>
25078 <infoflow type="read" weight="10"/>
25079 </interface>
25080 -<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="100297">
25081 +<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="100718">
25082 <summary>
25083 Do not audit attempts to receive zented_client packets.
25084 </summary>
25085 @@ -72320,7 +72940,7 @@ Domain allowed access.
25086 </param>
25087 <infoflow type="none"/>
25088 </interface>
25089 -<interface name="corenet_sendrecv_zented_client_packets" lineno="100316">
25090 +<interface name="corenet_sendrecv_zented_client_packets" lineno="100737">
25091 <summary>
25092 Send and receive zented_client packets.
25093 </summary>
25094 @@ -72331,7 +72951,7 @@ Domain allowed access.
25095 </param>
25096 <infoflow type="both" weight="10"/>
25097 </interface>
25098 -<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="100332">
25099 +<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="100753">
25100 <summary>
25101 Do not audit attempts to send and receive zented_client packets.
25102 </summary>
25103 @@ -72342,7 +72962,7 @@ Domain to not audit.
25104 </param>
25105 <infoflow type="none"/>
25106 </interface>
25107 -<interface name="corenet_relabelto_zented_client_packets" lineno="100347">
25108 +<interface name="corenet_relabelto_zented_client_packets" lineno="100768">
25109 <summary>
25110 Relabel packets to zented_client the packet type.
25111 </summary>
25112 @@ -72352,7 +72972,7 @@ Domain allowed access.
25113 </summary>
25114 </param>
25115 </interface>
25116 -<interface name="corenet_send_zented_server_packets" lineno="100367">
25117 +<interface name="corenet_send_zented_server_packets" lineno="100788">
25118 <summary>
25119 Send zented_server packets.
25120 </summary>
25121 @@ -72363,7 +72983,7 @@ Domain allowed access.
25122 </param>
25123 <infoflow type="write" weight="10"/>
25124 </interface>
25125 -<interface name="corenet_dontaudit_send_zented_server_packets" lineno="100386">
25126 +<interface name="corenet_dontaudit_send_zented_server_packets" lineno="100807">
25127 <summary>
25128 Do not audit attempts to send zented_server packets.
25129 </summary>
25130 @@ -72374,7 +72994,7 @@ Domain to not audit.
25131 </param>
25132 <infoflow type="none"/>
25133 </interface>
25134 -<interface name="corenet_receive_zented_server_packets" lineno="100405">
25135 +<interface name="corenet_receive_zented_server_packets" lineno="100826">
25136 <summary>
25137 Receive zented_server packets.
25138 </summary>
25139 @@ -72385,7 +73005,7 @@ Domain allowed access.
25140 </param>
25141 <infoflow type="read" weight="10"/>
25142 </interface>
25143 -<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="100424">
25144 +<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="100845">
25145 <summary>
25146 Do not audit attempts to receive zented_server packets.
25147 </summary>
25148 @@ -72396,7 +73016,7 @@ Domain allowed access.
25149 </param>
25150 <infoflow type="none"/>
25151 </interface>
25152 -<interface name="corenet_sendrecv_zented_server_packets" lineno="100443">
25153 +<interface name="corenet_sendrecv_zented_server_packets" lineno="100864">
25154 <summary>
25155 Send and receive zented_server packets.
25156 </summary>
25157 @@ -72407,7 +73027,7 @@ Domain allowed access.
25158 </param>
25159 <infoflow type="both" weight="10"/>
25160 </interface>
25161 -<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="100459">
25162 +<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="100880">
25163 <summary>
25164 Do not audit attempts to send and receive zented_server packets.
25165 </summary>
25166 @@ -72418,7 +73038,7 @@ Domain to not audit.
25167 </param>
25168 <infoflow type="none"/>
25169 </interface>
25170 -<interface name="corenet_relabelto_zented_server_packets" lineno="100474">
25171 +<interface name="corenet_relabelto_zented_server_packets" lineno="100895">
25172 <summary>
25173 Relabel packets to zented_server the packet type.
25174 </summary>
25175 @@ -72428,7 +73048,7 @@ Domain allowed access.
25176 </summary>
25177 </param>
25178 </interface>
25179 -<interface name="corenet_tcp_sendrecv_zope_port" lineno="100496">
25180 +<interface name="corenet_tcp_sendrecv_zope_port" lineno="100917">
25181 <summary>
25182 Send and receive TCP traffic on the zope port.
25183 </summary>
25184 @@ -72439,7 +73059,7 @@ Domain allowed access.
25185 </param>
25186 <infoflow type="both" weight="10"/>
25187 </interface>
25188 -<interface name="corenet_udp_send_zope_port" lineno="100511">
25189 +<interface name="corenet_udp_send_zope_port" lineno="100932">
25190 <summary>
25191 Send UDP traffic on the zope port.
25192 </summary>
25193 @@ -72450,7 +73070,7 @@ Domain allowed access.
25194 </param>
25195 <infoflow type="write" weight="10"/>
25196 </interface>
25197 -<interface name="corenet_dontaudit_udp_send_zope_port" lineno="100526">
25198 +<interface name="corenet_dontaudit_udp_send_zope_port" lineno="100947">
25199 <summary>
25200 Do not audit attempts to send UDP traffic on the zope port.
25201 </summary>
25202 @@ -72461,7 +73081,7 @@ Domain to not audit.
25203 </param>
25204 <infoflow type="none"/>
25205 </interface>
25206 -<interface name="corenet_udp_receive_zope_port" lineno="100541">
25207 +<interface name="corenet_udp_receive_zope_port" lineno="100962">
25208 <summary>
25209 Receive UDP traffic on the zope port.
25210 </summary>
25211 @@ -72472,7 +73092,7 @@ Domain allowed access.
25212 </param>
25213 <infoflow type="read" weight="10"/>
25214 </interface>
25215 -<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="100556">
25216 +<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="100977">
25217 <summary>
25218 Do not audit attempts to receive UDP traffic on the zope port.
25219 </summary>
25220 @@ -72483,7 +73103,7 @@ Domain to not audit.
25221 </param>
25222 <infoflow type="none"/>
25223 </interface>
25224 -<interface name="corenet_udp_sendrecv_zope_port" lineno="100571">
25225 +<interface name="corenet_udp_sendrecv_zope_port" lineno="100992">
25226 <summary>
25227 Send and receive UDP traffic on the zope port.
25228 </summary>
25229 @@ -72494,7 +73114,7 @@ Domain allowed access.
25230 </param>
25231 <infoflow type="both" weight="10"/>
25232 </interface>
25233 -<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="100587">
25234 +<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="101008">
25235 <summary>
25236 Do not audit attempts to send and receive
25237 UDP traffic on the zope port.
25238 @@ -72506,7 +73126,7 @@ Domain to not audit.
25239 </param>
25240 <infoflow type="none"/>
25241 </interface>
25242 -<interface name="corenet_tcp_bind_zope_port" lineno="100602">
25243 +<interface name="corenet_tcp_bind_zope_port" lineno="101023">
25244 <summary>
25245 Bind TCP sockets to the zope port.
25246 </summary>
25247 @@ -72517,7 +73137,7 @@ Domain allowed access.
25248 </param>
25249 <infoflow type="none"/>
25250 </interface>
25251 -<interface name="corenet_udp_bind_zope_port" lineno="100622">
25252 +<interface name="corenet_udp_bind_zope_port" lineno="101043">
25253 <summary>
25254 Bind UDP sockets to the zope port.
25255 </summary>
25256 @@ -72528,7 +73148,7 @@ Domain allowed access.
25257 </param>
25258 <infoflow type="none"/>
25259 </interface>
25260 -<interface name="corenet_tcp_connect_zope_port" lineno="100641">
25261 +<interface name="corenet_tcp_connect_zope_port" lineno="101062">
25262 <summary>
25263 Make a TCP connection to the zope port.
25264 </summary>
25265 @@ -72538,7 +73158,7 @@ Domain allowed access.
25266 </summary>
25267 </param>
25268 </interface>
25269 -<interface name="corenet_send_zope_client_packets" lineno="100661">
25270 +<interface name="corenet_send_zope_client_packets" lineno="101082">
25271 <summary>
25272 Send zope_client packets.
25273 </summary>
25274 @@ -72549,7 +73169,7 @@ Domain allowed access.
25275 </param>
25276 <infoflow type="write" weight="10"/>
25277 </interface>
25278 -<interface name="corenet_dontaudit_send_zope_client_packets" lineno="100680">
25279 +<interface name="corenet_dontaudit_send_zope_client_packets" lineno="101101">
25280 <summary>
25281 Do not audit attempts to send zope_client packets.
25282 </summary>
25283 @@ -72560,7 +73180,7 @@ Domain to not audit.
25284 </param>
25285 <infoflow type="none"/>
25286 </interface>
25287 -<interface name="corenet_receive_zope_client_packets" lineno="100699">
25288 +<interface name="corenet_receive_zope_client_packets" lineno="101120">
25289 <summary>
25290 Receive zope_client packets.
25291 </summary>
25292 @@ -72571,7 +73191,7 @@ Domain allowed access.
25293 </param>
25294 <infoflow type="read" weight="10"/>
25295 </interface>
25296 -<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="100718">
25297 +<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="101139">
25298 <summary>
25299 Do not audit attempts to receive zope_client packets.
25300 </summary>
25301 @@ -72582,7 +73202,7 @@ Domain allowed access.
25302 </param>
25303 <infoflow type="none"/>
25304 </interface>
25305 -<interface name="corenet_sendrecv_zope_client_packets" lineno="100737">
25306 +<interface name="corenet_sendrecv_zope_client_packets" lineno="101158">
25307 <summary>
25308 Send and receive zope_client packets.
25309 </summary>
25310 @@ -72593,7 +73213,7 @@ Domain allowed access.
25311 </param>
25312 <infoflow type="both" weight="10"/>
25313 </interface>
25314 -<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="100753">
25315 +<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="101174">
25316 <summary>
25317 Do not audit attempts to send and receive zope_client packets.
25318 </summary>
25319 @@ -72604,7 +73224,7 @@ Domain to not audit.
25320 </param>
25321 <infoflow type="none"/>
25322 </interface>
25323 -<interface name="corenet_relabelto_zope_client_packets" lineno="100768">
25324 +<interface name="corenet_relabelto_zope_client_packets" lineno="101189">
25325 <summary>
25326 Relabel packets to zope_client the packet type.
25327 </summary>
25328 @@ -72614,7 +73234,7 @@ Domain allowed access.
25329 </summary>
25330 </param>
25331 </interface>
25332 -<interface name="corenet_send_zope_server_packets" lineno="100788">
25333 +<interface name="corenet_send_zope_server_packets" lineno="101209">
25334 <summary>
25335 Send zope_server packets.
25336 </summary>
25337 @@ -72625,7 +73245,7 @@ Domain allowed access.
25338 </param>
25339 <infoflow type="write" weight="10"/>
25340 </interface>
25341 -<interface name="corenet_dontaudit_send_zope_server_packets" lineno="100807">
25342 +<interface name="corenet_dontaudit_send_zope_server_packets" lineno="101228">
25343 <summary>
25344 Do not audit attempts to send zope_server packets.
25345 </summary>
25346 @@ -72636,7 +73256,7 @@ Domain to not audit.
25347 </param>
25348 <infoflow type="none"/>
25349 </interface>
25350 -<interface name="corenet_receive_zope_server_packets" lineno="100826">
25351 +<interface name="corenet_receive_zope_server_packets" lineno="101247">
25352 <summary>
25353 Receive zope_server packets.
25354 </summary>
25355 @@ -72647,7 +73267,7 @@ Domain allowed access.
25356 </param>
25357 <infoflow type="read" weight="10"/>
25358 </interface>
25359 -<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="100845">
25360 +<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="101266">
25361 <summary>
25362 Do not audit attempts to receive zope_server packets.
25363 </summary>
25364 @@ -72658,7 +73278,7 @@ Domain allowed access.
25365 </param>
25366 <infoflow type="none"/>
25367 </interface>
25368 -<interface name="corenet_sendrecv_zope_server_packets" lineno="100864">
25369 +<interface name="corenet_sendrecv_zope_server_packets" lineno="101285">
25370 <summary>
25371 Send and receive zope_server packets.
25372 </summary>
25373 @@ -72669,7 +73289,7 @@ Domain allowed access.
25374 </param>
25375 <infoflow type="both" weight="10"/>
25376 </interface>
25377 -<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="100880">
25378 +<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="101301">
25379 <summary>
25380 Do not audit attempts to send and receive zope_server packets.
25381 </summary>
25382 @@ -72680,7 +73300,7 @@ Domain to not audit.
25383 </param>
25384 <infoflow type="none"/>
25385 </interface>
25386 -<interface name="corenet_relabelto_zope_server_packets" lineno="100895">
25387 +<interface name="corenet_relabelto_zope_server_packets" lineno="101316">
25388 <summary>
25389 Relabel packets to zope_server the packet type.
25390 </summary>
25391 @@ -72690,7 +73310,7 @@ Domain allowed access.
25392 </summary>
25393 </param>
25394 </interface>
25395 -<interface name="corenet_tcp_sendrecv_lo_if" lineno="100918">
25396 +<interface name="corenet_tcp_sendrecv_lo_if" lineno="101339">
25397 <summary>
25398 Send and receive TCP network traffic on the lo interface.
25399 </summary>
25400 @@ -72701,7 +73321,7 @@ Domain allowed access.
25401 </param>
25402 <infoflow type="both" weight="10"/>
25403 </interface>
25404 -<interface name="corenet_udp_send_lo_if" lineno="100937">
25405 +<interface name="corenet_udp_send_lo_if" lineno="101358">
25406 <summary>
25407 Send UDP network traffic on the lo interface.
25408 </summary>
25409 @@ -72712,7 +73332,7 @@ Domain allowed access.
25410 </param>
25411 <infoflow type="write" weight="10"/>
25412 </interface>
25413 -<interface name="corenet_udp_receive_lo_if" lineno="100956">
25414 +<interface name="corenet_udp_receive_lo_if" lineno="101377">
25415 <summary>
25416 Receive UDP network traffic on the lo interface.
25417 </summary>
25418 @@ -72723,7 +73343,7 @@ Domain allowed access.
25419 </param>
25420 <infoflow type="read" weight="10"/>
25421 </interface>
25422 -<interface name="corenet_udp_sendrecv_lo_if" lineno="100975">
25423 +<interface name="corenet_udp_sendrecv_lo_if" lineno="101396">
25424 <summary>
25425 Send and receive UDP network traffic on the lo interface.
25426 </summary>
25427 @@ -72734,7 +73354,7 @@ Domain allowed access.
25428 </param>
25429 <infoflow type="both" weight="10"/>
25430 </interface>
25431 -<interface name="corenet_raw_send_lo_if" lineno="100991">
25432 +<interface name="corenet_raw_send_lo_if" lineno="101412">
25433 <summary>
25434 Send raw IP packets on the lo interface.
25435 </summary>
25436 @@ -72745,7 +73365,7 @@ Domain allowed access.
25437 </param>
25438 <infoflow type="write" weight="10"/>
25439 </interface>
25440 -<interface name="corenet_raw_receive_lo_if" lineno="101010">
25441 +<interface name="corenet_raw_receive_lo_if" lineno="101431">
25442 <summary>
25443 Receive raw IP packets on the lo interface.
25444 </summary>
25445 @@ -72756,7 +73376,7 @@ Domain allowed access.
25446 </param>
25447 <infoflow type="read" weight="10"/>
25448 </interface>
25449 -<interface name="corenet_raw_sendrecv_lo_if" lineno="101029">
25450 +<interface name="corenet_raw_sendrecv_lo_if" lineno="101450">
25451 <summary>
25452 Send and receive raw IP packets on the lo interface.
25453 </summary>
25454 @@ -72853,7 +73473,17 @@ Domain allowed access.
25455 </summary>
25456 </param>
25457 </interface>
25458 -<interface name="dev_watch_dev_dirs" lineno="121">
25459 +<interface name="dev_remount_fs" lineno="121">
25460 +<summary>
25461 +Remount device filesystems.
25462 +</summary>
25463 +<param name="domain">
25464 +<summary>
25465 +Domain allowed access.
25466 +</summary>
25467 +</param>
25468 +</interface>
25469 +<interface name="dev_watch_dev_dirs" lineno="139">
25470 <summary>
25471 Watch the directories in /dev.
25472 </summary>
25473 @@ -72863,7 +73493,7 @@ Domain allowed access.
25474 </summary>
25475 </param>
25476 </interface>
25477 -<interface name="dev_mounton" lineno="139">
25478 +<interface name="dev_mounton" lineno="157">
25479 <summary>
25480 Mount a filesystem on /dev
25481 </summary>
25482 @@ -72873,7 +73503,7 @@ Domain allow access.
25483 </summary>
25484 </param>
25485 </interface>
25486 -<interface name="dev_relabel_all_dev_nodes" lineno="158">
25487 +<interface name="dev_relabel_all_dev_nodes" lineno="176">
25488 <summary>
25489 Allow full relabeling (to and from) of all device nodes.
25490 </summary>
25491 @@ -72884,7 +73514,7 @@ Domain allowed access.
25492 </param>
25493 <rolecap/>
25494 </interface>
25495 -<interface name="dev_relabel_all_dev_files" lineno="184">
25496 +<interface name="dev_relabel_all_dev_files" lineno="202">
25497 <summary>
25498 Allow full relabeling (to and from) of all device files.
25499 </summary>
25500 @@ -72895,7 +73525,7 @@ Domain allowed access.
25501 </param>
25502 <rolecap/>
25503 </interface>
25504 -<interface name="dev_list_all_dev_nodes" lineno="202">
25505 +<interface name="dev_list_all_dev_nodes" lineno="220">
25506 <summary>
25507 List all of the device nodes in a device directory.
25508 </summary>
25509 @@ -72905,7 +73535,7 @@ Domain allowed access.
25510 </summary>
25511 </param>
25512 </interface>
25513 -<interface name="dev_setattr_generic_dirs" lineno="221">
25514 +<interface name="dev_setattr_generic_dirs" lineno="239">
25515 <summary>
25516 Set the attributes of /dev directories.
25517 </summary>
25518 @@ -72915,7 +73545,7 @@ Domain allowed access.
25519 </summary>
25520 </param>
25521 </interface>
25522 -<interface name="dev_dontaudit_list_all_dev_nodes" lineno="239">
25523 +<interface name="dev_dontaudit_list_all_dev_nodes" lineno="257">
25524 <summary>
25525 Dontaudit attempts to list all device nodes.
25526 </summary>
25527 @@ -72925,7 +73555,7 @@ Domain to not audit.
25528 </summary>
25529 </param>
25530 </interface>
25531 -<interface name="dev_add_entry_generic_dirs" lineno="257">
25532 +<interface name="dev_add_entry_generic_dirs" lineno="275">
25533 <summary>
25534 Add entries to directories in /dev.
25535 </summary>
25536 @@ -72935,7 +73565,7 @@ Domain allowed access.
25537 </summary>
25538 </param>
25539 </interface>
25540 -<interface name="dev_remove_entry_generic_dirs" lineno="275">
25541 +<interface name="dev_remove_entry_generic_dirs" lineno="293">
25542 <summary>
25543 Remove entries from directories in /dev.
25544 </summary>
25545 @@ -72945,7 +73575,7 @@ Domain allowed access.
25546 </summary>
25547 </param>
25548 </interface>
25549 -<interface name="dev_create_generic_dirs" lineno="293">
25550 +<interface name="dev_create_generic_dirs" lineno="311">
25551 <summary>
25552 Create a directory in the device directory.
25553 </summary>
25554 @@ -72955,7 +73585,7 @@ Domain allowed access.
25555 </summary>
25556 </param>
25557 </interface>
25558 -<interface name="dev_delete_generic_dirs" lineno="312">
25559 +<interface name="dev_delete_generic_dirs" lineno="330">
25560 <summary>
25561 Delete a directory in the device directory.
25562 </summary>
25563 @@ -72965,7 +73595,7 @@ Domain allowed access.
25564 </summary>
25565 </param>
25566 </interface>
25567 -<interface name="dev_manage_generic_dirs" lineno="330">
25568 +<interface name="dev_manage_generic_dirs" lineno="348">
25569 <summary>
25570 Manage of directories in /dev.
25571 </summary>
25572 @@ -72975,7 +73605,7 @@ Domain allowed access.
25573 </summary>
25574 </param>
25575 </interface>
25576 -<interface name="dev_relabel_generic_dev_dirs" lineno="348">
25577 +<interface name="dev_relabel_generic_dev_dirs" lineno="366">
25578 <summary>
25579 Allow full relabeling (to and from) of directories in /dev.
25580 </summary>
25581 @@ -72985,7 +73615,7 @@ Domain allowed access.
25582 </summary>
25583 </param>
25584 </interface>
25585 -<interface name="dev_dontaudit_getattr_generic_files" lineno="366">
25586 +<interface name="dev_dontaudit_getattr_generic_files" lineno="384">
25587 <summary>
25588 dontaudit getattr generic files in /dev.
25589 </summary>
25590 @@ -72995,7 +73625,7 @@ Domain to not audit.
25591 </summary>
25592 </param>
25593 </interface>
25594 -<interface name="dev_read_generic_files" lineno="384">
25595 +<interface name="dev_read_generic_files" lineno="402">
25596 <summary>
25597 Read generic files in /dev.
25598 </summary>
25599 @@ -73005,7 +73635,7 @@ Domain to not audit.
25600 </summary>
25601 </param>
25602 </interface>
25603 -<interface name="dev_rw_generic_files" lineno="402">
25604 +<interface name="dev_rw_generic_files" lineno="420">
25605 <summary>
25606 Read and write generic files in /dev.
25607 </summary>
25608 @@ -73015,7 +73645,7 @@ Domain allowed access.
25609 </summary>
25610 </param>
25611 </interface>
25612 -<interface name="dev_delete_generic_files" lineno="420">
25613 +<interface name="dev_delete_generic_files" lineno="438">
25614 <summary>
25615 Delete generic files in /dev.
25616 </summary>
25617 @@ -73025,7 +73655,7 @@ Domain allowed access.
25618 </summary>
25619 </param>
25620 </interface>
25621 -<interface name="dev_manage_generic_files" lineno="438">
25622 +<interface name="dev_manage_generic_files" lineno="456">
25623 <summary>
25624 Create a file in the device directory.
25625 </summary>
25626 @@ -73035,7 +73665,7 @@ Domain allowed access.
25627 </summary>
25628 </param>
25629 </interface>
25630 -<interface name="dev_dontaudit_getattr_generic_pipes" lineno="456">
25631 +<interface name="dev_dontaudit_getattr_generic_pipes" lineno="474">
25632 <summary>
25633 Dontaudit getattr on generic pipes.
25634 </summary>
25635 @@ -73045,7 +73675,7 @@ Domain to not audit.
25636 </summary>
25637 </param>
25638 </interface>
25639 -<interface name="dev_write_generic_sockets" lineno="474">
25640 +<interface name="dev_write_generic_sockets" lineno="492">
25641 <summary>
25642 Write generic socket files in /dev.
25643 </summary>
25644 @@ -73055,7 +73685,7 @@ Domain to not audit.
25645 </summary>
25646 </param>
25647 </interface>
25648 -<interface name="dev_getattr_generic_blk_files" lineno="492">
25649 +<interface name="dev_getattr_generic_blk_files" lineno="510">
25650 <summary>
25651 Allow getattr on generic block devices.
25652 </summary>
25653 @@ -73065,7 +73695,7 @@ Domain allowed access.
25654 </summary>
25655 </param>
25656 </interface>
25657 -<interface name="dev_dontaudit_getattr_generic_blk_files" lineno="510">
25658 +<interface name="dev_dontaudit_getattr_generic_blk_files" lineno="528">
25659 <summary>
25660 Dontaudit getattr on generic block devices.
25661 </summary>
25662 @@ -73075,7 +73705,7 @@ Domain to not audit.
25663 </summary>
25664 </param>
25665 </interface>
25666 -<interface name="dev_setattr_generic_blk_files" lineno="529">
25667 +<interface name="dev_setattr_generic_blk_files" lineno="547">
25668 <summary>
25669 Set the attributes on generic
25670 block devices.
25671 @@ -73086,7 +73716,7 @@ Domain allowed access.
25672 </summary>
25673 </param>
25674 </interface>
25675 -<interface name="dev_dontaudit_setattr_generic_blk_files" lineno="547">
25676 +<interface name="dev_dontaudit_setattr_generic_blk_files" lineno="565">
25677 <summary>
25678 Dontaudit setattr on generic block devices.
25679 </summary>
25680 @@ -73096,7 +73726,7 @@ Domain to not audit.
25681 </summary>
25682 </param>
25683 </interface>
25684 -<interface name="dev_create_generic_blk_files" lineno="565">
25685 +<interface name="dev_create_generic_blk_files" lineno="583">
25686 <summary>
25687 Create generic block device files.
25688 </summary>
25689 @@ -73106,7 +73736,7 @@ Domain allowed access.
25690 </summary>
25691 </param>
25692 </interface>
25693 -<interface name="dev_delete_generic_blk_files" lineno="583">
25694 +<interface name="dev_delete_generic_blk_files" lineno="601">
25695 <summary>
25696 Delete generic block device files.
25697 </summary>
25698 @@ -73116,7 +73746,7 @@ Domain allowed access.
25699 </summary>
25700 </param>
25701 </interface>
25702 -<interface name="dev_getattr_generic_chr_files" lineno="601">
25703 +<interface name="dev_getattr_generic_chr_files" lineno="619">
25704 <summary>
25705 Allow getattr for generic character device files.
25706 </summary>
25707 @@ -73126,7 +73756,7 @@ Domain allowed access.
25708 </summary>
25709 </param>
25710 </interface>
25711 -<interface name="dev_dontaudit_getattr_generic_chr_files" lineno="619">
25712 +<interface name="dev_dontaudit_getattr_generic_chr_files" lineno="637">
25713 <summary>
25714 Dontaudit getattr for generic character device files.
25715 </summary>
25716 @@ -73136,7 +73766,7 @@ Domain to not audit.
25717 </summary>
25718 </param>
25719 </interface>
25720 -<interface name="dev_setattr_generic_chr_files" lineno="638">
25721 +<interface name="dev_setattr_generic_chr_files" lineno="656">
25722 <summary>
25723 Set the attributes for generic
25724 character device files.
25725 @@ -73147,7 +73777,7 @@ Domain allowed access.
25726 </summary>
25727 </param>
25728 </interface>
25729 -<interface name="dev_dontaudit_setattr_generic_chr_files" lineno="656">
25730 +<interface name="dev_dontaudit_setattr_generic_chr_files" lineno="674">
25731 <summary>
25732 Dontaudit setattr for generic character device files.
25733 </summary>
25734 @@ -73157,7 +73787,7 @@ Domain to not audit.
25735 </summary>
25736 </param>
25737 </interface>
25738 -<interface name="dev_read_generic_chr_files" lineno="674">
25739 +<interface name="dev_read_generic_chr_files" lineno="692">
25740 <summary>
25741 Read generic character device files.
25742 </summary>
25743 @@ -73167,7 +73797,7 @@ Domain allowed access.
25744 </summary>
25745 </param>
25746 </interface>
25747 -<interface name="dev_rw_generic_chr_files" lineno="692">
25748 +<interface name="dev_rw_generic_chr_files" lineno="710">
25749 <summary>
25750 Read and write generic character device files.
25751 </summary>
25752 @@ -73177,7 +73807,7 @@ Domain allowed access.
25753 </summary>
25754 </param>
25755 </interface>
25756 -<interface name="dev_rw_generic_blk_files" lineno="710">
25757 +<interface name="dev_rw_generic_blk_files" lineno="728">
25758 <summary>
25759 Read and write generic block device files.
25760 </summary>
25761 @@ -73187,7 +73817,7 @@ Domain allowed access.
25762 </summary>
25763 </param>
25764 </interface>
25765 -<interface name="dev_dontaudit_rw_generic_chr_files" lineno="728">
25766 +<interface name="dev_dontaudit_rw_generic_chr_files" lineno="746">
25767 <summary>
25768 Dontaudit attempts to read/write generic character device files.
25769 </summary>
25770 @@ -73197,7 +73827,7 @@ Domain to dontaudit access.
25771 </summary>
25772 </param>
25773 </interface>
25774 -<interface name="dev_create_generic_chr_files" lineno="746">
25775 +<interface name="dev_create_generic_chr_files" lineno="764">
25776 <summary>
25777 Create generic character device files.
25778 </summary>
25779 @@ -73207,7 +73837,7 @@ Domain allowed access.
25780 </summary>
25781 </param>
25782 </interface>
25783 -<interface name="dev_delete_generic_chr_files" lineno="764">
25784 +<interface name="dev_delete_generic_chr_files" lineno="782">
25785 <summary>
25786 Delete generic character device files.
25787 </summary>
25788 @@ -73217,7 +73847,7 @@ Domain allowed access.
25789 </summary>
25790 </param>
25791 </interface>
25792 -<interface name="dev_relabelfrom_generic_chr_files" lineno="782">
25793 +<interface name="dev_relabelfrom_generic_chr_files" lineno="800">
25794 <summary>
25795 Relabel from generic character device files.
25796 </summary>
25797 @@ -73227,7 +73857,7 @@ Domain allowed access.
25798 </summary>
25799 </param>
25800 </interface>
25801 -<interface name="dev_dontaudit_setattr_generic_symlinks" lineno="801">
25802 +<interface name="dev_dontaudit_setattr_generic_symlinks" lineno="819">
25803 <summary>
25804 Do not audit attempts to set the attributes
25805 of symbolic links in device directories (/dev).
25806 @@ -73238,7 +73868,7 @@ Domain to not audit.
25807 </summary>
25808 </param>
25809 </interface>
25810 -<interface name="dev_read_generic_symlinks" lineno="819">
25811 +<interface name="dev_read_generic_symlinks" lineno="837">
25812 <summary>
25813 Read symbolic links in device directories.
25814 </summary>
25815 @@ -73248,7 +73878,7 @@ Domain allowed access.
25816 </summary>
25817 </param>
25818 </interface>
25819 -<interface name="dev_create_generic_symlinks" lineno="837">
25820 +<interface name="dev_create_generic_symlinks" lineno="855">
25821 <summary>
25822 Create symbolic links in device directories.
25823 </summary>
25824 @@ -73258,7 +73888,7 @@ Domain allowed access.
25825 </summary>
25826 </param>
25827 </interface>
25828 -<interface name="dev_delete_generic_symlinks" lineno="855">
25829 +<interface name="dev_delete_generic_symlinks" lineno="873">
25830 <summary>
25831 Delete symbolic links in device directories.
25832 </summary>
25833 @@ -73268,7 +73898,7 @@ Domain allowed access.
25834 </summary>
25835 </param>
25836 </interface>
25837 -<interface name="dev_manage_generic_symlinks" lineno="873">
25838 +<interface name="dev_manage_generic_symlinks" lineno="891">
25839 <summary>
25840 Create, delete, read, and write symbolic links in device directories.
25841 </summary>
25842 @@ -73278,7 +73908,7 @@ Domain allowed access.
25843 </summary>
25844 </param>
25845 </interface>
25846 -<interface name="dev_relabel_generic_symlinks" lineno="891">
25847 +<interface name="dev_relabel_generic_symlinks" lineno="909">
25848 <summary>
25849 Relabel symbolic links in device directories.
25850 </summary>
25851 @@ -73288,7 +73918,7 @@ Domain allowed access.
25852 </summary>
25853 </param>
25854 </interface>
25855 -<interface name="dev_write_generic_sock_files" lineno="909">
25856 +<interface name="dev_write_generic_sock_files" lineno="927">
25857 <summary>
25858 Write generic sock files in /dev.
25859 </summary>
25860 @@ -73298,7 +73928,7 @@ Domain allowed access.
25861 </summary>
25862 </param>
25863 </interface>
25864 -<interface name="dev_manage_all_dev_nodes" lineno="927">
25865 +<interface name="dev_manage_all_dev_nodes" lineno="945">
25866 <summary>
25867 Create, delete, read, and write device nodes in device directories.
25868 </summary>
25869 @@ -73308,7 +73938,7 @@ Domain allowed access.
25870 </summary>
25871 </param>
25872 </interface>
25873 -<interface name="dev_dontaudit_rw_generic_dev_nodes" lineno="968">
25874 +<interface name="dev_dontaudit_rw_generic_dev_nodes" lineno="986">
25875 <summary>
25876 Dontaudit getattr for generic device files.
25877 </summary>
25878 @@ -73318,7 +73948,7 @@ Domain to not audit.
25879 </summary>
25880 </param>
25881 </interface>
25882 -<interface name="dev_manage_generic_blk_files" lineno="986">
25883 +<interface name="dev_manage_generic_blk_files" lineno="1004">
25884 <summary>
25885 Create, delete, read, and write block device files.
25886 </summary>
25887 @@ -73328,7 +73958,7 @@ Domain allowed access.
25888 </summary>
25889 </param>
25890 </interface>
25891 -<interface name="dev_manage_generic_chr_files" lineno="1004">
25892 +<interface name="dev_manage_generic_chr_files" lineno="1022">
25893 <summary>
25894 Create, delete, read, and write character device files.
25895 </summary>
25896 @@ -73338,7 +73968,7 @@ Domain allowed access.
25897 </summary>
25898 </param>
25899 </interface>
25900 -<interface name="dev_filetrans" lineno="1039">
25901 +<interface name="dev_filetrans" lineno="1057">
25902 <summary>
25903 Create, read, and write device nodes. The node
25904 will be transitioned to the type provided.
25905 @@ -73365,7 +73995,7 @@ The name of the object being created.
25906 </summary>
25907 </param>
25908 </interface>
25909 -<interface name="dev_tmpfs_filetrans_dev" lineno="1074">
25910 +<interface name="dev_tmpfs_filetrans_dev" lineno="1092">
25911 <summary>
25912 Create, read, and write device nodes. The node
25913 will be transitioned to the type provided. This is
25914 @@ -73389,7 +74019,7 @@ The name of the object being created.
25915 </summary>
25916 </param>
25917 </interface>
25918 -<interface name="dev_getattr_all_blk_files" lineno="1093">
25919 +<interface name="dev_getattr_all_blk_files" lineno="1111">
25920 <summary>
25921 Getattr on all block file device nodes.
25922 </summary>
25923 @@ -73400,7 +74030,7 @@ Domain allowed access.
25924 </param>
25925 <rolecap/>
25926 </interface>
25927 -<interface name="dev_dontaudit_getattr_all_blk_files" lineno="1112">
25928 +<interface name="dev_dontaudit_getattr_all_blk_files" lineno="1130">
25929 <summary>
25930 Dontaudit getattr on all block file device nodes.
25931 </summary>
25932 @@ -73410,7 +74040,7 @@ Domain to not audit.
25933 </summary>
25934 </param>
25935 </interface>
25936 -<interface name="dev_getattr_all_chr_files" lineno="1132">
25937 +<interface name="dev_getattr_all_chr_files" lineno="1150">
25938 <summary>
25939 Getattr on all character file device nodes.
25940 </summary>
25941 @@ -73421,7 +74051,7 @@ Domain allowed access.
25942 </param>
25943 <rolecap/>
25944 </interface>
25945 -<interface name="dev_dontaudit_getattr_all_chr_files" lineno="1151">
25946 +<interface name="dev_dontaudit_getattr_all_chr_files" lineno="1169">
25947 <summary>
25948 Dontaudit getattr on all character file device nodes.
25949 </summary>
25950 @@ -73431,7 +74061,7 @@ Domain to not audit.
25951 </summary>
25952 </param>
25953 </interface>
25954 -<interface name="dev_setattr_all_blk_files" lineno="1171">
25955 +<interface name="dev_setattr_all_blk_files" lineno="1189">
25956 <summary>
25957 Setattr on all block file device nodes.
25958 </summary>
25959 @@ -73442,7 +74072,7 @@ Domain allowed access.
25960 </param>
25961 <rolecap/>
25962 </interface>
25963 -<interface name="dev_setattr_all_chr_files" lineno="1191">
25964 +<interface name="dev_setattr_all_chr_files" lineno="1209">
25965 <summary>
25966 Setattr on all character file device nodes.
25967 </summary>
25968 @@ -73453,7 +74083,7 @@ Domain allowed access.
25969 </param>
25970 <rolecap/>
25971 </interface>
25972 -<interface name="dev_dontaudit_read_all_blk_files" lineno="1210">
25973 +<interface name="dev_dontaudit_read_all_blk_files" lineno="1228">
25974 <summary>
25975 Dontaudit read on all block file device nodes.
25976 </summary>
25977 @@ -73463,7 +74093,7 @@ Domain to not audit.
25978 </summary>
25979 </param>
25980 </interface>
25981 -<interface name="dev_dontaudit_write_all_blk_files" lineno="1228">
25982 +<interface name="dev_dontaudit_write_all_blk_files" lineno="1246">
25983 <summary>
25984 Dontaudit write on all block file device nodes.
25985 </summary>
25986 @@ -73473,7 +74103,7 @@ Domain to not audit.
25987 </summary>
25988 </param>
25989 </interface>
25990 -<interface name="dev_dontaudit_read_all_chr_files" lineno="1246">
25991 +<interface name="dev_dontaudit_read_all_chr_files" lineno="1264">
25992 <summary>
25993 Dontaudit read on all character file device nodes.
25994 </summary>
25995 @@ -73483,7 +74113,7 @@ Domain to not audit.
25996 </summary>
25997 </param>
25998 </interface>
25999 -<interface name="dev_dontaudit_write_all_chr_files" lineno="1264">
26000 +<interface name="dev_dontaudit_write_all_chr_files" lineno="1282">
26001 <summary>
26002 Dontaudit write on all character file device nodes.
26003 </summary>
26004 @@ -73493,7 +74123,7 @@ Domain to not audit.
26005 </summary>
26006 </param>
26007 </interface>
26008 -<interface name="dev_create_all_blk_files" lineno="1282">
26009 +<interface name="dev_create_all_blk_files" lineno="1300">
26010 <summary>
26011 Create all block device files.
26012 </summary>
26013 @@ -73503,7 +74133,7 @@ Domain allowed access.
26014 </summary>
26015 </param>
26016 </interface>
26017 -<interface name="dev_create_all_chr_files" lineno="1301">
26018 +<interface name="dev_create_all_chr_files" lineno="1319">
26019 <summary>
26020 Create all character device files.
26021 </summary>
26022 @@ -73513,7 +74143,7 @@ Domain allowed access.
26023 </summary>
26024 </param>
26025 </interface>
26026 -<interface name="dev_delete_all_blk_files" lineno="1320">
26027 +<interface name="dev_delete_all_blk_files" lineno="1338">
26028 <summary>
26029 Delete all block device files.
26030 </summary>
26031 @@ -73523,7 +74153,7 @@ Domain allowed access.
26032 </summary>
26033 </param>
26034 </interface>
26035 -<interface name="dev_delete_all_chr_files" lineno="1339">
26036 +<interface name="dev_delete_all_chr_files" lineno="1357">
26037 <summary>
26038 Delete all character device files.
26039 </summary>
26040 @@ -73533,7 +74163,7 @@ Domain allowed access.
26041 </summary>
26042 </param>
26043 </interface>
26044 -<interface name="dev_rename_all_blk_files" lineno="1358">
26045 +<interface name="dev_rename_all_blk_files" lineno="1376">
26046 <summary>
26047 Rename all block device files.
26048 </summary>
26049 @@ -73543,7 +74173,7 @@ Domain allowed access.
26050 </summary>
26051 </param>
26052 </interface>
26053 -<interface name="dev_rename_all_chr_files" lineno="1377">
26054 +<interface name="dev_rename_all_chr_files" lineno="1395">
26055 <summary>
26056 Rename all character device files.
26057 </summary>
26058 @@ -73553,7 +74183,7 @@ Domain allowed access.
26059 </summary>
26060 </param>
26061 </interface>
26062 -<interface name="dev_manage_all_blk_files" lineno="1396">
26063 +<interface name="dev_manage_all_blk_files" lineno="1414">
26064 <summary>
26065 Read, write, create, and delete all block device files.
26066 </summary>
26067 @@ -73563,7 +74193,7 @@ Domain allowed access.
26068 </summary>
26069 </param>
26070 </interface>
26071 -<interface name="dev_manage_all_chr_files" lineno="1421">
26072 +<interface name="dev_manage_all_chr_files" lineno="1439">
26073 <summary>
26074 Read, write, create, and delete all character device files.
26075 </summary>
26076 @@ -73573,7 +74203,7 @@ Domain allowed access.
26077 </summary>
26078 </param>
26079 </interface>
26080 -<interface name="dev_getattr_acpi_bios_dev" lineno="1442">
26081 +<interface name="dev_getattr_acpi_bios_dev" lineno="1460">
26082 <summary>
26083 Get the attributes of the apm bios device node.
26084 </summary>
26085 @@ -73583,7 +74213,7 @@ Domain allowed access.
26086 </summary>
26087 </param>
26088 </interface>
26089 -<interface name="dev_dontaudit_getattr_acpi_bios_dev" lineno="1461">
26090 +<interface name="dev_dontaudit_getattr_acpi_bios_dev" lineno="1479">
26091 <summary>
26092 Do not audit attempts to get the attributes of
26093 the apm bios device node.
26094 @@ -73594,7 +74224,7 @@ Domain to not audit.
26095 </summary>
26096 </param>
26097 </interface>
26098 -<interface name="dev_setattr_acpi_bios_dev" lineno="1479">
26099 +<interface name="dev_setattr_acpi_bios_dev" lineno="1497">
26100 <summary>
26101 Set the attributes of the apm bios device node.
26102 </summary>
26103 @@ -73604,7 +74234,7 @@ Domain allowed access.
26104 </summary>
26105 </param>
26106 </interface>
26107 -<interface name="dev_dontaudit_setattr_acpi_bios_dev" lineno="1498">
26108 +<interface name="dev_dontaudit_setattr_acpi_bios_dev" lineno="1516">
26109 <summary>
26110 Do not audit attempts to set the attributes of
26111 the apm bios device node.
26112 @@ -73615,7 +74245,7 @@ Domain to not audit.
26113 </summary>
26114 </param>
26115 </interface>
26116 -<interface name="dev_rw_acpi_bios" lineno="1516">
26117 +<interface name="dev_rw_acpi_bios" lineno="1534">
26118 <summary>
26119 Read and write the apm bios.
26120 </summary>
26121 @@ -73625,7 +74255,7 @@ Domain allowed access.
26122 </summary>
26123 </param>
26124 </interface>
26125 -<interface name="dev_getattr_agp_dev" lineno="1534">
26126 +<interface name="dev_getattr_agp_dev" lineno="1552">
26127 <summary>
26128 Getattr the agp devices.
26129 </summary>
26130 @@ -73635,7 +74265,7 @@ Domain allowed access.
26131 </summary>
26132 </param>
26133 </interface>
26134 -<interface name="dev_rw_agp" lineno="1552">
26135 +<interface name="dev_rw_agp" lineno="1570">
26136 <summary>
26137 Read and write the agp devices.
26138 </summary>
26139 @@ -73645,7 +74275,7 @@ Domain allowed access.
26140 </summary>
26141 </param>
26142 </interface>
26143 -<interface name="dev_getattr_autofs_dev" lineno="1571">
26144 +<interface name="dev_getattr_autofs_dev" lineno="1589">
26145 <summary>
26146 Get the attributes of the autofs device node.
26147 </summary>
26148 @@ -73655,7 +74285,7 @@ Domain allowed access.
26149 </summary>
26150 </param>
26151 </interface>
26152 -<interface name="dev_dontaudit_getattr_autofs_dev" lineno="1590">
26153 +<interface name="dev_dontaudit_getattr_autofs_dev" lineno="1608">
26154 <summary>
26155 Do not audit attempts to get the attributes of
26156 the autofs device node.
26157 @@ -73666,7 +74296,7 @@ Domain to not audit.
26158 </summary>
26159 </param>
26160 </interface>
26161 -<interface name="dev_setattr_autofs_dev" lineno="1608">
26162 +<interface name="dev_setattr_autofs_dev" lineno="1626">
26163 <summary>
26164 Set the attributes of the autofs device node.
26165 </summary>
26166 @@ -73676,7 +74306,7 @@ Domain allowed access.
26167 </summary>
26168 </param>
26169 </interface>
26170 -<interface name="dev_dontaudit_setattr_autofs_dev" lineno="1627">
26171 +<interface name="dev_dontaudit_setattr_autofs_dev" lineno="1645">
26172 <summary>
26173 Do not audit attempts to set the attributes of
26174 the autofs device node.
26175 @@ -73687,7 +74317,7 @@ Domain to not audit.
26176 </summary>
26177 </param>
26178 </interface>
26179 -<interface name="dev_rw_autofs" lineno="1645">
26180 +<interface name="dev_rw_autofs" lineno="1663">
26181 <summary>
26182 Read and write the autofs device.
26183 </summary>
26184 @@ -73697,7 +74327,7 @@ Domain allowed access.
26185 </summary>
26186 </param>
26187 </interface>
26188 -<interface name="dev_relabel_autofs_dev" lineno="1663">
26189 +<interface name="dev_relabel_autofs_dev" lineno="1681">
26190 <summary>
26191 Relabel the autofs device node.
26192 </summary>
26193 @@ -73707,7 +74337,7 @@ Domain allowed access.
26194 </summary>
26195 </param>
26196 </interface>
26197 -<interface name="dev_rw_cachefiles" lineno="1682">
26198 +<interface name="dev_rw_cachefiles" lineno="1700">
26199 <summary>
26200 Read and write cachefiles character
26201 device nodes.
26202 @@ -73718,7 +74348,7 @@ Domain allowed access.
26203 </summary>
26204 </param>
26205 </interface>
26206 -<interface name="dev_rw_cardmgr" lineno="1700">
26207 +<interface name="dev_rw_cardmgr" lineno="1718">
26208 <summary>
26209 Read and write the PCMCIA card manager device.
26210 </summary>
26211 @@ -73728,7 +74358,7 @@ Domain allowed access.
26212 </summary>
26213 </param>
26214 </interface>
26215 -<interface name="dev_dontaudit_rw_cardmgr" lineno="1719">
26216 +<interface name="dev_dontaudit_rw_cardmgr" lineno="1737">
26217 <summary>
26218 Do not audit attempts to read and
26219 write the PCMCIA card manager device.
26220 @@ -73739,7 +74369,7 @@ Domain to not audit.
26221 </summary>
26222 </param>
26223 </interface>
26224 -<interface name="dev_create_cardmgr_dev" lineno="1739">
26225 +<interface name="dev_create_cardmgr_dev" lineno="1757">
26226 <summary>
26227 Create, read, write, and delete
26228 the PCMCIA card manager device
26229 @@ -73751,7 +74381,7 @@ Domain allowed access.
26230 </summary>
26231 </param>
26232 </interface>
26233 -<interface name="dev_manage_cardmgr_dev" lineno="1759">
26234 +<interface name="dev_manage_cardmgr_dev" lineno="1777">
26235 <summary>
26236 Create, read, write, and delete
26237 the PCMCIA card manager device.
26238 @@ -73762,7 +74392,7 @@ Domain allowed access.
26239 </summary>
26240 </param>
26241 </interface>
26242 -<interface name="dev_filetrans_cardmgr" lineno="1785">
26243 +<interface name="dev_filetrans_cardmgr" lineno="1803">
26244 <summary>
26245 Automatic type transition to the type
26246 for PCMCIA card manager device nodes when
26247 @@ -73779,7 +74409,7 @@ The name of the object being created.
26248 </summary>
26249 </param>
26250 </interface>
26251 -<interface name="dev_getattr_cpu_dev" lineno="1804">
26252 +<interface name="dev_getattr_cpu_dev" lineno="1822">
26253 <summary>
26254 Get the attributes of the CPU
26255 microcode and id interfaces.
26256 @@ -73790,7 +74420,7 @@ Domain allowed access.
26257 </summary>
26258 </param>
26259 </interface>
26260 -<interface name="dev_setattr_cpu_dev" lineno="1823">
26261 +<interface name="dev_setattr_cpu_dev" lineno="1841">
26262 <summary>
26263 Set the attributes of the CPU
26264 microcode and id interfaces.
26265 @@ -73801,7 +74431,7 @@ Domain allowed access.
26266 </summary>
26267 </param>
26268 </interface>
26269 -<interface name="dev_read_cpuid" lineno="1841">
26270 +<interface name="dev_read_cpuid" lineno="1859">
26271 <summary>
26272 Read the CPU identity.
26273 </summary>
26274 @@ -73811,7 +74441,7 @@ Domain allowed access.
26275 </summary>
26276 </param>
26277 </interface>
26278 -<interface name="dev_rw_cpu_microcode" lineno="1860">
26279 +<interface name="dev_rw_cpu_microcode" lineno="1878">
26280 <summary>
26281 Read and write the the CPU microcode device. This
26282 is required to load CPU microcode.
26283 @@ -73822,7 +74452,7 @@ Domain allowed access.
26284 </summary>
26285 </param>
26286 </interface>
26287 -<interface name="dev_read_crash" lineno="1878">
26288 +<interface name="dev_read_crash" lineno="1896">
26289 <summary>
26290 Read the kernel crash device
26291 </summary>
26292 @@ -73832,7 +74462,7 @@ Domain allowed access.
26293 </summary>
26294 </param>
26295 </interface>
26296 -<interface name="dev_rw_crypto" lineno="1896">
26297 +<interface name="dev_rw_crypto" lineno="1914">
26298 <summary>
26299 Read and write the the hardware SSL accelerator.
26300 </summary>
26301 @@ -73842,7 +74472,7 @@ Domain allowed access.
26302 </summary>
26303 </param>
26304 </interface>
26305 -<interface name="dev_setattr_dlm_control" lineno="1914">
26306 +<interface name="dev_setattr_dlm_control" lineno="1932">
26307 <summary>
26308 Set the attributes of the dlm control devices.
26309 </summary>
26310 @@ -73852,7 +74482,7 @@ Domain allowed access.
26311 </summary>
26312 </param>
26313 </interface>
26314 -<interface name="dev_rw_dlm_control" lineno="1932">
26315 +<interface name="dev_rw_dlm_control" lineno="1950">
26316 <summary>
26317 Read and write the the dlm control device
26318 </summary>
26319 @@ -73862,7 +74492,7 @@ Domain allowed access.
26320 </summary>
26321 </param>
26322 </interface>
26323 -<interface name="dev_getattr_dri_dev" lineno="1950">
26324 +<interface name="dev_getattr_dri_dev" lineno="1968">
26325 <summary>
26326 getattr the dri devices.
26327 </summary>
26328 @@ -73872,7 +74502,7 @@ Domain allowed access.
26329 </summary>
26330 </param>
26331 </interface>
26332 -<interface name="dev_setattr_dri_dev" lineno="1968">
26333 +<interface name="dev_setattr_dri_dev" lineno="1986">
26334 <summary>
26335 Setattr the dri devices.
26336 </summary>
26337 @@ -73882,7 +74512,7 @@ Domain allowed access.
26338 </summary>
26339 </param>
26340 </interface>
26341 -<interface name="dev_ioctl_dri_dev" lineno="1986">
26342 +<interface name="dev_ioctl_dri_dev" lineno="2004">
26343 <summary>
26344 IOCTL the dri devices.
26345 </summary>
26346 @@ -73892,7 +74522,7 @@ Domain allowed access.
26347 </summary>
26348 </param>
26349 </interface>
26350 -<interface name="dev_rw_dri" lineno="2004">
26351 +<interface name="dev_rw_dri" lineno="2022">
26352 <summary>
26353 Read and write the dri devices.
26354 </summary>
26355 @@ -73902,7 +74532,7 @@ Domain allowed access.
26356 </summary>
26357 </param>
26358 </interface>
26359 -<interface name="dev_dontaudit_rw_dri" lineno="2023">
26360 +<interface name="dev_dontaudit_rw_dri" lineno="2041">
26361 <summary>
26362 Dontaudit read and write on the dri devices.
26363 </summary>
26364 @@ -73912,7 +74542,7 @@ Domain to not audit.
26365 </summary>
26366 </param>
26367 </interface>
26368 -<interface name="dev_manage_dri_dev" lineno="2041">
26369 +<interface name="dev_manage_dri_dev" lineno="2059">
26370 <summary>
26371 Create, read, write, and delete the dri devices.
26372 </summary>
26373 @@ -73922,7 +74552,7 @@ Domain allowed access.
26374 </summary>
26375 </param>
26376 </interface>
26377 -<interface name="dev_filetrans_dri" lineno="2066">
26378 +<interface name="dev_filetrans_dri" lineno="2084">
26379 <summary>
26380 Automatic type transition to the type
26381 for DRI device nodes when created in /dev.
26382 @@ -73938,7 +74568,7 @@ The name of the object being created.
26383 </summary>
26384 </param>
26385 </interface>
26386 -<interface name="dev_filetrans_input_dev" lineno="2090">
26387 +<interface name="dev_filetrans_input_dev" lineno="2108">
26388 <summary>
26389 Automatic type transition to the type
26390 for event device nodes when created in /dev.
26391 @@ -73954,7 +74584,7 @@ The name of the object being created.
26392 </summary>
26393 </param>
26394 </interface>
26395 -<interface name="dev_getattr_input_dev" lineno="2108">
26396 +<interface name="dev_getattr_input_dev" lineno="2126">
26397 <summary>
26398 Get the attributes of the event devices.
26399 </summary>
26400 @@ -73964,7 +74594,7 @@ Domain allowed access.
26401 </summary>
26402 </param>
26403 </interface>
26404 -<interface name="dev_setattr_input_dev" lineno="2127">
26405 +<interface name="dev_setattr_input_dev" lineno="2145">
26406 <summary>
26407 Set the attributes of the event devices.
26408 </summary>
26409 @@ -73974,7 +74604,7 @@ Domain allowed access.
26410 </summary>
26411 </param>
26412 </interface>
26413 -<interface name="dev_read_input" lineno="2146">
26414 +<interface name="dev_read_input" lineno="2164">
26415 <summary>
26416 Read input event devices (/dev/input).
26417 </summary>
26418 @@ -73984,7 +74614,7 @@ Domain allowed access.
26419 </summary>
26420 </param>
26421 </interface>
26422 -<interface name="dev_rw_input_dev" lineno="2164">
26423 +<interface name="dev_rw_input_dev" lineno="2182">
26424 <summary>
26425 Read and write input event devices (/dev/input).
26426 </summary>
26427 @@ -73994,7 +74624,7 @@ Domain allowed access.
26428 </summary>
26429 </param>
26430 </interface>
26431 -<interface name="dev_manage_input_dev" lineno="2182">
26432 +<interface name="dev_manage_input_dev" lineno="2200">
26433 <summary>
26434 Create, read, write, and delete input event devices (/dev/input).
26435 </summary>
26436 @@ -74004,7 +74634,7 @@ Domain allowed access.
26437 </summary>
26438 </param>
26439 </interface>
26440 -<interface name="dev_ioctl_input_dev" lineno="2200">
26441 +<interface name="dev_ioctl_input_dev" lineno="2218">
26442 <summary>
26443 IOCTL the input event devices (/dev/input).
26444 </summary>
26445 @@ -74014,7 +74644,7 @@ Domain allowed access.
26446 </summary>
26447 </param>
26448 </interface>
26449 -<interface name="dev_rw_ipmi_dev" lineno="2218">
26450 +<interface name="dev_rw_ipmi_dev" lineno="2236">
26451 <summary>
26452 Read and write ipmi devices (/dev/ipmi*).
26453 </summary>
26454 @@ -74024,7 +74654,7 @@ Domain allowed access.
26455 </summary>
26456 </param>
26457 </interface>
26458 -<interface name="dev_getattr_framebuffer_dev" lineno="2236">
26459 +<interface name="dev_getattr_framebuffer_dev" lineno="2254">
26460 <summary>
26461 Get the attributes of the framebuffer device node.
26462 </summary>
26463 @@ -74034,7 +74664,7 @@ Domain allowed access.
26464 </summary>
26465 </param>
26466 </interface>
26467 -<interface name="dev_setattr_framebuffer_dev" lineno="2254">
26468 +<interface name="dev_setattr_framebuffer_dev" lineno="2272">
26469 <summary>
26470 Set the attributes of the framebuffer device node.
26471 </summary>
26472 @@ -74044,7 +74674,7 @@ Domain allowed access.
26473 </summary>
26474 </param>
26475 </interface>
26476 -<interface name="dev_dontaudit_setattr_framebuffer_dev" lineno="2273">
26477 +<interface name="dev_dontaudit_setattr_framebuffer_dev" lineno="2291">
26478 <summary>
26479 Dot not audit attempts to set the attributes
26480 of the framebuffer device node.
26481 @@ -74055,7 +74685,7 @@ Domain to not audit.
26482 </summary>
26483 </param>
26484 </interface>
26485 -<interface name="dev_read_framebuffer" lineno="2291">
26486 +<interface name="dev_read_framebuffer" lineno="2309">
26487 <summary>
26488 Read the framebuffer.
26489 </summary>
26490 @@ -74065,7 +74695,7 @@ Domain allowed access.
26491 </summary>
26492 </param>
26493 </interface>
26494 -<interface name="dev_dontaudit_read_framebuffer" lineno="2309">
26495 +<interface name="dev_dontaudit_read_framebuffer" lineno="2327">
26496 <summary>
26497 Do not audit attempts to read the framebuffer.
26498 </summary>
26499 @@ -74075,7 +74705,7 @@ Domain to not audit.
26500 </summary>
26501 </param>
26502 </interface>
26503 -<interface name="dev_write_framebuffer" lineno="2327">
26504 +<interface name="dev_write_framebuffer" lineno="2345">
26505 <summary>
26506 Write the framebuffer.
26507 </summary>
26508 @@ -74085,7 +74715,7 @@ Domain allowed access.
26509 </summary>
26510 </param>
26511 </interface>
26512 -<interface name="dev_rw_framebuffer" lineno="2345">
26513 +<interface name="dev_rw_framebuffer" lineno="2363">
26514 <summary>
26515 Read and write the framebuffer.
26516 </summary>
26517 @@ -74095,7 +74725,7 @@ Domain allowed access.
26518 </summary>
26519 </param>
26520 </interface>
26521 -<interface name="dev_read_kmsg" lineno="2363">
26522 +<interface name="dev_read_kmsg" lineno="2381">
26523 <summary>
26524 Read the kernel messages
26525 </summary>
26526 @@ -74105,7 +74735,7 @@ Domain allowed access.
26527 </summary>
26528 </param>
26529 </interface>
26530 -<interface name="dev_dontaudit_read_kmsg" lineno="2381">
26531 +<interface name="dev_dontaudit_read_kmsg" lineno="2399">
26532 <summary>
26533 Do not audit attempts to read the kernel messages
26534 </summary>
26535 @@ -74115,7 +74745,7 @@ Domain to not audit.
26536 </summary>
26537 </param>
26538 </interface>
26539 -<interface name="dev_write_kmsg" lineno="2399">
26540 +<interface name="dev_write_kmsg" lineno="2417">
26541 <summary>
26542 Write to the kernel messages device
26543 </summary>
26544 @@ -74125,7 +74755,7 @@ Domain allowed access.
26545 </summary>
26546 </param>
26547 </interface>
26548 -<interface name="dev_rw_kmsg" lineno="2417">
26549 +<interface name="dev_rw_kmsg" lineno="2435">
26550 <summary>
26551 Read and write to the kernel messages device
26552 </summary>
26553 @@ -74135,7 +74765,7 @@ Domain allowed access.
26554 </summary>
26555 </param>
26556 </interface>
26557 -<interface name="dev_mounton_kmsg" lineno="2435">
26558 +<interface name="dev_mounton_kmsg" lineno="2453">
26559 <summary>
26560 Mount on the kernel messages device
26561 </summary>
26562 @@ -74145,7 +74775,7 @@ Domain allowed access.
26563 </summary>
26564 </param>
26565 </interface>
26566 -<interface name="dev_getattr_ksm_dev" lineno="2453">
26567 +<interface name="dev_getattr_ksm_dev" lineno="2471">
26568 <summary>
26569 Get the attributes of the ksm devices.
26570 </summary>
26571 @@ -74155,7 +74785,7 @@ Domain allowed access.
26572 </summary>
26573 </param>
26574 </interface>
26575 -<interface name="dev_setattr_ksm_dev" lineno="2471">
26576 +<interface name="dev_setattr_ksm_dev" lineno="2489">
26577 <summary>
26578 Set the attributes of the ksm devices.
26579 </summary>
26580 @@ -74165,7 +74795,7 @@ Domain allowed access.
26581 </summary>
26582 </param>
26583 </interface>
26584 -<interface name="dev_read_ksm" lineno="2489">
26585 +<interface name="dev_read_ksm" lineno="2507">
26586 <summary>
26587 Read the ksm devices.
26588 </summary>
26589 @@ -74175,7 +74805,7 @@ Domain allowed access.
26590 </summary>
26591 </param>
26592 </interface>
26593 -<interface name="dev_rw_ksm" lineno="2507">
26594 +<interface name="dev_rw_ksm" lineno="2525">
26595 <summary>
26596 Read and write to ksm devices.
26597 </summary>
26598 @@ -74185,7 +74815,7 @@ Domain allowed access.
26599 </summary>
26600 </param>
26601 </interface>
26602 -<interface name="dev_getattr_kvm_dev" lineno="2525">
26603 +<interface name="dev_getattr_kvm_dev" lineno="2543">
26604 <summary>
26605 Get the attributes of the kvm devices.
26606 </summary>
26607 @@ -74195,7 +74825,7 @@ Domain allowed access.
26608 </summary>
26609 </param>
26610 </interface>
26611 -<interface name="dev_setattr_kvm_dev" lineno="2543">
26612 +<interface name="dev_setattr_kvm_dev" lineno="2561">
26613 <summary>
26614 Set the attributes of the kvm devices.
26615 </summary>
26616 @@ -74205,7 +74835,7 @@ Domain allowed access.
26617 </summary>
26618 </param>
26619 </interface>
26620 -<interface name="dev_read_kvm" lineno="2561">
26621 +<interface name="dev_read_kvm" lineno="2579">
26622 <summary>
26623 Read the kvm devices.
26624 </summary>
26625 @@ -74215,7 +74845,7 @@ Domain allowed access.
26626 </summary>
26627 </param>
26628 </interface>
26629 -<interface name="dev_rw_kvm" lineno="2579">
26630 +<interface name="dev_rw_kvm" lineno="2597">
26631 <summary>
26632 Read and write to kvm devices.
26633 </summary>
26634 @@ -74225,7 +74855,7 @@ Domain allowed access.
26635 </summary>
26636 </param>
26637 </interface>
26638 -<interface name="dev_read_lirc" lineno="2597">
26639 +<interface name="dev_read_lirc" lineno="2615">
26640 <summary>
26641 Read the lirc device.
26642 </summary>
26643 @@ -74235,7 +74865,7 @@ Domain allowed access.
26644 </summary>
26645 </param>
26646 </interface>
26647 -<interface name="dev_rw_lirc" lineno="2615">
26648 +<interface name="dev_rw_lirc" lineno="2633">
26649 <summary>
26650 Read and write the lirc device.
26651 </summary>
26652 @@ -74245,7 +74875,7 @@ Domain allowed access.
26653 </summary>
26654 </param>
26655 </interface>
26656 -<interface name="dev_filetrans_lirc" lineno="2639">
26657 +<interface name="dev_filetrans_lirc" lineno="2657">
26658 <summary>
26659 Automatic type transition to the type
26660 for lirc device nodes when created in /dev.
26661 @@ -74261,7 +74891,7 @@ The name of the object being created.
26662 </summary>
26663 </param>
26664 </interface>
26665 -<interface name="dev_rw_loop_control" lineno="2657">
26666 +<interface name="dev_rw_loop_control" lineno="2675">
26667 <summary>
26668 Read and write the loop-control device.
26669 </summary>
26670 @@ -74271,7 +74901,7 @@ Domain allowed access.
26671 </summary>
26672 </param>
26673 </interface>
26674 -<interface name="dev_getattr_lvm_control" lineno="2675">
26675 +<interface name="dev_getattr_lvm_control" lineno="2693">
26676 <summary>
26677 Get the attributes of the lvm comtrol device.
26678 </summary>
26679 @@ -74281,7 +74911,7 @@ Domain allowed access.
26680 </summary>
26681 </param>
26682 </interface>
26683 -<interface name="dev_read_lvm_control" lineno="2693">
26684 +<interface name="dev_read_lvm_control" lineno="2711">
26685 <summary>
26686 Read the lvm comtrol device.
26687 </summary>
26688 @@ -74291,7 +74921,7 @@ Domain allowed access.
26689 </summary>
26690 </param>
26691 </interface>
26692 -<interface name="dev_rw_lvm_control" lineno="2711">
26693 +<interface name="dev_rw_lvm_control" lineno="2729">
26694 <summary>
26695 Read and write the lvm control device.
26696 </summary>
26697 @@ -74301,7 +74931,7 @@ Domain allowed access.
26698 </summary>
26699 </param>
26700 </interface>
26701 -<interface name="dev_dontaudit_rw_lvm_control" lineno="2729">
26702 +<interface name="dev_dontaudit_rw_lvm_control" lineno="2747">
26703 <summary>
26704 Do not audit attempts to read and write lvm control device.
26705 </summary>
26706 @@ -74311,7 +74941,7 @@ Domain to not audit.
26707 </summary>
26708 </param>
26709 </interface>
26710 -<interface name="dev_delete_lvm_control_dev" lineno="2747">
26711 +<interface name="dev_delete_lvm_control_dev" lineno="2765">
26712 <summary>
26713 Delete the lvm control device.
26714 </summary>
26715 @@ -74321,7 +74951,7 @@ Domain allowed access.
26716 </summary>
26717 </param>
26718 </interface>
26719 -<interface name="dev_dontaudit_getattr_memory_dev" lineno="2765">
26720 +<interface name="dev_dontaudit_getattr_memory_dev" lineno="2783">
26721 <summary>
26722 dontaudit getattr raw memory devices (e.g. /dev/mem).
26723 </summary>
26724 @@ -74331,7 +74961,7 @@ Domain to not audit.
26725 </summary>
26726 </param>
26727 </interface>
26728 -<interface name="dev_read_raw_memory" lineno="2786">
26729 +<interface name="dev_read_raw_memory" lineno="2804">
26730 <summary>
26731 Read raw memory devices (e.g. /dev/mem).
26732 This is extremely dangerous as it can bypass the
26733 @@ -74344,7 +74974,7 @@ Domain allowed access.
26734 </summary>
26735 </param>
26736 </interface>
26737 -<interface name="dev_read_raw_memory_cond" lineno="2816">
26738 +<interface name="dev_read_raw_memory_cond" lineno="2834">
26739 <summary>
26740 Read raw memory devices (e.g. /dev/mem) if a tunable is set.
26741 This is extremely dangerous as it can bypass the
26742 @@ -74362,7 +74992,7 @@ Tunable to depend on
26743 </summary>
26744 </param>
26745 </interface>
26746 -<interface name="dev_dontaudit_read_raw_memory" lineno="2843">
26747 +<interface name="dev_dontaudit_read_raw_memory" lineno="2861">
26748 <summary>
26749 Do not audit attempts to read raw memory devices
26750 (e.g. /dev/mem).
26751 @@ -74376,7 +75006,7 @@ Domain to not audit.
26752 </summary>
26753 </param>
26754 </interface>
26755 -<interface name="dev_write_raw_memory" lineno="2864">
26756 +<interface name="dev_write_raw_memory" lineno="2882">
26757 <summary>
26758 Write raw memory devices (e.g. /dev/mem).
26759 This is extremely dangerous as it can bypass the
26760 @@ -74389,7 +75019,7 @@ Domain allowed access.
26761 </summary>
26762 </param>
26763 </interface>
26764 -<interface name="dev_write_raw_memory_cond" lineno="2894">
26765 +<interface name="dev_write_raw_memory_cond" lineno="2912">
26766 <summary>
26767 Write raw memory devices (e.g. /dev/mem) if a tunable is set.
26768 This is extremely dangerous as it can bypass the
26769 @@ -74407,7 +75037,7 @@ Tunable to depend on
26770 </summary>
26771 </param>
26772 </interface>
26773 -<interface name="dev_rx_raw_memory" lineno="2920">
26774 +<interface name="dev_rx_raw_memory" lineno="2938">
26775 <summary>
26776 Read and execute raw memory devices (e.g. /dev/mem).
26777 This is extremely dangerous as it can bypass the
26778 @@ -74420,7 +75050,7 @@ Domain allowed access.
26779 </summary>
26780 </param>
26781 </interface>
26782 -<interface name="dev_wx_raw_memory" lineno="2942">
26783 +<interface name="dev_wx_raw_memory" lineno="2960">
26784 <summary>
26785 Write and execute raw memory devices (e.g. /dev/mem).
26786 This is extremely dangerous as it can bypass the
26787 @@ -74433,7 +75063,7 @@ Domain allowed access.
26788 </summary>
26789 </param>
26790 </interface>
26791 -<interface name="dev_wx_raw_memory_cond" lineno="2969">
26792 +<interface name="dev_wx_raw_memory_cond" lineno="2987">
26793 <summary>
26794 Write and execute raw memory devices (e.g. /dev/mem) if a tunable is set.
26795 This is extremely dangerous as it can bypass the
26796 @@ -74451,7 +75081,7 @@ Tunable to depend on
26797 </summary>
26798 </param>
26799 </interface>
26800 -<interface name="dev_getattr_misc_dev" lineno="2992">
26801 +<interface name="dev_getattr_misc_dev" lineno="3010">
26802 <summary>
26803 Get the attributes of miscellaneous devices.
26804 </summary>
26805 @@ -74461,7 +75091,7 @@ Domain allowed access.
26806 </summary>
26807 </param>
26808 </interface>
26809 -<interface name="dev_dontaudit_getattr_misc_dev" lineno="3011">
26810 +<interface name="dev_dontaudit_getattr_misc_dev" lineno="3029">
26811 <summary>
26812 Do not audit attempts to get the attributes
26813 of miscellaneous devices.
26814 @@ -74472,7 +75102,7 @@ Domain to not audit.
26815 </summary>
26816 </param>
26817 </interface>
26818 -<interface name="dev_setattr_misc_dev" lineno="3029">
26819 +<interface name="dev_setattr_misc_dev" lineno="3047">
26820 <summary>
26821 Set the attributes of miscellaneous devices.
26822 </summary>
26823 @@ -74482,7 +75112,7 @@ Domain allowed access.
26824 </summary>
26825 </param>
26826 </interface>
26827 -<interface name="dev_dontaudit_setattr_misc_dev" lineno="3048">
26828 +<interface name="dev_dontaudit_setattr_misc_dev" lineno="3066">
26829 <summary>
26830 Do not audit attempts to set the attributes
26831 of miscellaneous devices.
26832 @@ -74493,7 +75123,7 @@ Domain to not audit.
26833 </summary>
26834 </param>
26835 </interface>
26836 -<interface name="dev_read_misc" lineno="3066">
26837 +<interface name="dev_read_misc" lineno="3084">
26838 <summary>
26839 Read miscellaneous devices.
26840 </summary>
26841 @@ -74503,7 +75133,7 @@ Domain allowed access.
26842 </summary>
26843 </param>
26844 </interface>
26845 -<interface name="dev_write_misc" lineno="3084">
26846 +<interface name="dev_write_misc" lineno="3102">
26847 <summary>
26848 Write miscellaneous devices.
26849 </summary>
26850 @@ -74513,7 +75143,7 @@ Domain allowed access.
26851 </summary>
26852 </param>
26853 </interface>
26854 -<interface name="dev_dontaudit_rw_misc" lineno="3102">
26855 +<interface name="dev_dontaudit_rw_misc" lineno="3120">
26856 <summary>
26857 Do not audit attempts to read and write miscellaneous devices.
26858 </summary>
26859 @@ -74523,7 +75153,7 @@ Domain allowed access.
26860 </summary>
26861 </param>
26862 </interface>
26863 -<interface name="dev_getattr_modem_dev" lineno="3120">
26864 +<interface name="dev_getattr_modem_dev" lineno="3138">
26865 <summary>
26866 Get the attributes of the modem devices.
26867 </summary>
26868 @@ -74533,7 +75163,7 @@ Domain allowed access.
26869 </summary>
26870 </param>
26871 </interface>
26872 -<interface name="dev_setattr_modem_dev" lineno="3138">
26873 +<interface name="dev_setattr_modem_dev" lineno="3156">
26874 <summary>
26875 Set the attributes of the modem devices.
26876 </summary>
26877 @@ -74543,7 +75173,7 @@ Domain allowed access.
26878 </summary>
26879 </param>
26880 </interface>
26881 -<interface name="dev_read_modem" lineno="3156">
26882 +<interface name="dev_read_modem" lineno="3174">
26883 <summary>
26884 Read the modem devices.
26885 </summary>
26886 @@ -74553,7 +75183,7 @@ Domain allowed access.
26887 </summary>
26888 </param>
26889 </interface>
26890 -<interface name="dev_rw_modem" lineno="3174">
26891 +<interface name="dev_rw_modem" lineno="3192">
26892 <summary>
26893 Read and write to modem devices.
26894 </summary>
26895 @@ -74563,7 +75193,7 @@ Domain allowed access.
26896 </summary>
26897 </param>
26898 </interface>
26899 -<interface name="dev_getattr_mouse_dev" lineno="3192">
26900 +<interface name="dev_getattr_mouse_dev" lineno="3210">
26901 <summary>
26902 Get the attributes of the mouse devices.
26903 </summary>
26904 @@ -74573,7 +75203,7 @@ Domain allowed access.
26905 </summary>
26906 </param>
26907 </interface>
26908 -<interface name="dev_setattr_mouse_dev" lineno="3210">
26909 +<interface name="dev_setattr_mouse_dev" lineno="3228">
26910 <summary>
26911 Set the attributes of the mouse devices.
26912 </summary>
26913 @@ -74583,7 +75213,7 @@ Domain allowed access.
26914 </summary>
26915 </param>
26916 </interface>
26917 -<interface name="dev_read_mouse" lineno="3228">
26918 +<interface name="dev_read_mouse" lineno="3246">
26919 <summary>
26920 Read the mouse devices.
26921 </summary>
26922 @@ -74593,7 +75223,7 @@ Domain allowed access.
26923 </summary>
26924 </param>
26925 </interface>
26926 -<interface name="dev_rw_mouse" lineno="3246">
26927 +<interface name="dev_rw_mouse" lineno="3264">
26928 <summary>
26929 Read and write to mouse devices.
26930 </summary>
26931 @@ -74603,7 +75233,7 @@ Domain allowed access.
26932 </summary>
26933 </param>
26934 </interface>
26935 -<interface name="dev_getattr_mtrr_dev" lineno="3265">
26936 +<interface name="dev_getattr_mtrr_dev" lineno="3283">
26937 <summary>
26938 Get the attributes of the memory type range
26939 registers (MTRR) device.
26940 @@ -74614,7 +75244,7 @@ Domain allowed access.
26941 </summary>
26942 </param>
26943 </interface>
26944 -<interface name="dev_dontaudit_write_mtrr" lineno="3285">
26945 +<interface name="dev_dontaudit_write_mtrr" lineno="3303">
26946 <summary>
26947 Do not audit attempts to write the memory type
26948 range registers (MTRR).
26949 @@ -74625,7 +75255,7 @@ Domain to not audit.
26950 </summary>
26951 </param>
26952 </interface>
26953 -<interface name="dev_rw_mtrr" lineno="3304">
26954 +<interface name="dev_rw_mtrr" lineno="3322">
26955 <summary>
26956 Read and write the memory type range registers (MTRR).
26957 </summary>
26958 @@ -74635,7 +75265,7 @@ Domain allowed access.
26959 </summary>
26960 </param>
26961 </interface>
26962 -<interface name="dev_getattr_netcontrol_dev" lineno="3323">
26963 +<interface name="dev_getattr_netcontrol_dev" lineno="3341">
26964 <summary>
26965 Get the attributes of the network control device (Deprecated)
26966 </summary>
26967 @@ -74645,7 +75275,7 @@ Domain allowed access.
26968 </summary>
26969 </param>
26970 </interface>
26971 -<interface name="dev_read_netcontrol" lineno="3338">
26972 +<interface name="dev_read_netcontrol" lineno="3356">
26973 <summary>
26974 Read the network control identity. (Deprecated)
26975 </summary>
26976 @@ -74655,7 +75285,7 @@ Domain allowed access.
26977 </summary>
26978 </param>
26979 </interface>
26980 -<interface name="dev_rw_netcontrol" lineno="3353">
26981 +<interface name="dev_rw_netcontrol" lineno="3371">
26982 <summary>
26983 Read and write the the network control device. (Deprecated)
26984 </summary>
26985 @@ -74665,7 +75295,7 @@ Domain allowed access.
26986 </summary>
26987 </param>
26988 </interface>
26989 -<interface name="dev_getattr_null_dev" lineno="3368">
26990 +<interface name="dev_getattr_null_dev" lineno="3386">
26991 <summary>
26992 Get the attributes of the null device nodes.
26993 </summary>
26994 @@ -74675,7 +75305,7 @@ Domain allowed access.
26995 </summary>
26996 </param>
26997 </interface>
26998 -<interface name="dev_setattr_null_dev" lineno="3386">
26999 +<interface name="dev_setattr_null_dev" lineno="3404">
27000 <summary>
27001 Set the attributes of the null device nodes.
27002 </summary>
27003 @@ -74685,7 +75315,7 @@ Domain allowed access.
27004 </summary>
27005 </param>
27006 </interface>
27007 -<interface name="dev_dontaudit_setattr_null_dev" lineno="3405">
27008 +<interface name="dev_dontaudit_setattr_null_dev" lineno="3423">
27009 <summary>
27010 Do not audit attempts to set the attributes of
27011 the null device nodes.
27012 @@ -74696,7 +75326,7 @@ Domain to not audit.
27013 </summary>
27014 </param>
27015 </interface>
27016 -<interface name="dev_delete_null" lineno="3423">
27017 +<interface name="dev_delete_null" lineno="3441">
27018 <summary>
27019 Delete the null device (/dev/null).
27020 </summary>
27021 @@ -74706,7 +75336,7 @@ Domain allowed access.
27022 </summary>
27023 </param>
27024 </interface>
27025 -<interface name="dev_rw_null" lineno="3441">
27026 +<interface name="dev_rw_null" lineno="3459">
27027 <summary>
27028 Read and write to the null device (/dev/null).
27029 </summary>
27030 @@ -74716,7 +75346,7 @@ Domain allowed access.
27031 </summary>
27032 </param>
27033 </interface>
27034 -<interface name="dev_create_null_dev" lineno="3459">
27035 +<interface name="dev_create_null_dev" lineno="3477">
27036 <summary>
27037 Create the null device (/dev/null).
27038 </summary>
27039 @@ -74726,7 +75356,7 @@ Domain allowed access.
27040 </summary>
27041 </param>
27042 </interface>
27043 -<interface name="dev_manage_null_service" lineno="3478">
27044 +<interface name="dev_manage_null_service" lineno="3496">
27045 <summary>
27046 Manage services with script type null_device_t for when
27047 /lib/systemd/system/something.service is a link to /dev/null
27048 @@ -74737,7 +75367,7 @@ Domain allowed access.
27049 </summary>
27050 </param>
27051 </interface>
27052 -<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3498">
27053 +<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3516">
27054 <summary>
27055 Do not audit attempts to get the attributes
27056 of the BIOS non-volatile RAM device.
27057 @@ -74748,7 +75378,7 @@ Domain to not audit.
27058 </summary>
27059 </param>
27060 </interface>
27061 -<interface name="dev_rw_nvram" lineno="3516">
27062 +<interface name="dev_rw_nvram" lineno="3534">
27063 <summary>
27064 Read and write BIOS non-volatile RAM.
27065 </summary>
27066 @@ -74758,7 +75388,7 @@ Domain allowed access.
27067 </summary>
27068 </param>
27069 </interface>
27070 -<interface name="dev_getattr_printer_dev" lineno="3534">
27071 +<interface name="dev_getattr_printer_dev" lineno="3552">
27072 <summary>
27073 Get the attributes of the printer device nodes.
27074 </summary>
27075 @@ -74768,7 +75398,7 @@ Domain allowed access.
27076 </summary>
27077 </param>
27078 </interface>
27079 -<interface name="dev_setattr_printer_dev" lineno="3552">
27080 +<interface name="dev_setattr_printer_dev" lineno="3570">
27081 <summary>
27082 Set the attributes of the printer device nodes.
27083 </summary>
27084 @@ -74778,7 +75408,7 @@ Domain allowed access.
27085 </summary>
27086 </param>
27087 </interface>
27088 -<interface name="dev_append_printer" lineno="3571">
27089 +<interface name="dev_append_printer" lineno="3589">
27090 <summary>
27091 Append the printer device.
27092 </summary>
27093 @@ -74788,7 +75418,7 @@ Domain allowed access.
27094 </summary>
27095 </param>
27096 </interface>
27097 -<interface name="dev_rw_printer" lineno="3589">
27098 +<interface name="dev_rw_printer" lineno="3607">
27099 <summary>
27100 Read and write the printer device.
27101 </summary>
27102 @@ -74798,7 +75428,7 @@ Domain allowed access.
27103 </summary>
27104 </param>
27105 </interface>
27106 -<interface name="dev_getattr_pmqos_dev" lineno="3607">
27107 +<interface name="dev_getattr_pmqos_dev" lineno="3625">
27108 <summary>
27109 Get the attributes of PM QoS devices
27110 </summary>
27111 @@ -74808,7 +75438,7 @@ Domain allowed access.
27112 </summary>
27113 </param>
27114 </interface>
27115 -<interface name="dev_read_pmqos" lineno="3625">
27116 +<interface name="dev_read_pmqos" lineno="3643">
27117 <summary>
27118 Read the PM QoS devices.
27119 </summary>
27120 @@ -74818,7 +75448,7 @@ Domain allowed access.
27121 </summary>
27122 </param>
27123 </interface>
27124 -<interface name="dev_rw_pmqos" lineno="3643">
27125 +<interface name="dev_rw_pmqos" lineno="3661">
27126 <summary>
27127 Read and write the the PM QoS devices.
27128 </summary>
27129 @@ -74828,7 +75458,7 @@ Domain allowed access.
27130 </summary>
27131 </param>
27132 </interface>
27133 -<interface name="dev_getattr_qemu_dev" lineno="3662">
27134 +<interface name="dev_getattr_qemu_dev" lineno="3680">
27135 <summary>
27136 Get the attributes of the QEMU
27137 microcode and id interfaces.
27138 @@ -74839,7 +75469,7 @@ Domain allowed access.
27139 </summary>
27140 </param>
27141 </interface>
27142 -<interface name="dev_setattr_qemu_dev" lineno="3681">
27143 +<interface name="dev_setattr_qemu_dev" lineno="3699">
27144 <summary>
27145 Set the attributes of the QEMU
27146 microcode and id interfaces.
27147 @@ -74850,7 +75480,7 @@ Domain allowed access.
27148 </summary>
27149 </param>
27150 </interface>
27151 -<interface name="dev_read_qemu" lineno="3699">
27152 +<interface name="dev_read_qemu" lineno="3717">
27153 <summary>
27154 Read the QEMU device
27155 </summary>
27156 @@ -74860,7 +75490,7 @@ Domain allowed access.
27157 </summary>
27158 </param>
27159 </interface>
27160 -<interface name="dev_rw_qemu" lineno="3717">
27161 +<interface name="dev_rw_qemu" lineno="3735">
27162 <summary>
27163 Read and write the the QEMU device.
27164 </summary>
27165 @@ -74870,7 +75500,7 @@ Domain allowed access.
27166 </summary>
27167 </param>
27168 </interface>
27169 -<interface name="dev_read_rand" lineno="3751">
27170 +<interface name="dev_read_rand" lineno="3769">
27171 <summary>
27172 Read from random number generator
27173 devices (e.g., /dev/random).
27174 @@ -74896,7 +75526,7 @@ Domain allowed access.
27175 </param>
27176 <infoflow type="read" weight="10"/>
27177 </interface>
27178 -<interface name="dev_dontaudit_read_rand" lineno="3770">
27179 +<interface name="dev_dontaudit_read_rand" lineno="3788">
27180 <summary>
27181 Do not audit attempts to read from random
27182 number generator devices (e.g., /dev/random)
27183 @@ -74907,7 +75537,7 @@ Domain to not audit.
27184 </summary>
27185 </param>
27186 </interface>
27187 -<interface name="dev_dontaudit_append_rand" lineno="3789">
27188 +<interface name="dev_dontaudit_append_rand" lineno="3807">
27189 <summary>
27190 Do not audit attempts to append to random
27191 number generator devices (e.g., /dev/random)
27192 @@ -74918,7 +75548,7 @@ Domain to not audit.
27193 </summary>
27194 </param>
27195 </interface>
27196 -<interface name="dev_write_rand" lineno="3809">
27197 +<interface name="dev_write_rand" lineno="3827">
27198 <summary>
27199 Write to the random device (e.g., /dev/random). This adds
27200 entropy used to generate the random data read from the
27201 @@ -74930,7 +75560,7 @@ Domain allowed access.
27202 </summary>
27203 </param>
27204 </interface>
27205 -<interface name="dev_create_rand_dev" lineno="3827">
27206 +<interface name="dev_create_rand_dev" lineno="3845">
27207 <summary>
27208 Create the random device (/dev/random).
27209 </summary>
27210 @@ -74940,7 +75570,7 @@ Domain allowed access.
27211 </summary>
27212 </param>
27213 </interface>
27214 -<interface name="dev_read_realtime_clock" lineno="3845">
27215 +<interface name="dev_read_realtime_clock" lineno="3863">
27216 <summary>
27217 Read the realtime clock (/dev/rtc).
27218 </summary>
27219 @@ -74950,7 +75580,7 @@ Domain allowed access.
27220 </summary>
27221 </param>
27222 </interface>
27223 -<interface name="dev_write_realtime_clock" lineno="3863">
27224 +<interface name="dev_write_realtime_clock" lineno="3881">
27225 <summary>
27226 Set the realtime clock (/dev/rtc).
27227 </summary>
27228 @@ -74960,7 +75590,7 @@ Domain allowed access.
27229 </summary>
27230 </param>
27231 </interface>
27232 -<interface name="dev_rw_realtime_clock" lineno="3883">
27233 +<interface name="dev_rw_realtime_clock" lineno="3901">
27234 <summary>
27235 Read and set the realtime clock (/dev/rtc).
27236 </summary>
27237 @@ -74970,7 +75600,7 @@ Domain allowed access.
27238 </summary>
27239 </param>
27240 </interface>
27241 -<interface name="dev_getattr_scanner_dev" lineno="3898">
27242 +<interface name="dev_getattr_scanner_dev" lineno="3916">
27243 <summary>
27244 Get the attributes of the scanner device.
27245 </summary>
27246 @@ -74980,7 +75610,7 @@ Domain allowed access.
27247 </summary>
27248 </param>
27249 </interface>
27250 -<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3917">
27251 +<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3935">
27252 <summary>
27253 Do not audit attempts to get the attributes of
27254 the scanner device.
27255 @@ -74991,7 +75621,7 @@ Domain to not audit.
27256 </summary>
27257 </param>
27258 </interface>
27259 -<interface name="dev_setattr_scanner_dev" lineno="3935">
27260 +<interface name="dev_setattr_scanner_dev" lineno="3953">
27261 <summary>
27262 Set the attributes of the scanner device.
27263 </summary>
27264 @@ -75001,7 +75631,7 @@ Domain allowed access.
27265 </summary>
27266 </param>
27267 </interface>
27268 -<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3954">
27269 +<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3972">
27270 <summary>
27271 Do not audit attempts to set the attributes of
27272 the scanner device.
27273 @@ -75012,7 +75642,7 @@ Domain to not audit.
27274 </summary>
27275 </param>
27276 </interface>
27277 -<interface name="dev_rw_scanner" lineno="3972">
27278 +<interface name="dev_rw_scanner" lineno="3990">
27279 <summary>
27280 Read and write the scanner device.
27281 </summary>
27282 @@ -75022,7 +75652,7 @@ Domain allowed access.
27283 </summary>
27284 </param>
27285 </interface>
27286 -<interface name="dev_getattr_sound_dev" lineno="3990">
27287 +<interface name="dev_getattr_sound_dev" lineno="4008">
27288 <summary>
27289 Get the attributes of the sound devices.
27290 </summary>
27291 @@ -75032,7 +75662,7 @@ Domain allowed access.
27292 </summary>
27293 </param>
27294 </interface>
27295 -<interface name="dev_setattr_sound_dev" lineno="4008">
27296 +<interface name="dev_setattr_sound_dev" lineno="4026">
27297 <summary>
27298 Set the attributes of the sound devices.
27299 </summary>
27300 @@ -75042,7 +75672,7 @@ Domain allowed access.
27301 </summary>
27302 </param>
27303 </interface>
27304 -<interface name="dev_read_sound" lineno="4026">
27305 +<interface name="dev_read_sound" lineno="4044">
27306 <summary>
27307 Read the sound devices.
27308 </summary>
27309 @@ -75052,7 +75682,7 @@ Domain allowed access.
27310 </summary>
27311 </param>
27312 </interface>
27313 -<interface name="dev_write_sound" lineno="4045">
27314 +<interface name="dev_write_sound" lineno="4063">
27315 <summary>
27316 Write the sound devices.
27317 </summary>
27318 @@ -75062,7 +75692,7 @@ Domain allowed access.
27319 </summary>
27320 </param>
27321 </interface>
27322 -<interface name="dev_read_sound_mixer" lineno="4064">
27323 +<interface name="dev_read_sound_mixer" lineno="4082">
27324 <summary>
27325 Read the sound mixer devices.
27326 </summary>
27327 @@ -75072,7 +75702,7 @@ Domain allowed access.
27328 </summary>
27329 </param>
27330 </interface>
27331 -<interface name="dev_write_sound_mixer" lineno="4083">
27332 +<interface name="dev_write_sound_mixer" lineno="4101">
27333 <summary>
27334 Write the sound mixer devices.
27335 </summary>
27336 @@ -75082,7 +75712,7 @@ Domain allowed access.
27337 </summary>
27338 </param>
27339 </interface>
27340 -<interface name="dev_getattr_power_mgmt_dev" lineno="4102">
27341 +<interface name="dev_getattr_power_mgmt_dev" lineno="4120">
27342 <summary>
27343 Get the attributes of the the power management device.
27344 </summary>
27345 @@ -75092,7 +75722,7 @@ Domain allowed access.
27346 </summary>
27347 </param>
27348 </interface>
27349 -<interface name="dev_setattr_power_mgmt_dev" lineno="4120">
27350 +<interface name="dev_setattr_power_mgmt_dev" lineno="4138">
27351 <summary>
27352 Set the attributes of the the power management device.
27353 </summary>
27354 @@ -75102,7 +75732,7 @@ Domain allowed access.
27355 </summary>
27356 </param>
27357 </interface>
27358 -<interface name="dev_rw_power_management" lineno="4138">
27359 +<interface name="dev_rw_power_management" lineno="4156">
27360 <summary>
27361 Read and write the the power management device.
27362 </summary>
27363 @@ -75112,7 +75742,7 @@ Domain allowed access.
27364 </summary>
27365 </param>
27366 </interface>
27367 -<interface name="dev_getattr_smartcard_dev" lineno="4156">
27368 +<interface name="dev_getattr_smartcard_dev" lineno="4174">
27369 <summary>
27370 Getattr on smartcard devices
27371 </summary>
27372 @@ -75122,7 +75752,7 @@ Domain allowed access.
27373 </summary>
27374 </param>
27375 </interface>
27376 -<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4175">
27377 +<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4193">
27378 <summary>
27379 dontaudit getattr on smartcard devices
27380 </summary>
27381 @@ -75132,7 +75762,7 @@ Domain to not audit.
27382 </summary>
27383 </param>
27384 </interface>
27385 -<interface name="dev_rw_smartcard" lineno="4194">
27386 +<interface name="dev_rw_smartcard" lineno="4212">
27387 <summary>
27388 Read and write smartcard devices.
27389 </summary>
27390 @@ -75142,7 +75772,7 @@ Domain allowed access.
27391 </summary>
27392 </param>
27393 </interface>
27394 -<interface name="dev_manage_smartcard" lineno="4212">
27395 +<interface name="dev_manage_smartcard" lineno="4230">
27396 <summary>
27397 Create, read, write, and delete smartcard devices.
27398 </summary>
27399 @@ -75152,7 +75782,7 @@ Domain allowed access.
27400 </summary>
27401 </param>
27402 </interface>
27403 -<interface name="dev_rw_sysdig" lineno="4230">
27404 +<interface name="dev_rw_sysdig" lineno="4248">
27405 <summary>
27406 Read, write and map the sysdig device.
27407 </summary>
27408 @@ -75162,9 +75792,9 @@ Domain allowed access.
27409 </summary>
27410 </param>
27411 </interface>
27412 -<interface name="dev_mounton_sysfs" lineno="4249">
27413 +<interface name="dev_mounton_sysfs" lineno="4267">
27414 <summary>
27415 -Mount a filesystem on sysfs.
27416 +Mount a filesystem on sysfs. (Deprecated)
27417 </summary>
27418 <param name="domain">
27419 <summary>
27420 @@ -75172,7 +75802,7 @@ Domain allow access.
27421 </summary>
27422 </param>
27423 </interface>
27424 -<interface name="dev_associate_sysfs" lineno="4267">
27425 +<interface name="dev_associate_sysfs" lineno="4282">
27426 <summary>
27427 Associate a file to a sysfs filesystem.
27428 </summary>
27429 @@ -75182,7 +75812,7 @@ The type of the file to be associated to sysfs.
27430 </summary>
27431 </param>
27432 </interface>
27433 -<interface name="dev_getattr_sysfs_dirs" lineno="4285">
27434 +<interface name="dev_getattr_sysfs_dirs" lineno="4300">
27435 <summary>
27436 Get the attributes of sysfs directories.
27437 </summary>
27438 @@ -75192,7 +75822,7 @@ Domain allowed access.
27439 </summary>
27440 </param>
27441 </interface>
27442 -<interface name="dev_getattr_sysfs" lineno="4303">
27443 +<interface name="dev_getattr_sysfs" lineno="4318">
27444 <summary>
27445 Get the attributes of sysfs filesystem
27446 </summary>
27447 @@ -75202,7 +75832,7 @@ Domain allowed access.
27448 </summary>
27449 </param>
27450 </interface>
27451 -<interface name="dev_mount_sysfs" lineno="4321">
27452 +<interface name="dev_mount_sysfs" lineno="4336">
27453 <summary>
27454 mount a sysfs filesystem
27455 </summary>
27456 @@ -75212,7 +75842,17 @@ Domain allowed access.
27457 </summary>
27458 </param>
27459 </interface>
27460 -<interface name="dev_dontaudit_getattr_sysfs" lineno="4339">
27461 +<interface name="dev_remount_sysfs" lineno="4354">
27462 +<summary>
27463 +Remount a sysfs filesystem.
27464 +</summary>
27465 +<param name="domain">
27466 +<summary>
27467 +Domain allow access.
27468 +</summary>
27469 +</param>
27470 +</interface>
27471 +<interface name="dev_dontaudit_getattr_sysfs" lineno="4372">
27472 <summary>
27473 Do not audit getting the attributes of sysfs filesystem
27474 </summary>
27475 @@ -75222,7 +75862,7 @@ Domain to dontaudit access from
27476 </summary>
27477 </param>
27478 </interface>
27479 -<interface name="dev_dontaudit_read_sysfs" lineno="4357">
27480 +<interface name="dev_dontaudit_read_sysfs" lineno="4390">
27481 <summary>
27482 Dont audit attempts to read hardware state information
27483 </summary>
27484 @@ -75232,9 +75872,9 @@ Domain for which the attempts do not need to be audited
27485 </summary>
27486 </param>
27487 </interface>
27488 -<interface name="dev_mounton_sysfs_dirs" lineno="4377">
27489 +<interface name="dev_mounton_sysfs_dirs" lineno="4410">
27490 <summary>
27491 -mounton sysfs directories.
27492 +Mount on sysfs directories.
27493 </summary>
27494 <param name="domain">
27495 <summary>
27496 @@ -75242,7 +75882,7 @@ Domain allowed access.
27497 </summary>
27498 </param>
27499 </interface>
27500 -<interface name="dev_search_sysfs" lineno="4395">
27501 +<interface name="dev_search_sysfs" lineno="4428">
27502 <summary>
27503 Search the sysfs directories.
27504 </summary>
27505 @@ -75252,7 +75892,7 @@ Domain allowed access.
27506 </summary>
27507 </param>
27508 </interface>
27509 -<interface name="dev_dontaudit_search_sysfs" lineno="4413">
27510 +<interface name="dev_dontaudit_search_sysfs" lineno="4446">
27511 <summary>
27512 Do not audit attempts to search sysfs.
27513 </summary>
27514 @@ -75262,7 +75902,7 @@ Domain to not audit.
27515 </summary>
27516 </param>
27517 </interface>
27518 -<interface name="dev_list_sysfs" lineno="4431">
27519 +<interface name="dev_list_sysfs" lineno="4464">
27520 <summary>
27521 List the contents of the sysfs directories.
27522 </summary>
27523 @@ -75272,7 +75912,7 @@ Domain allowed access.
27524 </summary>
27525 </param>
27526 </interface>
27527 -<interface name="dev_write_sysfs_dirs" lineno="4450">
27528 +<interface name="dev_write_sysfs_dirs" lineno="4483">
27529 <summary>
27530 Write in a sysfs directories.
27531 </summary>
27532 @@ -75282,7 +75922,7 @@ Domain allowed access.
27533 </summary>
27534 </param>
27535 </interface>
27536 -<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4468">
27537 +<interface name="dev_dontaudit_write_sysfs_dirs" lineno="4501">
27538 <summary>
27539 Do not audit attempts to write in a sysfs directory.
27540 </summary>
27541 @@ -75292,7 +75932,7 @@ Domain to not audit.
27542 </summary>
27543 </param>
27544 </interface>
27545 -<interface name="dev_dontaudit_write_sysfs_files" lineno="4486">
27546 +<interface name="dev_dontaudit_write_sysfs_files" lineno="4519">
27547 <summary>
27548 Do not audit attempts to write to a sysfs file.
27549 </summary>
27550 @@ -75302,7 +75942,7 @@ Domain to not audit.
27551 </summary>
27552 </param>
27553 </interface>
27554 -<interface name="dev_manage_sysfs_dirs" lineno="4505">
27555 +<interface name="dev_manage_sysfs_dirs" lineno="4538">
27556 <summary>
27557 Create, read, write, and delete sysfs
27558 directories.
27559 @@ -75313,7 +75953,7 @@ Domain allowed access.
27560 </summary>
27561 </param>
27562 </interface>
27563 -<interface name="dev_read_sysfs" lineno="4532">
27564 +<interface name="dev_read_sysfs" lineno="4565">
27565 <summary>
27566 Read hardware state information.
27567 </summary>
27568 @@ -75332,7 +75972,7 @@ Domain allowed access.
27569 </param>
27570 <infoflow type="read" weight="10"/>
27571 </interface>
27572 -<interface name="dev_write_sysfs" lineno="4560">
27573 +<interface name="dev_write_sysfs" lineno="4593">
27574 <summary>
27575 Write to hardware state information.
27576 </summary>
27577 @@ -75349,7 +75989,7 @@ Domain allowed access.
27578 </param>
27579 <infoflow type="read" weight="10"/>
27580 </interface>
27581 -<interface name="dev_rw_sysfs" lineno="4579">
27582 +<interface name="dev_rw_sysfs" lineno="4612">
27583 <summary>
27584 Allow caller to modify hardware state information.
27585 </summary>
27586 @@ -75359,7 +75999,7 @@ Domain allowed access.
27587 </summary>
27588 </param>
27589 </interface>
27590 -<interface name="dev_create_sysfs_files" lineno="4600">
27591 +<interface name="dev_create_sysfs_files" lineno="4633">
27592 <summary>
27593 Add a sysfs file
27594 </summary>
27595 @@ -75369,7 +76009,7 @@ Domain allowed access.
27596 </summary>
27597 </param>
27598 </interface>
27599 -<interface name="dev_relabel_sysfs_dirs" lineno="4618">
27600 +<interface name="dev_relabel_sysfs_dirs" lineno="4651">
27601 <summary>
27602 Relabel hardware state directories.
27603 </summary>
27604 @@ -75379,7 +76019,7 @@ Domain allowed access.
27605 </summary>
27606 </param>
27607 </interface>
27608 -<interface name="dev_relabel_all_sysfs" lineno="4636">
27609 +<interface name="dev_relabel_all_sysfs" lineno="4669">
27610 <summary>
27611 Relabel from/to all sysfs types.
27612 </summary>
27613 @@ -75389,7 +76029,7 @@ Domain allowed access.
27614 </summary>
27615 </param>
27616 </interface>
27617 -<interface name="dev_setattr_all_sysfs" lineno="4656">
27618 +<interface name="dev_setattr_all_sysfs" lineno="4689">
27619 <summary>
27620 Set the attributes of sysfs files, directories and symlinks.
27621 </summary>
27622 @@ -75399,7 +76039,7 @@ Domain allowed access.
27623 </summary>
27624 </param>
27625 </interface>
27626 -<interface name="dev_rw_tpm" lineno="4676">
27627 +<interface name="dev_rw_tpm" lineno="4709">
27628 <summary>
27629 Read and write the TPM device.
27630 </summary>
27631 @@ -75409,7 +76049,7 @@ Domain allowed access.
27632 </summary>
27633 </param>
27634 </interface>
27635 -<interface name="dev_read_urand" lineno="4717">
27636 +<interface name="dev_read_urand" lineno="4750">
27637 <summary>
27638 Read from pseudo random number generator devices (e.g., /dev/urandom).
27639 </summary>
27640 @@ -75442,7 +76082,7 @@ Domain allowed access.
27641 </param>
27642 <infoflow type="read" weight="10"/>
27643 </interface>
27644 -<interface name="dev_dontaudit_read_urand" lineno="4736">
27645 +<interface name="dev_dontaudit_read_urand" lineno="4769">
27646 <summary>
27647 Do not audit attempts to read from pseudo
27648 random devices (e.g., /dev/urandom)
27649 @@ -75453,7 +76093,7 @@ Domain to not audit.
27650 </summary>
27651 </param>
27652 </interface>
27653 -<interface name="dev_write_urand" lineno="4755">
27654 +<interface name="dev_write_urand" lineno="4788">
27655 <summary>
27656 Write to the pseudo random device (e.g., /dev/urandom). This
27657 sets the random number generator seed.
27658 @@ -75464,7 +76104,7 @@ Domain allowed access.
27659 </summary>
27660 </param>
27661 </interface>
27662 -<interface name="dev_create_urand_dev" lineno="4773">
27663 +<interface name="dev_create_urand_dev" lineno="4806">
27664 <summary>
27665 Create the urandom device (/dev/urandom).
27666 </summary>
27667 @@ -75474,7 +76114,7 @@ Domain allowed access.
27668 </summary>
27669 </param>
27670 </interface>
27671 -<interface name="dev_getattr_generic_usb_dev" lineno="4791">
27672 +<interface name="dev_getattr_generic_usb_dev" lineno="4824">
27673 <summary>
27674 Getattr generic the USB devices.
27675 </summary>
27676 @@ -75484,7 +76124,7 @@ Domain allowed access.
27677 </summary>
27678 </param>
27679 </interface>
27680 -<interface name="dev_setattr_generic_usb_dev" lineno="4809">
27681 +<interface name="dev_setattr_generic_usb_dev" lineno="4842">
27682 <summary>
27683 Setattr generic the USB devices.
27684 </summary>
27685 @@ -75494,7 +76134,7 @@ Domain allowed access.
27686 </summary>
27687 </param>
27688 </interface>
27689 -<interface name="dev_read_generic_usb_dev" lineno="4827">
27690 +<interface name="dev_read_generic_usb_dev" lineno="4860">
27691 <summary>
27692 Read generic the USB devices.
27693 </summary>
27694 @@ -75504,7 +76144,7 @@ Domain allowed access.
27695 </summary>
27696 </param>
27697 </interface>
27698 -<interface name="dev_rw_generic_usb_dev" lineno="4845">
27699 +<interface name="dev_rw_generic_usb_dev" lineno="4878">
27700 <summary>
27701 Read and write generic the USB devices.
27702 </summary>
27703 @@ -75514,7 +76154,7 @@ Domain allowed access.
27704 </summary>
27705 </param>
27706 </interface>
27707 -<interface name="dev_relabel_generic_usb_dev" lineno="4863">
27708 +<interface name="dev_relabel_generic_usb_dev" lineno="4896">
27709 <summary>
27710 Relabel generic the USB devices.
27711 </summary>
27712 @@ -75524,7 +76164,7 @@ Domain allowed access.
27713 </summary>
27714 </param>
27715 </interface>
27716 -<interface name="dev_read_usbmon_dev" lineno="4881">
27717 +<interface name="dev_read_usbmon_dev" lineno="4914">
27718 <summary>
27719 Read USB monitor devices.
27720 </summary>
27721 @@ -75534,7 +76174,7 @@ Domain allowed access.
27722 </summary>
27723 </param>
27724 </interface>
27725 -<interface name="dev_write_usbmon_dev" lineno="4899">
27726 +<interface name="dev_write_usbmon_dev" lineno="4932">
27727 <summary>
27728 Write USB monitor devices.
27729 </summary>
27730 @@ -75544,7 +76184,7 @@ Domain allowed access.
27731 </summary>
27732 </param>
27733 </interface>
27734 -<interface name="dev_mount_usbfs" lineno="4917">
27735 +<interface name="dev_mount_usbfs" lineno="4950">
27736 <summary>
27737 Mount a usbfs filesystem.
27738 </summary>
27739 @@ -75554,7 +76194,7 @@ Domain allowed access.
27740 </summary>
27741 </param>
27742 </interface>
27743 -<interface name="dev_associate_usbfs" lineno="4935">
27744 +<interface name="dev_associate_usbfs" lineno="4968">
27745 <summary>
27746 Associate a file to a usbfs filesystem.
27747 </summary>
27748 @@ -75564,7 +76204,7 @@ The type of the file to be associated to usbfs.
27749 </summary>
27750 </param>
27751 </interface>
27752 -<interface name="dev_getattr_usbfs_dirs" lineno="4953">
27753 +<interface name="dev_getattr_usbfs_dirs" lineno="4986">
27754 <summary>
27755 Get the attributes of a directory in the usb filesystem.
27756 </summary>
27757 @@ -75574,7 +76214,7 @@ Domain allowed access.
27758 </summary>
27759 </param>
27760 </interface>
27761 -<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="4972">
27762 +<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="5005">
27763 <summary>
27764 Do not audit attempts to get the attributes
27765 of a directory in the usb filesystem.
27766 @@ -75585,7 +76225,7 @@ Domain to not audit.
27767 </summary>
27768 </param>
27769 </interface>
27770 -<interface name="dev_search_usbfs" lineno="4990">
27771 +<interface name="dev_search_usbfs" lineno="5023">
27772 <summary>
27773 Search the directory containing USB hardware information.
27774 </summary>
27775 @@ -75595,7 +76235,7 @@ Domain allowed access.
27776 </summary>
27777 </param>
27778 </interface>
27779 -<interface name="dev_list_usbfs" lineno="5008">
27780 +<interface name="dev_list_usbfs" lineno="5041">
27781 <summary>
27782 Allow caller to get a list of usb hardware.
27783 </summary>
27784 @@ -75605,7 +76245,7 @@ Domain allowed access.
27785 </summary>
27786 </param>
27787 </interface>
27788 -<interface name="dev_setattr_usbfs_files" lineno="5029">
27789 +<interface name="dev_setattr_usbfs_files" lineno="5062">
27790 <summary>
27791 Set the attributes of usbfs filesystem.
27792 </summary>
27793 @@ -75615,7 +76255,7 @@ Domain allowed access.
27794 </summary>
27795 </param>
27796 </interface>
27797 -<interface name="dev_read_usbfs" lineno="5049">
27798 +<interface name="dev_read_usbfs" lineno="5082">
27799 <summary>
27800 Read USB hardware information using
27801 the usbfs filesystem interface.
27802 @@ -75626,7 +76266,7 @@ Domain allowed access.
27803 </summary>
27804 </param>
27805 </interface>
27806 -<interface name="dev_rw_usbfs" lineno="5069">
27807 +<interface name="dev_rw_usbfs" lineno="5102">
27808 <summary>
27809 Allow caller to modify usb hardware configuration files.
27810 </summary>
27811 @@ -75636,7 +76276,7 @@ Domain allowed access.
27812 </summary>
27813 </param>
27814 </interface>
27815 -<interface name="dev_getattr_video_dev" lineno="5089">
27816 +<interface name="dev_getattr_video_dev" lineno="5122">
27817 <summary>
27818 Get the attributes of video4linux devices.
27819 </summary>
27820 @@ -75646,7 +76286,7 @@ Domain allowed access.
27821 </summary>
27822 </param>
27823 </interface>
27824 -<interface name="dev_rw_userio_dev" lineno="5107">
27825 +<interface name="dev_rw_userio_dev" lineno="5140">
27826 <summary>
27827 Read and write userio device.
27828 </summary>
27829 @@ -75656,7 +76296,7 @@ Domain allowed access.
27830 </summary>
27831 </param>
27832 </interface>
27833 -<interface name="dev_dontaudit_getattr_video_dev" lineno="5126">
27834 +<interface name="dev_dontaudit_getattr_video_dev" lineno="5159">
27835 <summary>
27836 Do not audit attempts to get the attributes
27837 of video4linux device nodes.
27838 @@ -75667,7 +76307,7 @@ Domain to not audit.
27839 </summary>
27840 </param>
27841 </interface>
27842 -<interface name="dev_setattr_video_dev" lineno="5144">
27843 +<interface name="dev_setattr_video_dev" lineno="5177">
27844 <summary>
27845 Set the attributes of video4linux device nodes.
27846 </summary>
27847 @@ -75677,7 +76317,7 @@ Domain allowed access.
27848 </summary>
27849 </param>
27850 </interface>
27851 -<interface name="dev_dontaudit_setattr_video_dev" lineno="5163">
27852 +<interface name="dev_dontaudit_setattr_video_dev" lineno="5196">
27853 <summary>
27854 Do not audit attempts to set the attributes
27855 of video4linux device nodes.
27856 @@ -75688,7 +76328,7 @@ Domain to not audit.
27857 </summary>
27858 </param>
27859 </interface>
27860 -<interface name="dev_read_video_dev" lineno="5181">
27861 +<interface name="dev_read_video_dev" lineno="5214">
27862 <summary>
27863 Read the video4linux devices.
27864 </summary>
27865 @@ -75698,7 +76338,7 @@ Domain allowed access.
27866 </summary>
27867 </param>
27868 </interface>
27869 -<interface name="dev_write_video_dev" lineno="5199">
27870 +<interface name="dev_write_video_dev" lineno="5232">
27871 <summary>
27872 Write the video4linux devices.
27873 </summary>
27874 @@ -75708,7 +76348,7 @@ Domain allowed access.
27875 </summary>
27876 </param>
27877 </interface>
27878 -<interface name="dev_rw_vfio_dev" lineno="5217">
27879 +<interface name="dev_rw_vfio_dev" lineno="5250">
27880 <summary>
27881 Read and write vfio devices.
27882 </summary>
27883 @@ -75718,7 +76358,7 @@ Domain allowed access.
27884 </summary>
27885 </param>
27886 </interface>
27887 -<interface name="dev_relabelfrom_vfio_dev" lineno="5235">
27888 +<interface name="dev_relabelfrom_vfio_dev" lineno="5268">
27889 <summary>
27890 Relabel vfio devices.
27891 </summary>
27892 @@ -75728,7 +76368,7 @@ Domain allowed access.
27893 </summary>
27894 </param>
27895 </interface>
27896 -<interface name="dev_rw_vhost" lineno="5253">
27897 +<interface name="dev_rw_vhost" lineno="5286">
27898 <summary>
27899 Allow read/write the vhost devices
27900 </summary>
27901 @@ -75738,7 +76378,7 @@ Domain allowed access.
27902 </summary>
27903 </param>
27904 </interface>
27905 -<interface name="dev_rw_vmware" lineno="5271">
27906 +<interface name="dev_rw_vmware" lineno="5304">
27907 <summary>
27908 Read and write VMWare devices.
27909 </summary>
27910 @@ -75748,7 +76388,7 @@ Domain allowed access.
27911 </summary>
27912 </param>
27913 </interface>
27914 -<interface name="dev_rwx_vmware" lineno="5289">
27915 +<interface name="dev_rwx_vmware" lineno="5322">
27916 <summary>
27917 Read, write, and mmap VMWare devices.
27918 </summary>
27919 @@ -75758,7 +76398,7 @@ Domain allowed access.
27920 </summary>
27921 </param>
27922 </interface>
27923 -<interface name="dev_read_watchdog" lineno="5308">
27924 +<interface name="dev_read_watchdog" lineno="5341">
27925 <summary>
27926 Read from watchdog devices.
27927 </summary>
27928 @@ -75768,7 +76408,7 @@ Domain allowed access.
27929 </summary>
27930 </param>
27931 </interface>
27932 -<interface name="dev_write_watchdog" lineno="5326">
27933 +<interface name="dev_write_watchdog" lineno="5359">
27934 <summary>
27935 Write to watchdog devices.
27936 </summary>
27937 @@ -75778,7 +76418,7 @@ Domain allowed access.
27938 </summary>
27939 </param>
27940 </interface>
27941 -<interface name="dev_read_wireless" lineno="5344">
27942 +<interface name="dev_read_wireless" lineno="5377">
27943 <summary>
27944 Read the wireless device.
27945 </summary>
27946 @@ -75788,7 +76428,7 @@ Domain allowed access.
27947 </summary>
27948 </param>
27949 </interface>
27950 -<interface name="dev_rw_wireless" lineno="5362">
27951 +<interface name="dev_rw_wireless" lineno="5395">
27952 <summary>
27953 Read and write the the wireless device.
27954 </summary>
27955 @@ -75798,7 +76438,7 @@ Domain allowed access.
27956 </summary>
27957 </param>
27958 </interface>
27959 -<interface name="dev_manage_wireless" lineno="5380">
27960 +<interface name="dev_manage_wireless" lineno="5413">
27961 <summary>
27962 manage the wireless device.
27963 </summary>
27964 @@ -75808,7 +76448,7 @@ Domain allowed access.
27965 </summary>
27966 </param>
27967 </interface>
27968 -<interface name="dev_rw_xen" lineno="5398">
27969 +<interface name="dev_rw_xen" lineno="5431">
27970 <summary>
27971 Read and write Xen devices.
27972 </summary>
27973 @@ -75818,7 +76458,7 @@ Domain allowed access.
27974 </summary>
27975 </param>
27976 </interface>
27977 -<interface name="dev_manage_xen" lineno="5417">
27978 +<interface name="dev_manage_xen" lineno="5450">
27979 <summary>
27980 Create, read, write, and delete Xen devices.
27981 </summary>
27982 @@ -75828,7 +76468,7 @@ Domain allowed access.
27983 </summary>
27984 </param>
27985 </interface>
27986 -<interface name="dev_filetrans_xen" lineno="5441">
27987 +<interface name="dev_filetrans_xen" lineno="5474">
27988 <summary>
27989 Automatic type transition to the type
27990 for xen device nodes when created in /dev.
27991 @@ -75844,7 +76484,7 @@ The name of the object being created.
27992 </summary>
27993 </param>
27994 </interface>
27995 -<interface name="dev_getattr_xserver_misc_dev" lineno="5459">
27996 +<interface name="dev_getattr_xserver_misc_dev" lineno="5492">
27997 <summary>
27998 Get the attributes of X server miscellaneous devices.
27999 </summary>
28000 @@ -75854,7 +76494,7 @@ Domain allowed access.
28001 </summary>
28002 </param>
28003 </interface>
28004 -<interface name="dev_setattr_xserver_misc_dev" lineno="5477">
28005 +<interface name="dev_setattr_xserver_misc_dev" lineno="5510">
28006 <summary>
28007 Set the attributes of X server miscellaneous devices.
28008 </summary>
28009 @@ -75864,7 +76504,7 @@ Domain allowed access.
28010 </summary>
28011 </param>
28012 </interface>
28013 -<interface name="dev_rw_xserver_misc" lineno="5495">
28014 +<interface name="dev_rw_xserver_misc" lineno="5528">
28015 <summary>
28016 Read and write X server miscellaneous devices.
28017 </summary>
28018 @@ -75874,7 +76514,7 @@ Domain allowed access.
28019 </summary>
28020 </param>
28021 </interface>
28022 -<interface name="dev_map_xserver_misc" lineno="5513">
28023 +<interface name="dev_map_xserver_misc" lineno="5546">
28024 <summary>
28025 Map X server miscellaneous devices.
28026 </summary>
28027 @@ -75884,7 +76524,7 @@ Domain allowed access.
28028 </summary>
28029 </param>
28030 </interface>
28031 -<interface name="dev_rw_zero" lineno="5531">
28032 +<interface name="dev_rw_zero" lineno="5564">
28033 <summary>
28034 Read and write to the zero device (/dev/zero).
28035 </summary>
28036 @@ -75894,7 +76534,7 @@ Domain allowed access.
28037 </summary>
28038 </param>
28039 </interface>
28040 -<interface name="dev_rwx_zero" lineno="5549">
28041 +<interface name="dev_rwx_zero" lineno="5582">
28042 <summary>
28043 Read, write, and execute the zero device (/dev/zero).
28044 </summary>
28045 @@ -75904,7 +76544,7 @@ Domain allowed access.
28046 </summary>
28047 </param>
28048 </interface>
28049 -<interface name="dev_execmod_zero" lineno="5568">
28050 +<interface name="dev_execmod_zero" lineno="5601">
28051 <summary>
28052 Execmod the zero device (/dev/zero).
28053 </summary>
28054 @@ -75914,7 +76554,7 @@ Domain allowed access.
28055 </summary>
28056 </param>
28057 </interface>
28058 -<interface name="dev_create_zero_dev" lineno="5587">
28059 +<interface name="dev_create_zero_dev" lineno="5620">
28060 <summary>
28061 Create the zero device (/dev/zero).
28062 </summary>
28063 @@ -75924,7 +76564,7 @@ Domain allowed access.
28064 </summary>
28065 </param>
28066 </interface>
28067 -<interface name="dev_read_cpu_online" lineno="5610">
28068 +<interface name="dev_read_cpu_online" lineno="5643">
28069 <summary>
28070 Read cpu online hardware state information
28071 </summary>
28072 @@ -75939,7 +76579,7 @@ Domain allowed access.
28073 </summary>
28074 </param>
28075 </interface>
28076 -<interface name="dev_unconfined" lineno="5630">
28077 +<interface name="dev_unconfined" lineno="5663">
28078 <summary>
28079 Unconfined access to devices.
28080 </summary>
28081 @@ -75949,7 +76589,7 @@ Domain allowed access.
28082 </summary>
28083 </param>
28084 </interface>
28085 -<interface name="dev_relabel_cpu_online" lineno="5650">
28086 +<interface name="dev_relabel_cpu_online" lineno="5683">
28087 <summary>
28088 Relabel cpu online hardware state information.
28089 </summary>
28090 @@ -75959,7 +76599,7 @@ Domain allowed access.
28091 </summary>
28092 </param>
28093 </interface>
28094 -<interface name="dev_dontaudit_read_usbmon_dev" lineno="5669">
28095 +<interface name="dev_dontaudit_read_usbmon_dev" lineno="5702">
28096 <summary>
28097 Dont audit attempts to read usbmon devices
28098 </summary>
28099 @@ -83030,7 +83670,17 @@ Domain allowed access.
28100 </summary>
28101 </param>
28102 </interface>
28103 -<interface name="fs_mounton_fusefs" lineno="2319">
28104 +<interface name="fs_remount_fusefs" lineno="2319">
28105 +<summary>
28106 +Remount a FUSE filesystem.
28107 +</summary>
28108 +<param name="domain">
28109 +<summary>
28110 +Domain allowed access.
28111 +</summary>
28112 +</param>
28113 +</interface>
28114 +<interface name="fs_mounton_fusefs" lineno="2337">
28115 <summary>
28116 Mounton a FUSEFS filesystem.
28117 </summary>
28118 @@ -83040,7 +83690,43 @@ Domain allowed access.
28119 </summary>
28120 </param>
28121 </interface>
28122 -<interface name="fs_search_fusefs" lineno="2339">
28123 +<interface name="fs_fusefs_entry_type" lineno="2356">
28124 +<summary>
28125 +Make FUSEFS files an entrypoint for the
28126 +specified domain.
28127 +</summary>
28128 +<param name="domain">
28129 +<summary>
28130 +The domain for which fusefs_t is an entrypoint.
28131 +</summary>
28132 +</param>
28133 +</interface>
28134 +<interface name="fs_fusefs_domtrans" lineno="2389">
28135 +<summary>
28136 +Execute FUSEFS files in a specified domain.
28137 +</summary>
28138 +<desc>
28139 +<p>
28140 +Execute FUSEFS files in a specified domain.
28141 +</p>
28142 +<p>
28143 +No interprocess communication (signals, pipes,
28144 +etc.) is provided by this interface since
28145 +the domains are not owned by this module.
28146 +</p>
28147 +</desc>
28148 +<param name="source_domain">
28149 +<summary>
28150 +Domain allowed to transition.
28151 +</summary>
28152 +</param>
28153 +<param name="target_domain">
28154 +<summary>
28155 +Domain to transition to.
28156 +</summary>
28157 +</param>
28158 +</interface>
28159 +<interface name="fs_search_fusefs" lineno="2409">
28160 <summary>
28161 Search directories
28162 on a FUSEFS filesystem.
28163 @@ -83052,7 +83738,7 @@ Domain allowed access.
28164 </param>
28165 <rolecap/>
28166 </interface>
28167 -<interface name="fs_dontaudit_list_fusefs" lineno="2358">
28168 +<interface name="fs_dontaudit_list_fusefs" lineno="2428">
28169 <summary>
28170 Do not audit attempts to list the contents
28171 of directories on a FUSEFS filesystem.
28172 @@ -83063,7 +83749,7 @@ Domain to not audit.
28173 </summary>
28174 </param>
28175 </interface>
28176 -<interface name="fs_manage_fusefs_dirs" lineno="2378">
28177 +<interface name="fs_manage_fusefs_dirs" lineno="2448">
28178 <summary>
28179 Create, read, write, and delete directories
28180 on a FUSEFS filesystem.
28181 @@ -83075,7 +83761,7 @@ Domain allowed access.
28182 </param>
28183 <rolecap/>
28184 </interface>
28185 -<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2398">
28186 +<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2468">
28187 <summary>
28188 Do not audit attempts to create, read,
28189 write, and delete directories
28190 @@ -83087,7 +83773,7 @@ Domain to not audit.
28191 </summary>
28192 </param>
28193 </interface>
28194 -<interface name="fs_read_fusefs_files" lineno="2417">
28195 +<interface name="fs_read_fusefs_files" lineno="2487">
28196 <summary>
28197 Read, a FUSEFS filesystem.
28198 </summary>
28199 @@ -83098,7 +83784,7 @@ Domain allowed access.
28200 </param>
28201 <rolecap/>
28202 </interface>
28203 -<interface name="fs_exec_fusefs_files" lineno="2436">
28204 +<interface name="fs_exec_fusefs_files" lineno="2506">
28205 <summary>
28206 Execute files on a FUSEFS filesystem.
28207 </summary>
28208 @@ -83109,7 +83795,7 @@ Domain allowed access.
28209 </param>
28210 <rolecap/>
28211 </interface>
28212 -<interface name="fs_manage_fusefs_files" lineno="2456">
28213 +<interface name="fs_manage_fusefs_files" lineno="2526">
28214 <summary>
28215 Create, read, write, and delete files
28216 on a FUSEFS filesystem.
28217 @@ -83121,7 +83807,7 @@ Domain allowed access.
28218 </param>
28219 <rolecap/>
28220 </interface>
28221 -<interface name="fs_dontaudit_manage_fusefs_files" lineno="2476">
28222 +<interface name="fs_dontaudit_manage_fusefs_files" lineno="2546">
28223 <summary>
28224 Do not audit attempts to create,
28225 read, write, and delete files
28226 @@ -83133,7 +83819,7 @@ Domain to not audit.
28227 </summary>
28228 </param>
28229 </interface>
28230 -<interface name="fs_read_fusefs_symlinks" lineno="2494">
28231 +<interface name="fs_read_fusefs_symlinks" lineno="2564">
28232 <summary>
28233 Read symbolic links on a FUSEFS filesystem.
28234 </summary>
28235 @@ -83143,7 +83829,18 @@ Domain allowed access.
28236 </summary>
28237 </param>
28238 </interface>
28239 -<interface name="fs_getattr_hugetlbfs" lineno="2514">
28240 +<interface name="fs_manage_fusefs_symlinks" lineno="2584">
28241 +<summary>
28242 +Manage symlinks on a FUSEFS filesystem.
28243 +</summary>
28244 +<param name="domain">
28245 +<summary>
28246 +Domain allowed access.
28247 +</summary>
28248 +</param>
28249 +<rolecap/>
28250 +</interface>
28251 +<interface name="fs_getattr_hugetlbfs" lineno="2603">
28252 <summary>
28253 Get the attributes of an hugetlbfs
28254 filesystem.
28255 @@ -83154,7 +83851,7 @@ Domain allowed access.
28256 </summary>
28257 </param>
28258 </interface>
28259 -<interface name="fs_list_hugetlbfs" lineno="2532">
28260 +<interface name="fs_list_hugetlbfs" lineno="2621">
28261 <summary>
28262 List hugetlbfs.
28263 </summary>
28264 @@ -83164,7 +83861,7 @@ Domain allowed access.
28265 </summary>
28266 </param>
28267 </interface>
28268 -<interface name="fs_manage_hugetlbfs_dirs" lineno="2550">
28269 +<interface name="fs_manage_hugetlbfs_dirs" lineno="2639">
28270 <summary>
28271 Manage hugetlbfs dirs.
28272 </summary>
28273 @@ -83174,7 +83871,7 @@ Domain allowed access.
28274 </summary>
28275 </param>
28276 </interface>
28277 -<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2568">
28278 +<interface name="fs_rw_inherited_hugetlbfs_files" lineno="2657">
28279 <summary>
28280 Read and write inherited hugetlbfs files.
28281 </summary>
28282 @@ -83184,7 +83881,7 @@ Domain allowed access.
28283 </summary>
28284 </param>
28285 </interface>
28286 -<interface name="fs_rw_hugetlbfs_files" lineno="2586">
28287 +<interface name="fs_rw_hugetlbfs_files" lineno="2675">
28288 <summary>
28289 Read and write hugetlbfs files.
28290 </summary>
28291 @@ -83194,7 +83891,7 @@ Domain allowed access.
28292 </summary>
28293 </param>
28294 </interface>
28295 -<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2604">
28296 +<interface name="fs_mmap_rw_hugetlbfs_files" lineno="2693">
28297 <summary>
28298 Read, map and write hugetlbfs files.
28299 </summary>
28300 @@ -83204,7 +83901,7 @@ Domain allowed access.
28301 </summary>
28302 </param>
28303 </interface>
28304 -<interface name="fs_associate_hugetlbfs" lineno="2623">
28305 +<interface name="fs_associate_hugetlbfs" lineno="2712">
28306 <summary>
28307 Allow the type to associate to hugetlbfs filesystems.
28308 </summary>
28309 @@ -83214,7 +83911,7 @@ The type of the object to be associated.
28310 </summary>
28311 </param>
28312 </interface>
28313 -<interface name="fs_search_inotifyfs" lineno="2641">
28314 +<interface name="fs_search_inotifyfs" lineno="2730">
28315 <summary>
28316 Search inotifyfs filesystem.
28317 </summary>
28318 @@ -83224,7 +83921,7 @@ Domain allowed access.
28319 </summary>
28320 </param>
28321 </interface>
28322 -<interface name="fs_list_inotifyfs" lineno="2659">
28323 +<interface name="fs_list_inotifyfs" lineno="2748">
28324 <summary>
28325 List inotifyfs filesystem.
28326 </summary>
28327 @@ -83234,7 +83931,7 @@ Domain allowed access.
28328 </summary>
28329 </param>
28330 </interface>
28331 -<interface name="fs_dontaudit_list_inotifyfs" lineno="2677">
28332 +<interface name="fs_dontaudit_list_inotifyfs" lineno="2766">
28333 <summary>
28334 Dontaudit List inotifyfs filesystem.
28335 </summary>
28336 @@ -83244,7 +83941,7 @@ Domain to not audit.
28337 </summary>
28338 </param>
28339 </interface>
28340 -<interface name="fs_hugetlbfs_filetrans" lineno="2711">
28341 +<interface name="fs_hugetlbfs_filetrans" lineno="2800">
28342 <summary>
28343 Create an object in a hugetlbfs filesystem, with a private
28344 type using a type transition.
28345 @@ -83270,7 +83967,7 @@ The name of the object being created.
28346 </summary>
28347 </param>
28348 </interface>
28349 -<interface name="fs_mount_iso9660_fs" lineno="2731">
28350 +<interface name="fs_mount_iso9660_fs" lineno="2820">
28351 <summary>
28352 Mount an iso9660 filesystem, which
28353 is usually used on CDs.
28354 @@ -83281,7 +83978,7 @@ Domain allowed access.
28355 </summary>
28356 </param>
28357 </interface>
28358 -<interface name="fs_remount_iso9660_fs" lineno="2751">
28359 +<interface name="fs_remount_iso9660_fs" lineno="2840">
28360 <summary>
28361 Remount an iso9660 filesystem, which
28362 is usually used on CDs. This allows
28363 @@ -83293,7 +83990,7 @@ Domain allowed access.
28364 </summary>
28365 </param>
28366 </interface>
28367 -<interface name="fs_relabelfrom_iso9660_fs" lineno="2770">
28368 +<interface name="fs_relabelfrom_iso9660_fs" lineno="2859">
28369 <summary>
28370 Allow changing of the label of a
28371 filesystem with iso9660 type
28372 @@ -83304,7 +84001,7 @@ Domain allowed access.
28373 </summary>
28374 </param>
28375 </interface>
28376 -<interface name="fs_unmount_iso9660_fs" lineno="2789">
28377 +<interface name="fs_unmount_iso9660_fs" lineno="2878">
28378 <summary>
28379 Unmount an iso9660 filesystem, which
28380 is usually used on CDs.
28381 @@ -83315,7 +84012,7 @@ Domain allowed access.
28382 </summary>
28383 </param>
28384 </interface>
28385 -<interface name="fs_getattr_iso9660_fs" lineno="2809">
28386 +<interface name="fs_getattr_iso9660_fs" lineno="2898">
28387 <summary>
28388 Get the attributes of an iso9660
28389 filesystem, which is usually used on CDs.
28390 @@ -83327,7 +84024,7 @@ Domain allowed access.
28391 </param>
28392 <rolecap/>
28393 </interface>
28394 -<interface name="fs_getattr_iso9660_files" lineno="2828">
28395 +<interface name="fs_getattr_iso9660_files" lineno="2917">
28396 <summary>
28397 Get the attributes of files on an iso9660
28398 filesystem, which is usually used on CDs.
28399 @@ -83338,7 +84035,7 @@ Domain allowed access.
28400 </summary>
28401 </param>
28402 </interface>
28403 -<interface name="fs_read_iso9660_files" lineno="2848">
28404 +<interface name="fs_read_iso9660_files" lineno="2937">
28405 <summary>
28406 Read files on an iso9660 filesystem, which
28407 is usually used on CDs.
28408 @@ -83349,7 +84046,7 @@ Domain allowed access.
28409 </summary>
28410 </param>
28411 </interface>
28412 -<interface name="fs_mount_nfs" lineno="2868">
28413 +<interface name="fs_mount_nfs" lineno="2957">
28414 <summary>
28415 Mount a NFS filesystem.
28416 </summary>
28417 @@ -83359,7 +84056,7 @@ Domain allowed access.
28418 </summary>
28419 </param>
28420 </interface>
28421 -<interface name="fs_remount_nfs" lineno="2887">
28422 +<interface name="fs_remount_nfs" lineno="2976">
28423 <summary>
28424 Remount a NFS filesystem. This allows
28425 some mount options to be changed.
28426 @@ -83370,7 +84067,7 @@ Domain allowed access.
28427 </summary>
28428 </param>
28429 </interface>
28430 -<interface name="fs_unmount_nfs" lineno="2905">
28431 +<interface name="fs_unmount_nfs" lineno="2994">
28432 <summary>
28433 Unmount a NFS filesystem.
28434 </summary>
28435 @@ -83380,7 +84077,7 @@ Domain allowed access.
28436 </summary>
28437 </param>
28438 </interface>
28439 -<interface name="fs_getattr_nfs" lineno="2924">
28440 +<interface name="fs_getattr_nfs" lineno="3013">
28441 <summary>
28442 Get the attributes of a NFS filesystem.
28443 </summary>
28444 @@ -83391,7 +84088,7 @@ Domain allowed access.
28445 </param>
28446 <rolecap/>
28447 </interface>
28448 -<interface name="fs_search_nfs" lineno="2942">
28449 +<interface name="fs_search_nfs" lineno="3031">
28450 <summary>
28451 Search directories on a NFS filesystem.
28452 </summary>
28453 @@ -83401,7 +84098,7 @@ Domain allowed access.
28454 </summary>
28455 </param>
28456 </interface>
28457 -<interface name="fs_list_nfs" lineno="2960">
28458 +<interface name="fs_list_nfs" lineno="3049">
28459 <summary>
28460 List NFS filesystem.
28461 </summary>
28462 @@ -83411,7 +84108,7 @@ Domain allowed access.
28463 </summary>
28464 </param>
28465 </interface>
28466 -<interface name="fs_dontaudit_list_nfs" lineno="2979">
28467 +<interface name="fs_dontaudit_list_nfs" lineno="3068">
28468 <summary>
28469 Do not audit attempts to list the contents
28470 of directories on a NFS filesystem.
28471 @@ -83422,7 +84119,7 @@ Domain to not audit.
28472 </summary>
28473 </param>
28474 </interface>
28475 -<interface name="fs_mounton_nfs" lineno="2997">
28476 +<interface name="fs_mounton_nfs" lineno="3086">
28477 <summary>
28478 Mounton a NFS filesystem.
28479 </summary>
28480 @@ -83432,7 +84129,7 @@ Domain allowed access.
28481 </summary>
28482 </param>
28483 </interface>
28484 -<interface name="fs_read_nfs_files" lineno="3016">
28485 +<interface name="fs_read_nfs_files" lineno="3105">
28486 <summary>
28487 Read files on a NFS filesystem.
28488 </summary>
28489 @@ -83443,7 +84140,7 @@ Domain allowed access.
28490 </param>
28491 <rolecap/>
28492 </interface>
28493 -<interface name="fs_dontaudit_read_nfs_files" lineno="3036">
28494 +<interface name="fs_dontaudit_read_nfs_files" lineno="3125">
28495 <summary>
28496 Do not audit attempts to read
28497 files on a NFS filesystem.
28498 @@ -83454,7 +84151,7 @@ Domain to not audit.
28499 </summary>
28500 </param>
28501 </interface>
28502 -<interface name="fs_write_nfs_files" lineno="3054">
28503 +<interface name="fs_write_nfs_files" lineno="3143">
28504 <summary>
28505 Read files on a NFS filesystem.
28506 </summary>
28507 @@ -83464,7 +84161,7 @@ Domain allowed access.
28508 </summary>
28509 </param>
28510 </interface>
28511 -<interface name="fs_exec_nfs_files" lineno="3074">
28512 +<interface name="fs_exec_nfs_files" lineno="3163">
28513 <summary>
28514 Execute files on a NFS filesystem.
28515 </summary>
28516 @@ -83475,7 +84172,7 @@ Domain allowed access.
28517 </param>
28518 <rolecap/>
28519 </interface>
28520 -<interface name="fs_append_nfs_files" lineno="3095">
28521 +<interface name="fs_append_nfs_files" lineno="3184">
28522 <summary>
28523 Append files
28524 on a NFS filesystem.
28525 @@ -83487,7 +84184,7 @@ Domain allowed access.
28526 </param>
28527 <rolecap/>
28528 </interface>
28529 -<interface name="fs_dontaudit_append_nfs_files" lineno="3115">
28530 +<interface name="fs_dontaudit_append_nfs_files" lineno="3204">
28531 <summary>
28532 dontaudit Append files
28533 on a NFS filesystem.
28534 @@ -83499,7 +84196,7 @@ Domain to not audit.
28535 </param>
28536 <rolecap/>
28537 </interface>
28538 -<interface name="fs_dontaudit_rw_nfs_files" lineno="3134">
28539 +<interface name="fs_dontaudit_rw_nfs_files" lineno="3223">
28540 <summary>
28541 Do not audit attempts to read or
28542 write files on a NFS filesystem.
28543 @@ -83510,7 +84207,7 @@ Domain to not audit.
28544 </summary>
28545 </param>
28546 </interface>
28547 -<interface name="fs_read_nfs_symlinks" lineno="3152">
28548 +<interface name="fs_read_nfs_symlinks" lineno="3241">
28549 <summary>
28550 Read symbolic links on a NFS filesystem.
28551 </summary>
28552 @@ -83520,7 +84217,7 @@ Domain allowed access.
28553 </summary>
28554 </param>
28555 </interface>
28556 -<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3171">
28557 +<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3260">
28558 <summary>
28559 Dontaudit read symbolic links on a NFS filesystem.
28560 </summary>
28561 @@ -83530,7 +84227,7 @@ Domain to not audit.
28562 </summary>
28563 </param>
28564 </interface>
28565 -<interface name="fs_read_nfs_named_sockets" lineno="3189">
28566 +<interface name="fs_read_nfs_named_sockets" lineno="3278">
28567 <summary>
28568 Read named sockets on a NFS filesystem.
28569 </summary>
28570 @@ -83540,7 +84237,7 @@ Domain allowed access.
28571 </summary>
28572 </param>
28573 </interface>
28574 -<interface name="fs_read_nfs_named_pipes" lineno="3208">
28575 +<interface name="fs_read_nfs_named_pipes" lineno="3297">
28576 <summary>
28577 Read named pipes on a NFS network filesystem.
28578 </summary>
28579 @@ -83551,7 +84248,7 @@ Domain allowed access.
28580 </param>
28581 <rolecap/>
28582 </interface>
28583 -<interface name="fs_getattr_rpc_dirs" lineno="3227">
28584 +<interface name="fs_getattr_rpc_dirs" lineno="3316">
28585 <summary>
28586 Get the attributes of directories of RPC
28587 file system pipes.
28588 @@ -83562,7 +84259,7 @@ Domain allowed access.
28589 </summary>
28590 </param>
28591 </interface>
28592 -<interface name="fs_search_rpc" lineno="3246">
28593 +<interface name="fs_search_rpc" lineno="3335">
28594 <summary>
28595 Search directories of RPC file system pipes.
28596 </summary>
28597 @@ -83572,7 +84269,7 @@ Domain allowed access.
28598 </summary>
28599 </param>
28600 </interface>
28601 -<interface name="fs_search_removable" lineno="3264">
28602 +<interface name="fs_search_removable" lineno="3353">
28603 <summary>
28604 Search removable storage directories.
28605 </summary>
28606 @@ -83582,7 +84279,7 @@ Domain allowed access.
28607 </summary>
28608 </param>
28609 </interface>
28610 -<interface name="fs_dontaudit_list_removable" lineno="3282">
28611 +<interface name="fs_dontaudit_list_removable" lineno="3371">
28612 <summary>
28613 Do not audit attempts to list removable storage directories.
28614 </summary>
28615 @@ -83592,7 +84289,7 @@ Domain not to audit.
28616 </summary>
28617 </param>
28618 </interface>
28619 -<interface name="fs_read_removable_files" lineno="3300">
28620 +<interface name="fs_read_removable_files" lineno="3389">
28621 <summary>
28622 Read removable storage files.
28623 </summary>
28624 @@ -83602,7 +84299,7 @@ Domain allowed access.
28625 </summary>
28626 </param>
28627 </interface>
28628 -<interface name="fs_dontaudit_read_removable_files" lineno="3318">
28629 +<interface name="fs_dontaudit_read_removable_files" lineno="3407">
28630 <summary>
28631 Do not audit attempts to read removable storage files.
28632 </summary>
28633 @@ -83612,7 +84309,7 @@ Domain not to audit.
28634 </summary>
28635 </param>
28636 </interface>
28637 -<interface name="fs_dontaudit_write_removable_files" lineno="3336">
28638 +<interface name="fs_dontaudit_write_removable_files" lineno="3425">
28639 <summary>
28640 Do not audit attempts to write removable storage files.
28641 </summary>
28642 @@ -83622,7 +84319,7 @@ Domain not to audit.
28643 </summary>
28644 </param>
28645 </interface>
28646 -<interface name="fs_read_removable_symlinks" lineno="3354">
28647 +<interface name="fs_read_removable_symlinks" lineno="3443">
28648 <summary>
28649 Read removable storage symbolic links.
28650 </summary>
28651 @@ -83632,7 +84329,7 @@ Domain allowed access.
28652 </summary>
28653 </param>
28654 </interface>
28655 -<interface name="fs_read_removable_blk_files" lineno="3372">
28656 +<interface name="fs_read_removable_blk_files" lineno="3461">
28657 <summary>
28658 Read block nodes on removable filesystems.
28659 </summary>
28660 @@ -83642,7 +84339,7 @@ Domain allowed access.
28661 </summary>
28662 </param>
28663 </interface>
28664 -<interface name="fs_rw_removable_blk_files" lineno="3391">
28665 +<interface name="fs_rw_removable_blk_files" lineno="3480">
28666 <summary>
28667 Read and write block nodes on removable filesystems.
28668 </summary>
28669 @@ -83652,7 +84349,7 @@ Domain allowed access.
28670 </summary>
28671 </param>
28672 </interface>
28673 -<interface name="fs_list_rpc" lineno="3410">
28674 +<interface name="fs_list_rpc" lineno="3499">
28675 <summary>
28676 Read directories of RPC file system pipes.
28677 </summary>
28678 @@ -83662,7 +84359,7 @@ Domain allowed access.
28679 </summary>
28680 </param>
28681 </interface>
28682 -<interface name="fs_read_rpc_files" lineno="3428">
28683 +<interface name="fs_read_rpc_files" lineno="3517">
28684 <summary>
28685 Read files of RPC file system pipes.
28686 </summary>
28687 @@ -83672,7 +84369,7 @@ Domain allowed access.
28688 </summary>
28689 </param>
28690 </interface>
28691 -<interface name="fs_read_rpc_symlinks" lineno="3446">
28692 +<interface name="fs_read_rpc_symlinks" lineno="3535">
28693 <summary>
28694 Read symbolic links of RPC file system pipes.
28695 </summary>
28696 @@ -83682,7 +84379,7 @@ Domain allowed access.
28697 </summary>
28698 </param>
28699 </interface>
28700 -<interface name="fs_read_rpc_sockets" lineno="3464">
28701 +<interface name="fs_read_rpc_sockets" lineno="3553">
28702 <summary>
28703 Read sockets of RPC file system pipes.
28704 </summary>
28705 @@ -83692,7 +84389,7 @@ Domain allowed access.
28706 </summary>
28707 </param>
28708 </interface>
28709 -<interface name="fs_rw_rpc_sockets" lineno="3482">
28710 +<interface name="fs_rw_rpc_sockets" lineno="3571">
28711 <summary>
28712 Read and write sockets of RPC file system pipes.
28713 </summary>
28714 @@ -83702,7 +84399,7 @@ Domain allowed access.
28715 </summary>
28716 </param>
28717 </interface>
28718 -<interface name="fs_manage_nfs_dirs" lineno="3502">
28719 +<interface name="fs_manage_nfs_dirs" lineno="3591">
28720 <summary>
28721 Create, read, write, and delete directories
28722 on a NFS filesystem.
28723 @@ -83714,7 +84411,7 @@ Domain allowed access.
28724 </param>
28725 <rolecap/>
28726 </interface>
28727 -<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3522">
28728 +<interface name="fs_dontaudit_manage_nfs_dirs" lineno="3611">
28729 <summary>
28730 Do not audit attempts to create, read,
28731 write, and delete directories
28732 @@ -83726,7 +84423,7 @@ Domain to not audit.
28733 </summary>
28734 </param>
28735 </interface>
28736 -<interface name="fs_manage_nfs_files" lineno="3542">
28737 +<interface name="fs_manage_nfs_files" lineno="3631">
28738 <summary>
28739 Create, read, write, and delete files
28740 on a NFS filesystem.
28741 @@ -83738,7 +84435,7 @@ Domain allowed access.
28742 </param>
28743 <rolecap/>
28744 </interface>
28745 -<interface name="fs_dontaudit_manage_nfs_files" lineno="3562">
28746 +<interface name="fs_dontaudit_manage_nfs_files" lineno="3651">
28747 <summary>
28748 Do not audit attempts to create,
28749 read, write, and delete files
28750 @@ -83750,7 +84447,7 @@ Domain to not audit.
28751 </summary>
28752 </param>
28753 </interface>
28754 -<interface name="fs_manage_nfs_symlinks" lineno="3582">
28755 +<interface name="fs_manage_nfs_symlinks" lineno="3671">
28756 <summary>
28757 Create, read, write, and delete symbolic links
28758 on a NFS network filesystem.
28759 @@ -83762,7 +84459,7 @@ Domain allowed access.
28760 </param>
28761 <rolecap/>
28762 </interface>
28763 -<interface name="fs_manage_nfs_named_pipes" lineno="3601">
28764 +<interface name="fs_manage_nfs_named_pipes" lineno="3690">
28765 <summary>
28766 Create, read, write, and delete named pipes
28767 on a NFS filesystem.
28768 @@ -83773,7 +84470,7 @@ Domain allowed access.
28769 </summary>
28770 </param>
28771 </interface>
28772 -<interface name="fs_manage_nfs_named_sockets" lineno="3620">
28773 +<interface name="fs_manage_nfs_named_sockets" lineno="3709">
28774 <summary>
28775 Create, read, write, and delete named sockets
28776 on a NFS filesystem.
28777 @@ -83784,7 +84481,7 @@ Domain allowed access.
28778 </summary>
28779 </param>
28780 </interface>
28781 -<interface name="fs_nfs_domtrans" lineno="3663">
28782 +<interface name="fs_nfs_domtrans" lineno="3752">
28783 <summary>
28784 Execute a file on a NFS filesystem
28785 in the specified domain.
28786 @@ -83819,7 +84516,7 @@ The type of the new process.
28787 </summary>
28788 </param>
28789 </interface>
28790 -<interface name="fs_mount_nfsd_fs" lineno="3682">
28791 +<interface name="fs_mount_nfsd_fs" lineno="3771">
28792 <summary>
28793 Mount a NFS server pseudo filesystem.
28794 </summary>
28795 @@ -83829,7 +84526,7 @@ Domain allowed access.
28796 </summary>
28797 </param>
28798 </interface>
28799 -<interface name="fs_remount_nfsd_fs" lineno="3701">
28800 +<interface name="fs_remount_nfsd_fs" lineno="3790">
28801 <summary>
28802 Mount a NFS server pseudo filesystem.
28803 This allows some mount options to be changed.
28804 @@ -83840,7 +84537,7 @@ Domain allowed access.
28805 </summary>
28806 </param>
28807 </interface>
28808 -<interface name="fs_unmount_nfsd_fs" lineno="3719">
28809 +<interface name="fs_unmount_nfsd_fs" lineno="3808">
28810 <summary>
28811 Unmount a NFS server pseudo filesystem.
28812 </summary>
28813 @@ -83850,7 +84547,7 @@ Domain allowed access.
28814 </summary>
28815 </param>
28816 </interface>
28817 -<interface name="fs_getattr_nfsd_fs" lineno="3738">
28818 +<interface name="fs_getattr_nfsd_fs" lineno="3827">
28819 <summary>
28820 Get the attributes of a NFS server
28821 pseudo filesystem.
28822 @@ -83861,7 +84558,7 @@ Domain allowed access.
28823 </summary>
28824 </param>
28825 </interface>
28826 -<interface name="fs_search_nfsd_fs" lineno="3756">
28827 +<interface name="fs_search_nfsd_fs" lineno="3845">
28828 <summary>
28829 Search NFS server directories.
28830 </summary>
28831 @@ -83871,7 +84568,7 @@ Domain allowed access.
28832 </summary>
28833 </param>
28834 </interface>
28835 -<interface name="fs_list_nfsd_fs" lineno="3774">
28836 +<interface name="fs_list_nfsd_fs" lineno="3863">
28837 <summary>
28838 List NFS server directories.
28839 </summary>
28840 @@ -83881,7 +84578,7 @@ Domain allowed access.
28841 </summary>
28842 </param>
28843 </interface>
28844 -<interface name="fs_watch_nfsd_dirs" lineno="3792">
28845 +<interface name="fs_watch_nfsd_dirs" lineno="3881">
28846 <summary>
28847 Watch NFS server directories.
28848 </summary>
28849 @@ -83891,7 +84588,7 @@ Domain allowed access.
28850 </summary>
28851 </param>
28852 </interface>
28853 -<interface name="fs_getattr_nfsd_files" lineno="3810">
28854 +<interface name="fs_getattr_nfsd_files" lineno="3899">
28855 <summary>
28856 Getattr files on an nfsd filesystem
28857 </summary>
28858 @@ -83901,7 +84598,7 @@ Domain allowed access.
28859 </summary>
28860 </param>
28861 </interface>
28862 -<interface name="fs_rw_nfsd_fs" lineno="3828">
28863 +<interface name="fs_rw_nfsd_fs" lineno="3917">
28864 <summary>
28865 Read and write NFS server files.
28866 </summary>
28867 @@ -83911,7 +84608,7 @@ Domain allowed access.
28868 </summary>
28869 </param>
28870 </interface>
28871 -<interface name="fs_read_nsfs_files" lineno="3846">
28872 +<interface name="fs_read_nsfs_files" lineno="3935">
28873 <summary>
28874 Read nsfs inodes (e.g. /proc/pid/ns/uts)
28875 </summary>
28876 @@ -83921,7 +84618,17 @@ Domain allowed access.
28877 </summary>
28878 </param>
28879 </interface>
28880 -<interface name="fs_unmount_nsfs" lineno="3864">
28881 +<interface name="fs_getattr_nsfs" lineno="3953">
28882 +<summary>
28883 +Get the attributes of an nsfs filesystem.
28884 +</summary>
28885 +<param name="domain">
28886 +<summary>
28887 +Domain allowed access.
28888 +</summary>
28889 +</param>
28890 +</interface>
28891 +<interface name="fs_unmount_nsfs" lineno="3971">
28892 <summary>
28893 Unmount an nsfs filesystem.
28894 </summary>
28895 @@ -83931,7 +84638,7 @@ Domain allowed access.
28896 </summary>
28897 </param>
28898 </interface>
28899 -<interface name="fs_getattr_pstorefs" lineno="3882">
28900 +<interface name="fs_getattr_pstorefs" lineno="3989">
28901 <summary>
28902 Get the attributes of a pstore filesystem.
28903 </summary>
28904 @@ -83941,7 +84648,7 @@ Domain allowed access.
28905 </summary>
28906 </param>
28907 </interface>
28908 -<interface name="fs_getattr_pstore_dirs" lineno="3901">
28909 +<interface name="fs_getattr_pstore_dirs" lineno="4008">
28910 <summary>
28911 Get the attributes of directories
28912 of a pstore filesystem.
28913 @@ -83952,7 +84659,7 @@ Domain allowed access.
28914 </summary>
28915 </param>
28916 </interface>
28917 -<interface name="fs_create_pstore_dirs" lineno="3920">
28918 +<interface name="fs_create_pstore_dirs" lineno="4027">
28919 <summary>
28920 Create pstore directories.
28921 </summary>
28922 @@ -83962,7 +84669,7 @@ Domain allowed access.
28923 </summary>
28924 </param>
28925 </interface>
28926 -<interface name="fs_relabel_pstore_dirs" lineno="3939">
28927 +<interface name="fs_relabel_pstore_dirs" lineno="4046">
28928 <summary>
28929 Relabel to/from pstore_t directories.
28930 </summary>
28931 @@ -83972,7 +84679,7 @@ Domain allowed access.
28932 </summary>
28933 </param>
28934 </interface>
28935 -<interface name="fs_list_pstore_dirs" lineno="3958">
28936 +<interface name="fs_list_pstore_dirs" lineno="4065">
28937 <summary>
28938 List the directories
28939 of a pstore filesystem.
28940 @@ -83983,7 +84690,7 @@ Domain allowed access.
28941 </summary>
28942 </param>
28943 </interface>
28944 -<interface name="fs_read_pstore_files" lineno="3977">
28945 +<interface name="fs_read_pstore_files" lineno="4084">
28946 <summary>
28947 Read pstore_t files
28948 </summary>
28949 @@ -83993,7 +84700,7 @@ Domain allowed access.
28950 </summary>
28951 </param>
28952 </interface>
28953 -<interface name="fs_delete_pstore_files" lineno="3996">
28954 +<interface name="fs_delete_pstore_files" lineno="4103">
28955 <summary>
28956 Delete the files
28957 of a pstore filesystem.
28958 @@ -84004,7 +84711,7 @@ Domain allowed access.
28959 </summary>
28960 </param>
28961 </interface>
28962 -<interface name="fs_associate_ramfs" lineno="4015">
28963 +<interface name="fs_associate_ramfs" lineno="4122">
28964 <summary>
28965 Allow the type to associate to ramfs filesystems.
28966 </summary>
28967 @@ -84014,7 +84721,7 @@ The type of the object to be associated.
28968 </summary>
28969 </param>
28970 </interface>
28971 -<interface name="fs_mount_ramfs" lineno="4033">
28972 +<interface name="fs_mount_ramfs" lineno="4140">
28973 <summary>
28974 Mount a RAM filesystem.
28975 </summary>
28976 @@ -84024,7 +84731,7 @@ Domain allowed access.
28977 </summary>
28978 </param>
28979 </interface>
28980 -<interface name="fs_remount_ramfs" lineno="4052">
28981 +<interface name="fs_remount_ramfs" lineno="4159">
28982 <summary>
28983 Remount a RAM filesystem. This allows
28984 some mount options to be changed.
28985 @@ -84035,7 +84742,7 @@ Domain allowed access.
28986 </summary>
28987 </param>
28988 </interface>
28989 -<interface name="fs_unmount_ramfs" lineno="4070">
28990 +<interface name="fs_unmount_ramfs" lineno="4177">
28991 <summary>
28992 Unmount a RAM filesystem.
28993 </summary>
28994 @@ -84045,7 +84752,7 @@ Domain allowed access.
28995 </summary>
28996 </param>
28997 </interface>
28998 -<interface name="fs_getattr_ramfs" lineno="4088">
28999 +<interface name="fs_getattr_ramfs" lineno="4195">
29000 <summary>
29001 Get the attributes of a RAM filesystem.
29002 </summary>
29003 @@ -84055,7 +84762,7 @@ Domain allowed access.
29004 </summary>
29005 </param>
29006 </interface>
29007 -<interface name="fs_search_ramfs" lineno="4106">
29008 +<interface name="fs_search_ramfs" lineno="4213">
29009 <summary>
29010 Search directories on a ramfs
29011 </summary>
29012 @@ -84065,7 +84772,7 @@ Domain allowed access.
29013 </summary>
29014 </param>
29015 </interface>
29016 -<interface name="fs_dontaudit_search_ramfs" lineno="4124">
29017 +<interface name="fs_dontaudit_search_ramfs" lineno="4231">
29018 <summary>
29019 Dontaudit Search directories on a ramfs
29020 </summary>
29021 @@ -84075,7 +84782,7 @@ Domain to not audit.
29022 </summary>
29023 </param>
29024 </interface>
29025 -<interface name="fs_manage_ramfs_dirs" lineno="4143">
29026 +<interface name="fs_manage_ramfs_dirs" lineno="4250">
29027 <summary>
29028 Create, read, write, and delete
29029 directories on a ramfs.
29030 @@ -84086,7 +84793,7 @@ Domain allowed access.
29031 </summary>
29032 </param>
29033 </interface>
29034 -<interface name="fs_dontaudit_read_ramfs_files" lineno="4161">
29035 +<interface name="fs_dontaudit_read_ramfs_files" lineno="4268">
29036 <summary>
29037 Dontaudit read on a ramfs files.
29038 </summary>
29039 @@ -84096,7 +84803,7 @@ Domain to not audit.
29040 </summary>
29041 </param>
29042 </interface>
29043 -<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4179">
29044 +<interface name="fs_dontaudit_read_ramfs_pipes" lineno="4286">
29045 <summary>
29046 Dontaudit read on a ramfs fifo_files.
29047 </summary>
29048 @@ -84106,7 +84813,7 @@ Domain to not audit.
29049 </summary>
29050 </param>
29051 </interface>
29052 -<interface name="fs_manage_ramfs_files" lineno="4198">
29053 +<interface name="fs_manage_ramfs_files" lineno="4305">
29054 <summary>
29055 Create, read, write, and delete
29056 files on a ramfs filesystem.
29057 @@ -84117,7 +84824,7 @@ Domain allowed access.
29058 </summary>
29059 </param>
29060 </interface>
29061 -<interface name="fs_write_ramfs_pipes" lineno="4216">
29062 +<interface name="fs_write_ramfs_pipes" lineno="4323">
29063 <summary>
29064 Write to named pipe on a ramfs filesystem.
29065 </summary>
29066 @@ -84127,7 +84834,7 @@ Domain allowed access.
29067 </summary>
29068 </param>
29069 </interface>
29070 -<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4235">
29071 +<interface name="fs_dontaudit_write_ramfs_pipes" lineno="4342">
29072 <summary>
29073 Do not audit attempts to write to named
29074 pipes on a ramfs filesystem.
29075 @@ -84138,7 +84845,7 @@ Domain to not audit.
29076 </summary>
29077 </param>
29078 </interface>
29079 -<interface name="fs_rw_ramfs_pipes" lineno="4253">
29080 +<interface name="fs_rw_ramfs_pipes" lineno="4360">
29081 <summary>
29082 Read and write a named pipe on a ramfs filesystem.
29083 </summary>
29084 @@ -84148,7 +84855,7 @@ Domain allowed access.
29085 </summary>
29086 </param>
29087 </interface>
29088 -<interface name="fs_manage_ramfs_pipes" lineno="4272">
29089 +<interface name="fs_manage_ramfs_pipes" lineno="4379">
29090 <summary>
29091 Create, read, write, and delete
29092 named pipes on a ramfs filesystem.
29093 @@ -84159,7 +84866,7 @@ Domain allowed access.
29094 </summary>
29095 </param>
29096 </interface>
29097 -<interface name="fs_write_ramfs_sockets" lineno="4290">
29098 +<interface name="fs_write_ramfs_sockets" lineno="4397">
29099 <summary>
29100 Write to named socket on a ramfs filesystem.
29101 </summary>
29102 @@ -84169,7 +84876,7 @@ Domain allowed access.
29103 </summary>
29104 </param>
29105 </interface>
29106 -<interface name="fs_manage_ramfs_sockets" lineno="4309">
29107 +<interface name="fs_manage_ramfs_sockets" lineno="4416">
29108 <summary>
29109 Create, read, write, and delete
29110 named sockets on a ramfs filesystem.
29111 @@ -84180,7 +84887,7 @@ Domain allowed access.
29112 </summary>
29113 </param>
29114 </interface>
29115 -<interface name="fs_mount_romfs" lineno="4327">
29116 +<interface name="fs_mount_romfs" lineno="4434">
29117 <summary>
29118 Mount a ROM filesystem.
29119 </summary>
29120 @@ -84190,7 +84897,7 @@ Domain allowed access.
29121 </summary>
29122 </param>
29123 </interface>
29124 -<interface name="fs_remount_romfs" lineno="4346">
29125 +<interface name="fs_remount_romfs" lineno="4453">
29126 <summary>
29127 Remount a ROM filesystem. This allows
29128 some mount options to be changed.
29129 @@ -84201,7 +84908,7 @@ Domain allowed access.
29130 </summary>
29131 </param>
29132 </interface>
29133 -<interface name="fs_unmount_romfs" lineno="4364">
29134 +<interface name="fs_unmount_romfs" lineno="4471">
29135 <summary>
29136 Unmount a ROM filesystem.
29137 </summary>
29138 @@ -84211,7 +84918,7 @@ Domain allowed access.
29139 </summary>
29140 </param>
29141 </interface>
29142 -<interface name="fs_getattr_romfs" lineno="4383">
29143 +<interface name="fs_getattr_romfs" lineno="4490">
29144 <summary>
29145 Get the attributes of a ROM
29146 filesystem.
29147 @@ -84222,7 +84929,7 @@ Domain allowed access.
29148 </summary>
29149 </param>
29150 </interface>
29151 -<interface name="fs_mount_rpc_pipefs" lineno="4401">
29152 +<interface name="fs_mount_rpc_pipefs" lineno="4508">
29153 <summary>
29154 Mount a RPC pipe filesystem.
29155 </summary>
29156 @@ -84232,7 +84939,7 @@ Domain allowed access.
29157 </summary>
29158 </param>
29159 </interface>
29160 -<interface name="fs_remount_rpc_pipefs" lineno="4420">
29161 +<interface name="fs_remount_rpc_pipefs" lineno="4527">
29162 <summary>
29163 Remount a RPC pipe filesystem. This
29164 allows some mount option to be changed.
29165 @@ -84243,7 +84950,7 @@ Domain allowed access.
29166 </summary>
29167 </param>
29168 </interface>
29169 -<interface name="fs_unmount_rpc_pipefs" lineno="4438">
29170 +<interface name="fs_unmount_rpc_pipefs" lineno="4545">
29171 <summary>
29172 Unmount a RPC pipe filesystem.
29173 </summary>
29174 @@ -84253,7 +84960,7 @@ Domain allowed access.
29175 </summary>
29176 </param>
29177 </interface>
29178 -<interface name="fs_getattr_rpc_pipefs" lineno="4457">
29179 +<interface name="fs_getattr_rpc_pipefs" lineno="4564">
29180 <summary>
29181 Get the attributes of a RPC pipe
29182 filesystem.
29183 @@ -84264,7 +84971,7 @@ Domain allowed access.
29184 </summary>
29185 </param>
29186 </interface>
29187 -<interface name="fs_rw_rpc_named_pipes" lineno="4475">
29188 +<interface name="fs_rw_rpc_named_pipes" lineno="4582">
29189 <summary>
29190 Read and write RPC pipe filesystem named pipes.
29191 </summary>
29192 @@ -84274,7 +84981,7 @@ Domain allowed access.
29193 </summary>
29194 </param>
29195 </interface>
29196 -<interface name="fs_mount_tmpfs" lineno="4493">
29197 +<interface name="fs_mount_tmpfs" lineno="4600">
29198 <summary>
29199 Mount a tmpfs filesystem.
29200 </summary>
29201 @@ -84284,7 +84991,7 @@ Domain allowed access.
29202 </summary>
29203 </param>
29204 </interface>
29205 -<interface name="fs_remount_tmpfs" lineno="4511">
29206 +<interface name="fs_remount_tmpfs" lineno="4618">
29207 <summary>
29208 Remount a tmpfs filesystem.
29209 </summary>
29210 @@ -84294,7 +85001,7 @@ Domain allowed access.
29211 </summary>
29212 </param>
29213 </interface>
29214 -<interface name="fs_unmount_tmpfs" lineno="4529">
29215 +<interface name="fs_unmount_tmpfs" lineno="4636">
29216 <summary>
29217 Unmount a tmpfs filesystem.
29218 </summary>
29219 @@ -84304,7 +85011,7 @@ Domain allowed access.
29220 </summary>
29221 </param>
29222 </interface>
29223 -<interface name="fs_dontaudit_getattr_tmpfs" lineno="4547">
29224 +<interface name="fs_dontaudit_getattr_tmpfs" lineno="4654">
29225 <summary>
29226 Do not audit getting the attributes of a tmpfs filesystem
29227 </summary>
29228 @@ -84314,7 +85021,7 @@ Domain to not audit
29229 </summary>
29230 </param>
29231 </interface>
29232 -<interface name="fs_getattr_tmpfs" lineno="4567">
29233 +<interface name="fs_getattr_tmpfs" lineno="4674">
29234 <summary>
29235 Get the attributes of a tmpfs
29236 filesystem.
29237 @@ -84326,7 +85033,7 @@ Domain allowed access.
29238 </param>
29239 <rolecap/>
29240 </interface>
29241 -<interface name="fs_associate_tmpfs" lineno="4585">
29242 +<interface name="fs_associate_tmpfs" lineno="4692">
29243 <summary>
29244 Allow the type to associate to tmpfs filesystems.
29245 </summary>
29246 @@ -84336,7 +85043,7 @@ The type of the object to be associated.
29247 </summary>
29248 </param>
29249 </interface>
29250 -<interface name="fs_relabelfrom_tmpfs" lineno="4603">
29251 +<interface name="fs_relabelfrom_tmpfs" lineno="4710">
29252 <summary>
29253 Relabel from tmpfs filesystem.
29254 </summary>
29255 @@ -84346,7 +85053,7 @@ Domain allowed access.
29256 </summary>
29257 </param>
29258 </interface>
29259 -<interface name="fs_getattr_tmpfs_dirs" lineno="4621">
29260 +<interface name="fs_getattr_tmpfs_dirs" lineno="4728">
29261 <summary>
29262 Get the attributes of tmpfs directories.
29263 </summary>
29264 @@ -84356,7 +85063,7 @@ Domain allowed access.
29265 </summary>
29266 </param>
29267 </interface>
29268 -<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4640">
29269 +<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4747">
29270 <summary>
29271 Do not audit attempts to get the attributes
29272 of tmpfs directories.
29273 @@ -84367,7 +85074,7 @@ Domain to not audit.
29274 </summary>
29275 </param>
29276 </interface>
29277 -<interface name="fs_mounton_tmpfs" lineno="4658">
29278 +<interface name="fs_mounton_tmpfs" lineno="4765">
29279 <summary>
29280 Mount on tmpfs directories.
29281 </summary>
29282 @@ -84377,7 +85084,7 @@ Domain allowed access.
29283 </summary>
29284 </param>
29285 </interface>
29286 -<interface name="fs_mounton_tmpfs_files" lineno="4676">
29287 +<interface name="fs_mounton_tmpfs_files" lineno="4783">
29288 <summary>
29289 Mount on tmpfs files.
29290 </summary>
29291 @@ -84387,7 +85094,7 @@ Domain allowed access.
29292 </summary>
29293 </param>
29294 </interface>
29295 -<interface name="fs_setattr_tmpfs_dirs" lineno="4694">
29296 +<interface name="fs_setattr_tmpfs_dirs" lineno="4801">
29297 <summary>
29298 Set the attributes of tmpfs directories.
29299 </summary>
29300 @@ -84397,7 +85104,7 @@ Domain allowed access.
29301 </summary>
29302 </param>
29303 </interface>
29304 -<interface name="fs_search_tmpfs" lineno="4712">
29305 +<interface name="fs_search_tmpfs" lineno="4819">
29306 <summary>
29307 Search tmpfs directories.
29308 </summary>
29309 @@ -84407,7 +85114,7 @@ Domain allowed access.
29310 </summary>
29311 </param>
29312 </interface>
29313 -<interface name="fs_list_tmpfs" lineno="4730">
29314 +<interface name="fs_list_tmpfs" lineno="4837">
29315 <summary>
29316 List the contents of generic tmpfs directories.
29317 </summary>
29318 @@ -84417,7 +85124,7 @@ Domain allowed access.
29319 </summary>
29320 </param>
29321 </interface>
29322 -<interface name="fs_dontaudit_list_tmpfs" lineno="4749">
29323 +<interface name="fs_dontaudit_list_tmpfs" lineno="4856">
29324 <summary>
29325 Do not audit attempts to list the
29326 contents of generic tmpfs directories.
29327 @@ -84428,7 +85135,7 @@ Domain to not audit.
29328 </summary>
29329 </param>
29330 </interface>
29331 -<interface name="fs_manage_tmpfs_dirs" lineno="4768">
29332 +<interface name="fs_manage_tmpfs_dirs" lineno="4875">
29333 <summary>
29334 Create, read, write, and delete
29335 tmpfs directories
29336 @@ -84439,7 +85146,7 @@ Domain allowed access.
29337 </summary>
29338 </param>
29339 </interface>
29340 -<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="4787">
29341 +<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="4894">
29342 <summary>
29343 Do not audit attempts to write
29344 tmpfs directories
29345 @@ -84450,7 +85157,7 @@ Domain to not audit.
29346 </summary>
29347 </param>
29348 </interface>
29349 -<interface name="fs_relabelfrom_tmpfs_dirs" lineno="4805">
29350 +<interface name="fs_relabelfrom_tmpfs_dirs" lineno="4912">
29351 <summary>
29352 Relabel from tmpfs_t dir
29353 </summary>
29354 @@ -84460,7 +85167,7 @@ Domain allowed access.
29355 </summary>
29356 </param>
29357 </interface>
29358 -<interface name="fs_relabel_tmpfs_dirs" lineno="4823">
29359 +<interface name="fs_relabel_tmpfs_dirs" lineno="4930">
29360 <summary>
29361 Relabel directory on tmpfs filesystems.
29362 </summary>
29363 @@ -84470,7 +85177,7 @@ Domain allowed access.
29364 </summary>
29365 </param>
29366 </interface>
29367 -<interface name="fs_tmpfs_filetrans" lineno="4856">
29368 +<interface name="fs_tmpfs_filetrans" lineno="4963">
29369 <summary>
29370 Create an object in a tmpfs filesystem, with a private
29371 type using a type transition.
29372 @@ -84496,7 +85203,7 @@ The name of the object being created.
29373 </summary>
29374 </param>
29375 </interface>
29376 -<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="4876">
29377 +<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="4983">
29378 <summary>
29379 Do not audit attempts to getattr
29380 generic tmpfs files.
29381 @@ -84507,7 +85214,7 @@ Domain to not audit.
29382 </summary>
29383 </param>
29384 </interface>
29385 -<interface name="fs_dontaudit_rw_tmpfs_files" lineno="4895">
29386 +<interface name="fs_dontaudit_rw_tmpfs_files" lineno="5002">
29387 <summary>
29388 Do not audit attempts to read or write
29389 generic tmpfs files.
29390 @@ -84518,7 +85225,7 @@ Domain to not audit.
29391 </summary>
29392 </param>
29393 </interface>
29394 -<interface name="fs_delete_tmpfs_symlinks" lineno="4913">
29395 +<interface name="fs_delete_tmpfs_symlinks" lineno="5020">
29396 <summary>
29397 Delete tmpfs symbolic links.
29398 </summary>
29399 @@ -84528,7 +85235,7 @@ Domain allowed access.
29400 </summary>
29401 </param>
29402 </interface>
29403 -<interface name="fs_manage_auto_mountpoints" lineno="4932">
29404 +<interface name="fs_manage_auto_mountpoints" lineno="5039">
29405 <summary>
29406 Create, read, write, and delete
29407 auto moutpoints.
29408 @@ -84539,7 +85246,7 @@ Domain allowed access.
29409 </summary>
29410 </param>
29411 </interface>
29412 -<interface name="fs_read_tmpfs_files" lineno="4950">
29413 +<interface name="fs_read_tmpfs_files" lineno="5057">
29414 <summary>
29415 Read generic tmpfs files.
29416 </summary>
29417 @@ -84549,7 +85256,7 @@ Domain allowed access.
29418 </summary>
29419 </param>
29420 </interface>
29421 -<interface name="fs_rw_tmpfs_files" lineno="4968">
29422 +<interface name="fs_rw_tmpfs_files" lineno="5075">
29423 <summary>
29424 Read and write generic tmpfs files.
29425 </summary>
29426 @@ -84559,7 +85266,7 @@ Domain allowed access.
29427 </summary>
29428 </param>
29429 </interface>
29430 -<interface name="fs_relabel_tmpfs_files" lineno="4986">
29431 +<interface name="fs_relabel_tmpfs_files" lineno="5093">
29432 <summary>
29433 Relabel files on tmpfs filesystems.
29434 </summary>
29435 @@ -84569,7 +85276,7 @@ Domain allowed access.
29436 </summary>
29437 </param>
29438 </interface>
29439 -<interface name="fs_read_tmpfs_symlinks" lineno="5004">
29440 +<interface name="fs_read_tmpfs_symlinks" lineno="5111">
29441 <summary>
29442 Read tmpfs link files.
29443 </summary>
29444 @@ -84579,7 +85286,7 @@ Domain allowed access.
29445 </summary>
29446 </param>
29447 </interface>
29448 -<interface name="fs_relabelfrom_tmpfs_sockets" lineno="5022">
29449 +<interface name="fs_relabelfrom_tmpfs_sockets" lineno="5129">
29450 <summary>
29451 Relabelfrom socket files on tmpfs filesystems.
29452 </summary>
29453 @@ -84589,7 +85296,7 @@ Domain allowed access.
29454 </summary>
29455 </param>
29456 </interface>
29457 -<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="5040">
29458 +<interface name="fs_relabelfrom_tmpfs_symlinks" lineno="5147">
29459 <summary>
29460 Relabelfrom tmpfs link files.
29461 </summary>
29462 @@ -84599,7 +85306,7 @@ Domain allowed access.
29463 </summary>
29464 </param>
29465 </interface>
29466 -<interface name="fs_rw_tmpfs_chr_files" lineno="5058">
29467 +<interface name="fs_rw_tmpfs_chr_files" lineno="5165">
29468 <summary>
29469 Read and write character nodes on tmpfs filesystems.
29470 </summary>
29471 @@ -84609,7 +85316,7 @@ Domain allowed access.
29472 </summary>
29473 </param>
29474 </interface>
29475 -<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5077">
29476 +<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="5184">
29477 <summary>
29478 dontaudit Read and write character nodes on tmpfs filesystems.
29479 </summary>
29480 @@ -84619,7 +85326,7 @@ Domain to not audit.
29481 </summary>
29482 </param>
29483 </interface>
29484 -<interface name="fs_relabel_tmpfs_chr_files" lineno="5096">
29485 +<interface name="fs_relabel_tmpfs_chr_files" lineno="5203">
29486 <summary>
29487 Relabel character nodes on tmpfs filesystems.
29488 </summary>
29489 @@ -84629,7 +85336,7 @@ Domain allowed access.
29490 </summary>
29491 </param>
29492 </interface>
29493 -<interface name="fs_relabel_tmpfs_chr_file" lineno="5115">
29494 +<interface name="fs_relabel_tmpfs_chr_file" lineno="5222">
29495 <summary>
29496 Relabel character nodes on tmpfs filesystems.
29497 </summary>
29498 @@ -84639,7 +85346,7 @@ Domain allowed access.
29499 </summary>
29500 </param>
29501 </interface>
29502 -<interface name="fs_rw_tmpfs_blk_files" lineno="5130">
29503 +<interface name="fs_rw_tmpfs_blk_files" lineno="5237">
29504 <summary>
29505 Read and write block nodes on tmpfs filesystems.
29506 </summary>
29507 @@ -84649,7 +85356,7 @@ Domain allowed access.
29508 </summary>
29509 </param>
29510 </interface>
29511 -<interface name="fs_relabel_tmpfs_blk_files" lineno="5149">
29512 +<interface name="fs_relabel_tmpfs_blk_files" lineno="5256">
29513 <summary>
29514 Relabel block nodes on tmpfs filesystems.
29515 </summary>
29516 @@ -84659,7 +85366,7 @@ Domain allowed access.
29517 </summary>
29518 </param>
29519 </interface>
29520 -<interface name="fs_relabel_tmpfs_blk_file" lineno="5168">
29521 +<interface name="fs_relabel_tmpfs_blk_file" lineno="5275">
29522 <summary>
29523 Relabel block nodes on tmpfs filesystems.
29524 </summary>
29525 @@ -84669,7 +85376,7 @@ Domain allowed access.
29526 </summary>
29527 </param>
29528 </interface>
29529 -<interface name="fs_relabel_tmpfs_fifo_files" lineno="5183">
29530 +<interface name="fs_relabel_tmpfs_fifo_files" lineno="5290">
29531 <summary>
29532 Relabel named pipes on tmpfs filesystems.
29533 </summary>
29534 @@ -84679,7 +85386,7 @@ Domain allowed access.
29535 </summary>
29536 </param>
29537 </interface>
29538 -<interface name="fs_manage_tmpfs_files" lineno="5203">
29539 +<interface name="fs_manage_tmpfs_files" lineno="5310">
29540 <summary>
29541 Read and write, create and delete generic
29542 files on tmpfs filesystems.
29543 @@ -84690,7 +85397,7 @@ Domain allowed access.
29544 </summary>
29545 </param>
29546 </interface>
29547 -<interface name="fs_manage_tmpfs_symlinks" lineno="5222">
29548 +<interface name="fs_manage_tmpfs_symlinks" lineno="5329">
29549 <summary>
29550 Read and write, create and delete symbolic
29551 links on tmpfs filesystems.
29552 @@ -84701,7 +85408,7 @@ Domain allowed access.
29553 </summary>
29554 </param>
29555 </interface>
29556 -<interface name="fs_manage_tmpfs_sockets" lineno="5241">
29557 +<interface name="fs_manage_tmpfs_sockets" lineno="5348">
29558 <summary>
29559 Read and write, create and delete socket
29560 files on tmpfs filesystems.
29561 @@ -84712,7 +85419,7 @@ Domain allowed access.
29562 </summary>
29563 </param>
29564 </interface>
29565 -<interface name="fs_manage_tmpfs_chr_files" lineno="5260">
29566 +<interface name="fs_manage_tmpfs_chr_files" lineno="5367">
29567 <summary>
29568 Read and write, create and delete character
29569 nodes on tmpfs filesystems.
29570 @@ -84723,7 +85430,7 @@ Domain allowed access.
29571 </summary>
29572 </param>
29573 </interface>
29574 -<interface name="fs_manage_tmpfs_blk_files" lineno="5279">
29575 +<interface name="fs_manage_tmpfs_blk_files" lineno="5386">
29576 <summary>
29577 Read and write, create and delete block nodes
29578 on tmpfs filesystems.
29579 @@ -84734,7 +85441,7 @@ Domain allowed access.
29580 </summary>
29581 </param>
29582 </interface>
29583 -<interface name="fs_getattr_tracefs" lineno="5297">
29584 +<interface name="fs_getattr_tracefs" lineno="5404">
29585 <summary>
29586 Get the attributes of a trace filesystem.
29587 </summary>
29588 @@ -84744,7 +85451,7 @@ Domain allowed access.
29589 </summary>
29590 </param>
29591 </interface>
29592 -<interface name="fs_getattr_tracefs_dirs" lineno="5315">
29593 +<interface name="fs_getattr_tracefs_dirs" lineno="5422">
29594 <summary>
29595 Get attributes of dirs on tracefs filesystem.
29596 </summary>
29597 @@ -84754,7 +85461,7 @@ Domain allowed access.
29598 </summary>
29599 </param>
29600 </interface>
29601 -<interface name="fs_search_tracefs" lineno="5333">
29602 +<interface name="fs_search_tracefs" lineno="5440">
29603 <summary>
29604 search directories on a tracefs filesystem
29605 </summary>
29606 @@ -84764,7 +85471,7 @@ Domain allowed access.
29607 </summary>
29608 </param>
29609 </interface>
29610 -<interface name="fs_getattr_tracefs_files" lineno="5352">
29611 +<interface name="fs_getattr_tracefs_files" lineno="5459">
29612 <summary>
29613 Get the attributes of files
29614 on a trace filesystem.
29615 @@ -84775,7 +85482,7 @@ Domain allowed access.
29616 </summary>
29617 </param>
29618 </interface>
29619 -<interface name="fs_mount_xenfs" lineno="5370">
29620 +<interface name="fs_mount_xenfs" lineno="5477">
29621 <summary>
29622 Mount a XENFS filesystem.
29623 </summary>
29624 @@ -84785,7 +85492,7 @@ Domain allowed access.
29625 </summary>
29626 </param>
29627 </interface>
29628 -<interface name="fs_search_xenfs" lineno="5388">
29629 +<interface name="fs_search_xenfs" lineno="5495">
29630 <summary>
29631 Search the XENFS filesystem.
29632 </summary>
29633 @@ -84795,7 +85502,7 @@ Domain allowed access.
29634 </summary>
29635 </param>
29636 </interface>
29637 -<interface name="fs_manage_xenfs_dirs" lineno="5408">
29638 +<interface name="fs_manage_xenfs_dirs" lineno="5515">
29639 <summary>
29640 Create, read, write, and delete directories
29641 on a XENFS filesystem.
29642 @@ -84807,7 +85514,7 @@ Domain allowed access.
29643 </param>
29644 <rolecap/>
29645 </interface>
29646 -<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5428">
29647 +<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="5535">
29648 <summary>
29649 Do not audit attempts to create, read,
29650 write, and delete directories
29651 @@ -84819,7 +85526,7 @@ Domain to not audit.
29652 </summary>
29653 </param>
29654 </interface>
29655 -<interface name="fs_manage_xenfs_files" lineno="5448">
29656 +<interface name="fs_manage_xenfs_files" lineno="5555">
29657 <summary>
29658 Create, read, write, and delete files
29659 on a XENFS filesystem.
29660 @@ -84831,7 +85538,7 @@ Domain allowed access.
29661 </param>
29662 <rolecap/>
29663 </interface>
29664 -<interface name="fs_mmap_xenfs_files" lineno="5466">
29665 +<interface name="fs_mmap_xenfs_files" lineno="5573">
29666 <summary>
29667 Map files a XENFS filesystem.
29668 </summary>
29669 @@ -84841,7 +85548,7 @@ Domain allowed access.
29670 </summary>
29671 </param>
29672 </interface>
29673 -<interface name="fs_dontaudit_manage_xenfs_files" lineno="5486">
29674 +<interface name="fs_dontaudit_manage_xenfs_files" lineno="5593">
29675 <summary>
29676 Do not audit attempts to create,
29677 read, write, and delete files
29678 @@ -84853,7 +85560,7 @@ Domain to not audit.
29679 </summary>
29680 </param>
29681 </interface>
29682 -<interface name="fs_mount_all_fs" lineno="5504">
29683 +<interface name="fs_mount_all_fs" lineno="5611">
29684 <summary>
29685 Mount all filesystems.
29686 </summary>
29687 @@ -84863,7 +85570,7 @@ Domain allowed access.
29688 </summary>
29689 </param>
29690 </interface>
29691 -<interface name="fs_remount_all_fs" lineno="5523">
29692 +<interface name="fs_remount_all_fs" lineno="5630">
29693 <summary>
29694 Remount all filesystems. This
29695 allows some mount options to be changed.
29696 @@ -84874,7 +85581,7 @@ Domain allowed access.
29697 </summary>
29698 </param>
29699 </interface>
29700 -<interface name="fs_unmount_all_fs" lineno="5541">
29701 +<interface name="fs_unmount_all_fs" lineno="5648">
29702 <summary>
29703 Unmount all filesystems.
29704 </summary>
29705 @@ -84884,7 +85591,7 @@ Domain allowed access.
29706 </summary>
29707 </param>
29708 </interface>
29709 -<interface name="fs_getattr_all_fs" lineno="5573">
29710 +<interface name="fs_getattr_all_fs" lineno="5680">
29711 <summary>
29712 Get the attributes of all filesystems.
29713 </summary>
29714 @@ -84908,7 +85615,7 @@ Domain allowed access.
29715 <infoflow type="read" weight="5"/>
29716 <rolecap/>
29717 </interface>
29718 -<interface name="fs_dontaudit_getattr_all_fs" lineno="5593">
29719 +<interface name="fs_dontaudit_getattr_all_fs" lineno="5700">
29720 <summary>
29721 Do not audit attempts to get the attributes
29722 all filesystems.
29723 @@ -84919,7 +85626,7 @@ Domain to not audit.
29724 </summary>
29725 </param>
29726 </interface>
29727 -<interface name="fs_get_all_fs_quotas" lineno="5612">
29728 +<interface name="fs_get_all_fs_quotas" lineno="5719">
29729 <summary>
29730 Get the quotas of all filesystems.
29731 </summary>
29732 @@ -84930,7 +85637,7 @@ Domain allowed access.
29733 </param>
29734 <rolecap/>
29735 </interface>
29736 -<interface name="fs_set_all_quotas" lineno="5631">
29737 +<interface name="fs_set_all_quotas" lineno="5738">
29738 <summary>
29739 Set the quotas of all filesystems.
29740 </summary>
29741 @@ -84941,7 +85648,7 @@ Domain allowed access.
29742 </param>
29743 <rolecap/>
29744 </interface>
29745 -<interface name="fs_relabelfrom_all_fs" lineno="5649">
29746 +<interface name="fs_relabelfrom_all_fs" lineno="5756">
29747 <summary>
29748 Relabelfrom all filesystems.
29749 </summary>
29750 @@ -84951,7 +85658,7 @@ Domain allowed access.
29751 </summary>
29752 </param>
29753 </interface>
29754 -<interface name="fs_getattr_all_dirs" lineno="5668">
29755 +<interface name="fs_getattr_all_dirs" lineno="5775">
29756 <summary>
29757 Get the attributes of all directories
29758 with a filesystem type.
29759 @@ -84962,7 +85669,7 @@ Domain allowed access.
29760 </summary>
29761 </param>
29762 </interface>
29763 -<interface name="fs_search_all" lineno="5686">
29764 +<interface name="fs_search_all" lineno="5793">
29765 <summary>
29766 Search all directories with a filesystem type.
29767 </summary>
29768 @@ -84972,7 +85679,7 @@ Domain allowed access.
29769 </summary>
29770 </param>
29771 </interface>
29772 -<interface name="fs_list_all" lineno="5704">
29773 +<interface name="fs_list_all" lineno="5811">
29774 <summary>
29775 List all directories with a filesystem type.
29776 </summary>
29777 @@ -84982,7 +85689,7 @@ Domain allowed access.
29778 </summary>
29779 </param>
29780 </interface>
29781 -<interface name="fs_getattr_all_files" lineno="5723">
29782 +<interface name="fs_getattr_all_files" lineno="5830">
29783 <summary>
29784 Get the attributes of all files with
29785 a filesystem type.
29786 @@ -84993,7 +85700,7 @@ Domain allowed access.
29787 </summary>
29788 </param>
29789 </interface>
29790 -<interface name="fs_dontaudit_getattr_all_files" lineno="5742">
29791 +<interface name="fs_dontaudit_getattr_all_files" lineno="5849">
29792 <summary>
29793 Do not audit attempts to get the attributes
29794 of all files with a filesystem type.
29795 @@ -85004,7 +85711,7 @@ Domain to not audit.
29796 </summary>
29797 </param>
29798 </interface>
29799 -<interface name="fs_getattr_all_symlinks" lineno="5761">
29800 +<interface name="fs_getattr_all_symlinks" lineno="5868">
29801 <summary>
29802 Get the attributes of all symbolic links with
29803 a filesystem type.
29804 @@ -85015,7 +85722,7 @@ Domain allowed access.
29805 </summary>
29806 </param>
29807 </interface>
29808 -<interface name="fs_dontaudit_getattr_all_symlinks" lineno="5780">
29809 +<interface name="fs_dontaudit_getattr_all_symlinks" lineno="5887">
29810 <summary>
29811 Do not audit attempts to get the attributes
29812 of all symbolic links with a filesystem type.
29813 @@ -85026,7 +85733,7 @@ Domain to not audit.
29814 </summary>
29815 </param>
29816 </interface>
29817 -<interface name="fs_getattr_all_pipes" lineno="5799">
29818 +<interface name="fs_getattr_all_pipes" lineno="5906">
29819 <summary>
29820 Get the attributes of all named pipes with
29821 a filesystem type.
29822 @@ -85037,7 +85744,7 @@ Domain allowed access.
29823 </summary>
29824 </param>
29825 </interface>
29826 -<interface name="fs_dontaudit_getattr_all_pipes" lineno="5818">
29827 +<interface name="fs_dontaudit_getattr_all_pipes" lineno="5925">
29828 <summary>
29829 Do not audit attempts to get the attributes
29830 of all named pipes with a filesystem type.
29831 @@ -85048,7 +85755,7 @@ Domain to not audit.
29832 </summary>
29833 </param>
29834 </interface>
29835 -<interface name="fs_getattr_all_sockets" lineno="5837">
29836 +<interface name="fs_getattr_all_sockets" lineno="5944">
29837 <summary>
29838 Get the attributes of all named sockets with
29839 a filesystem type.
29840 @@ -85059,7 +85766,7 @@ Domain allowed access.
29841 </summary>
29842 </param>
29843 </interface>
29844 -<interface name="fs_dontaudit_getattr_all_sockets" lineno="5856">
29845 +<interface name="fs_dontaudit_getattr_all_sockets" lineno="5963">
29846 <summary>
29847 Do not audit attempts to get the attributes
29848 of all named sockets with a filesystem type.
29849 @@ -85070,7 +85777,7 @@ Domain to not audit.
29850 </summary>
29851 </param>
29852 </interface>
29853 -<interface name="fs_getattr_all_blk_files" lineno="5875">
29854 +<interface name="fs_getattr_all_blk_files" lineno="5982">
29855 <summary>
29856 Get the attributes of all block device nodes with
29857 a filesystem type.
29858 @@ -85081,7 +85788,7 @@ Domain allowed access.
29859 </summary>
29860 </param>
29861 </interface>
29862 -<interface name="fs_getattr_all_chr_files" lineno="5894">
29863 +<interface name="fs_getattr_all_chr_files" lineno="6001">
29864 <summary>
29865 Get the attributes of all character device nodes with
29866 a filesystem type.
29867 @@ -85092,7 +85799,7 @@ Domain allowed access.
29868 </summary>
29869 </param>
29870 </interface>
29871 -<interface name="fs_unconfined" lineno="5912">
29872 +<interface name="fs_unconfined" lineno="6019">
29873 <summary>
29874 Unconfined access to filesystems
29875 </summary>
29876 @@ -85643,7 +86350,7 @@ Domain to not audit.
29877 </interface>
29878 <interface name="kernel_mounton_proc" lineno="960">
29879 <summary>
29880 -Mount on proc directories.
29881 +Mount on proc directories. (Deprecated)
29882 </summary>
29883 <param name="domain">
29884 <summary>
29885 @@ -85652,7 +86359,7 @@ Domain allowed access.
29886 </param>
29887 <rolecap/>
29888 </interface>
29889 -<interface name="kernel_dontaudit_setattr_proc_dirs" lineno="979">
29890 +<interface name="kernel_dontaudit_setattr_proc_dirs" lineno="976">
29891 <summary>
29892 Do not audit attempts to set the
29893 attributes of directories in /proc.
29894 @@ -85663,7 +86370,7 @@ Domain to not audit.
29895 </summary>
29896 </param>
29897 </interface>
29898 -<interface name="kernel_search_proc" lineno="997">
29899 +<interface name="kernel_search_proc" lineno="994">
29900 <summary>
29901 Search directories in /proc.
29902 </summary>
29903 @@ -85673,7 +86380,7 @@ Domain allowed access.
29904 </summary>
29905 </param>
29906 </interface>
29907 -<interface name="kernel_list_proc" lineno="1015">
29908 +<interface name="kernel_list_proc" lineno="1012">
29909 <summary>
29910 List the contents of directories in /proc.
29911 </summary>
29912 @@ -85683,7 +86390,7 @@ Domain allowed access.
29913 </summary>
29914 </param>
29915 </interface>
29916 -<interface name="kernel_dontaudit_list_proc" lineno="1034">
29917 +<interface name="kernel_dontaudit_list_proc" lineno="1031">
29918 <summary>
29919 Do not audit attempts to list the
29920 contents of directories in /proc.
29921 @@ -85694,7 +86401,7 @@ Domain to not audit.
29922 </summary>
29923 </param>
29924 </interface>
29925 -<interface name="kernel_dontaudit_write_proc_dirs" lineno="1053">
29926 +<interface name="kernel_dontaudit_write_proc_dirs" lineno="1050">
29927 <summary>
29928 Do not audit attempts to write the
29929 directories in /proc.
29930 @@ -85705,9 +86412,9 @@ Domain to not audit.
29931 </summary>
29932 </param>
29933 </interface>
29934 -<interface name="kernel_mounton_proc_dirs" lineno="1071">
29935 +<interface name="kernel_mounton_proc_dirs" lineno="1068">
29936 <summary>
29937 -Mount the directories in /proc.
29938 +Mount on the directories in /proc.
29939 </summary>
29940 <param name="domain">
29941 <summary>
29942 @@ -85715,7 +86422,7 @@ Domain allowed access.
29943 </summary>
29944 </param>
29945 </interface>
29946 -<interface name="kernel_getattr_proc_files" lineno="1089">
29947 +<interface name="kernel_getattr_proc_files" lineno="1086">
29948 <summary>
29949 Get the attributes of files in /proc.
29950 </summary>
29951 @@ -85725,7 +86432,7 @@ Domain allowed access.
29952 </summary>
29953 </param>
29954 </interface>
29955 -<interface name="kernel_read_proc_symlinks" lineno="1116">
29956 +<interface name="kernel_read_proc_symlinks" lineno="1113">
29957 <summary>
29958 Read generic symbolic links in /proc.
29959 </summary>
29960 @@ -85744,7 +86451,7 @@ Domain allowed access.
29961 </param>
29962 <infoflow type="read" weight="10"/>
29963 </interface>
29964 -<interface name="kernel_read_system_state" lineno="1155">
29965 +<interface name="kernel_read_system_state" lineno="1152">
29966 <summary>
29967 Allows caller to read system state information in /proc.
29968 </summary>
29969 @@ -85775,7 +86482,7 @@ Domain allowed access.
29970 <infoflow type="read" weight="10"/>
29971 <rolecap/>
29972 </interface>
29973 -<interface name="kernel_write_proc_files" lineno="1181">
29974 +<interface name="kernel_write_proc_files" lineno="1178">
29975 <summary>
29976 Write to generic proc entries.
29977 </summary>
29978 @@ -85786,7 +86493,7 @@ Domain allowed access.
29979 </param>
29980 <rolecap/>
29981 </interface>
29982 -<interface name="kernel_dontaudit_read_system_state" lineno="1200">
29983 +<interface name="kernel_dontaudit_read_system_state" lineno="1197">
29984 <summary>
29985 Do not audit attempts by caller to
29986 read system state information in proc.
29987 @@ -85797,7 +86504,7 @@ Domain to not audit.
29988 </summary>
29989 </param>
29990 </interface>
29991 -<interface name="kernel_dontaudit_read_proc_symlinks" lineno="1219">
29992 +<interface name="kernel_dontaudit_read_proc_symlinks" lineno="1216">
29993 <summary>
29994 Do not audit attempts by caller to
29995 read symbolic links in proc.
29996 @@ -85808,7 +86515,7 @@ Domain to not audit.
29997 </summary>
29998 </param>
29999 </interface>
30000 -<interface name="kernel_rw_afs_state" lineno="1238">
30001 +<interface name="kernel_rw_afs_state" lineno="1235">
30002 <summary>
30003 Allow caller to read and write state information for AFS.
30004 </summary>
30005 @@ -85819,7 +86526,7 @@ Domain allowed access.
30006 </param>
30007 <rolecap/>
30008 </interface>
30009 -<interface name="kernel_read_software_raid_state" lineno="1258">
30010 +<interface name="kernel_read_software_raid_state" lineno="1255">
30011 <summary>
30012 Allow caller to read the state information for software raid.
30013 </summary>
30014 @@ -85830,7 +86537,7 @@ Domain allowed access.
30015 </param>
30016 <rolecap/>
30017 </interface>
30018 -<interface name="kernel_rw_software_raid_state" lineno="1278">
30019 +<interface name="kernel_rw_software_raid_state" lineno="1275">
30020 <summary>
30021 Allow caller to read and set the state information for software raid.
30022 </summary>
30023 @@ -85840,7 +86547,7 @@ Domain allowed access.
30024 </summary>
30025 </param>
30026 </interface>
30027 -<interface name="kernel_getattr_core_if" lineno="1298">
30028 +<interface name="kernel_getattr_core_if" lineno="1295">
30029 <summary>
30030 Allows caller to get attributes of core kernel interface.
30031 </summary>
30032 @@ -85850,7 +86557,7 @@ Domain allowed access.
30033 </summary>
30034 </param>
30035 </interface>
30036 -<interface name="kernel_dontaudit_getattr_core_if" lineno="1319">
30037 +<interface name="kernel_dontaudit_getattr_core_if" lineno="1316">
30038 <summary>
30039 Do not audit attempts to get the attributes of
30040 core kernel interfaces.
30041 @@ -85861,7 +86568,7 @@ Domain to not audit.
30042 </summary>
30043 </param>
30044 </interface>
30045 -<interface name="kernel_read_core_if" lineno="1337">
30046 +<interface name="kernel_read_core_if" lineno="1334">
30047 <summary>
30048 Allows caller to read the core kernel interface.
30049 </summary>
30050 @@ -85871,7 +86578,7 @@ Domain allowed access.
30051 </summary>
30052 </param>
30053 </interface>
30054 -<interface name="kernel_read_messages" lineno="1361">
30055 +<interface name="kernel_read_messages" lineno="1358">
30056 <summary>
30057 Allow caller to read kernel messages
30058 using the /proc/kmsg interface.
30059 @@ -85882,7 +86589,7 @@ Domain allowed access.
30060 </summary>
30061 </param>
30062 </interface>
30063 -<interface name="kernel_getattr_message_if" lineno="1383">
30064 +<interface name="kernel_getattr_message_if" lineno="1380">
30065 <summary>
30066 Allow caller to get the attributes of kernel message
30067 interface (/proc/kmsg).
30068 @@ -85893,7 +86600,7 @@ Domain allowed access.
30069 </summary>
30070 </param>
30071 </interface>
30072 -<interface name="kernel_dontaudit_getattr_message_if" lineno="1402">
30073 +<interface name="kernel_dontaudit_getattr_message_if" lineno="1399">
30074 <summary>
30075 Do not audit attempts by caller to get the attributes of kernel
30076 message interfaces.
30077 @@ -85904,7 +86611,7 @@ Domain to not audit.
30078 </summary>
30079 </param>
30080 </interface>
30081 -<interface name="kernel_mounton_message_if" lineno="1421">
30082 +<interface name="kernel_mounton_message_if" lineno="1418">
30083 <summary>
30084 Mount on kernel message interfaces files.
30085 </summary>
30086 @@ -85915,7 +86622,7 @@ Domain allowed access.
30087 </param>
30088 <rolecap/>
30089 </interface>
30090 -<interface name="kernel_dontaudit_search_network_state" lineno="1442">
30091 +<interface name="kernel_dontaudit_search_network_state" lineno="1439">
30092 <summary>
30093 Do not audit attempts to search the network
30094 state directory.
30095 @@ -85927,7 +86634,7 @@ Domain to not audit.
30096 </param>
30097
30098 </interface>
30099 -<interface name="kernel_search_network_state" lineno="1461">
30100 +<interface name="kernel_search_network_state" lineno="1458">
30101 <summary>
30102 Allow searching of network state directory.
30103 </summary>
30104 @@ -85938,7 +86645,7 @@ Domain allowed access.
30105 </param>
30106
30107 </interface>
30108 -<interface name="kernel_read_network_state" lineno="1491">
30109 +<interface name="kernel_read_network_state" lineno="1488">
30110 <summary>
30111 Read the network state information.
30112 </summary>
30113 @@ -85960,7 +86667,7 @@ Domain allowed access.
30114 <infoflow type="read" weight="10"/>
30115 <rolecap/>
30116 </interface>
30117 -<interface name="kernel_read_network_state_symlinks" lineno="1512">
30118 +<interface name="kernel_read_network_state_symlinks" lineno="1509">
30119 <summary>
30120 Allow caller to read the network state symbolic links.
30121 </summary>
30122 @@ -85970,7 +86677,7 @@ Domain allowed access.
30123 </summary>
30124 </param>
30125 </interface>
30126 -<interface name="kernel_search_xen_state" lineno="1533">
30127 +<interface name="kernel_search_xen_state" lineno="1530">
30128 <summary>
30129 Allow searching of xen state directory.
30130 </summary>
30131 @@ -85981,7 +86688,7 @@ Domain allowed access.
30132 </param>
30133
30134 </interface>
30135 -<interface name="kernel_dontaudit_search_xen_state" lineno="1553">
30136 +<interface name="kernel_dontaudit_search_xen_state" lineno="1550">
30137 <summary>
30138 Do not audit attempts to search the xen
30139 state directory.
30140 @@ -85993,7 +86700,7 @@ Domain to not audit.
30141 </param>
30142
30143 </interface>
30144 -<interface name="kernel_read_xen_state" lineno="1572">
30145 +<interface name="kernel_read_xen_state" lineno="1569">
30146 <summary>
30147 Allow caller to read the xen state information.
30148 </summary>
30149 @@ -86004,7 +86711,7 @@ Domain allowed access.
30150 </param>
30151
30152 </interface>
30153 -<interface name="kernel_read_xen_state_symlinks" lineno="1594">
30154 +<interface name="kernel_read_xen_state_symlinks" lineno="1591">
30155 <summary>
30156 Allow caller to read the xen state symbolic links.
30157 </summary>
30158 @@ -86015,7 +86722,7 @@ Domain allowed access.
30159 </param>
30160
30161 </interface>
30162 -<interface name="kernel_write_xen_state" lineno="1615">
30163 +<interface name="kernel_write_xen_state" lineno="1612">
30164 <summary>
30165 Allow caller to write xen state information.
30166 </summary>
30167 @@ -86026,7 +86733,7 @@ Domain allowed access.
30168 </param>
30169
30170 </interface>
30171 -<interface name="kernel_list_all_proc" lineno="1633">
30172 +<interface name="kernel_list_all_proc" lineno="1630">
30173 <summary>
30174 Allow attempts to list all proc directories.
30175 </summary>
30176 @@ -86036,7 +86743,7 @@ Domain allowed access.
30177 </summary>
30178 </param>
30179 </interface>
30180 -<interface name="kernel_dontaudit_list_all_proc" lineno="1652">
30181 +<interface name="kernel_dontaudit_list_all_proc" lineno="1649">
30182 <summary>
30183 Do not audit attempts to list all proc directories.
30184 </summary>
30185 @@ -86046,7 +86753,7 @@ Domain to not audit.
30186 </summary>
30187 </param>
30188 </interface>
30189 -<interface name="kernel_dontaudit_search_sysctl" lineno="1673">
30190 +<interface name="kernel_dontaudit_search_sysctl" lineno="1670">
30191 <summary>
30192 Do not audit attempts by caller to search
30193 the base directory of sysctls.
30194 @@ -86058,7 +86765,7 @@ Domain to not audit.
30195 </param>
30196
30197 </interface>
30198 -<interface name="kernel_mounton_sysctl_dirs" lineno="1692">
30199 +<interface name="kernel_mounton_sysctl_dirs" lineno="1689">
30200 <summary>
30201 Mount on sysctl_t dirs.
30202 </summary>
30203 @@ -86069,7 +86776,7 @@ Domain allowed access.
30204 </param>
30205 <rolecap/>
30206 </interface>
30207 -<interface name="kernel_read_sysctl" lineno="1712">
30208 +<interface name="kernel_read_sysctl" lineno="1709">
30209 <summary>
30210 Allow access to read sysctl directories.
30211 </summary>
30212 @@ -86080,7 +86787,7 @@ Domain allowed access.
30213 </param>
30214
30215 </interface>
30216 -<interface name="kernel_mounton_sysctl_files" lineno="1732">
30217 +<interface name="kernel_mounton_sysctl_files" lineno="1729">
30218 <summary>
30219 Mount on sysctl files.
30220 </summary>
30221 @@ -86091,7 +86798,7 @@ Domain allowed access.
30222 </param>
30223 <rolecap/>
30224 </interface>
30225 -<interface name="kernel_read_device_sysctls" lineno="1752">
30226 +<interface name="kernel_read_device_sysctls" lineno="1749">
30227 <summary>
30228 Allow caller to read the device sysctls.
30229 </summary>
30230 @@ -86102,7 +86809,7 @@ Domain allowed access.
30231 </param>
30232 <rolecap/>
30233 </interface>
30234 -<interface name="kernel_rw_device_sysctls" lineno="1773">
30235 +<interface name="kernel_rw_device_sysctls" lineno="1770">
30236 <summary>
30237 Read and write device sysctls.
30238 </summary>
30239 @@ -86113,7 +86820,7 @@ Domain allowed access.
30240 </param>
30241 <rolecap/>
30242 </interface>
30243 -<interface name="kernel_search_vm_sysctl" lineno="1793">
30244 +<interface name="kernel_search_vm_sysctl" lineno="1790">
30245 <summary>
30246 Allow caller to search virtual memory sysctls.
30247 </summary>
30248 @@ -86123,7 +86830,7 @@ Domain allowed access.
30249 </summary>
30250 </param>
30251 </interface>
30252 -<interface name="kernel_read_vm_sysctls" lineno="1812">
30253 +<interface name="kernel_read_vm_sysctls" lineno="1809">
30254 <summary>
30255 Allow caller to read virtual memory sysctls.
30256 </summary>
30257 @@ -86134,7 +86841,7 @@ Domain allowed access.
30258 </param>
30259 <rolecap/>
30260 </interface>
30261 -<interface name="kernel_rw_vm_sysctls" lineno="1833">
30262 +<interface name="kernel_rw_vm_sysctls" lineno="1830">
30263 <summary>
30264 Read and write virtual memory sysctls.
30265 </summary>
30266 @@ -86145,7 +86852,7 @@ Domain allowed access.
30267 </param>
30268 <rolecap/>
30269 </interface>
30270 -<interface name="kernel_search_network_sysctl" lineno="1855">
30271 +<interface name="kernel_search_network_sysctl" lineno="1852">
30272 <summary>
30273 Search network sysctl directories.
30274 </summary>
30275 @@ -86155,7 +86862,7 @@ Domain allowed access.
30276 </summary>
30277 </param>
30278 </interface>
30279 -<interface name="kernel_dontaudit_search_network_sysctl" lineno="1873">
30280 +<interface name="kernel_dontaudit_search_network_sysctl" lineno="1870">
30281 <summary>
30282 Do not audit attempts by caller to search network sysctl directories.
30283 </summary>
30284 @@ -86165,7 +86872,7 @@ Domain to not audit.
30285 </summary>
30286 </param>
30287 </interface>
30288 -<interface name="kernel_read_net_sysctls" lineno="1892">
30289 +<interface name="kernel_read_net_sysctls" lineno="1889">
30290 <summary>
30291 Allow caller to read network sysctls.
30292 </summary>
30293 @@ -86176,7 +86883,7 @@ Domain allowed access.
30294 </param>
30295 <rolecap/>
30296 </interface>
30297 -<interface name="kernel_rw_net_sysctls" lineno="1913">
30298 +<interface name="kernel_rw_net_sysctls" lineno="1910">
30299 <summary>
30300 Allow caller to modiry contents of sysctl network files.
30301 </summary>
30302 @@ -86187,7 +86894,7 @@ Domain allowed access.
30303 </param>
30304 <rolecap/>
30305 </interface>
30306 -<interface name="kernel_read_unix_sysctls" lineno="1935">
30307 +<interface name="kernel_read_unix_sysctls" lineno="1932">
30308 <summary>
30309 Allow caller to read unix domain
30310 socket sysctls.
30311 @@ -86199,7 +86906,7 @@ Domain allowed access.
30312 </param>
30313 <rolecap/>
30314 </interface>
30315 -<interface name="kernel_rw_unix_sysctls" lineno="1957">
30316 +<interface name="kernel_rw_unix_sysctls" lineno="1954">
30317 <summary>
30318 Read and write unix domain
30319 socket sysctls.
30320 @@ -86211,7 +86918,7 @@ Domain allowed access.
30321 </param>
30322 <rolecap/>
30323 </interface>
30324 -<interface name="kernel_read_hotplug_sysctls" lineno="1978">
30325 +<interface name="kernel_read_hotplug_sysctls" lineno="1975">
30326 <summary>
30327 Read the hotplug sysctl.
30328 </summary>
30329 @@ -86222,7 +86929,7 @@ Domain allowed access.
30330 </param>
30331 <rolecap/>
30332 </interface>
30333 -<interface name="kernel_rw_hotplug_sysctls" lineno="1999">
30334 +<interface name="kernel_rw_hotplug_sysctls" lineno="1996">
30335 <summary>
30336 Read and write the hotplug sysctl.
30337 </summary>
30338 @@ -86233,7 +86940,7 @@ Domain allowed access.
30339 </param>
30340 <rolecap/>
30341 </interface>
30342 -<interface name="kernel_read_modprobe_sysctls" lineno="2020">
30343 +<interface name="kernel_read_modprobe_sysctls" lineno="2017">
30344 <summary>
30345 Read the modprobe sysctl.
30346 </summary>
30347 @@ -86244,7 +86951,7 @@ Domain allowed access.
30348 </param>
30349 <rolecap/>
30350 </interface>
30351 -<interface name="kernel_rw_modprobe_sysctls" lineno="2041">
30352 +<interface name="kernel_rw_modprobe_sysctls" lineno="2038">
30353 <summary>
30354 Read and write the modprobe sysctl.
30355 </summary>
30356 @@ -86255,7 +86962,7 @@ Domain allowed access.
30357 </param>
30358 <rolecap/>
30359 </interface>
30360 -<interface name="kernel_dontaudit_search_kernel_sysctl" lineno="2061">
30361 +<interface name="kernel_dontaudit_search_kernel_sysctl" lineno="2058">
30362 <summary>
30363 Do not audit attempts to search generic kernel sysctls.
30364 </summary>
30365 @@ -86265,7 +86972,7 @@ Domain to not audit.
30366 </summary>
30367 </param>
30368 </interface>
30369 -<interface name="kernel_dontaudit_read_kernel_sysctl" lineno="2079">
30370 +<interface name="kernel_dontaudit_read_kernel_sysctl" lineno="2076">
30371 <summary>
30372 Do not audit attempted reading of kernel sysctls
30373 </summary>
30374 @@ -86275,7 +86982,7 @@ Domain to not audit accesses from
30375 </summary>
30376 </param>
30377 </interface>
30378 -<interface name="kernel_read_crypto_sysctls" lineno="2097">
30379 +<interface name="kernel_read_crypto_sysctls" lineno="2094">
30380 <summary>
30381 Read generic crypto sysctls.
30382 </summary>
30383 @@ -86285,7 +86992,7 @@ Domain allowed access.
30384 </summary>
30385 </param>
30386 </interface>
30387 -<interface name="kernel_read_kernel_sysctls" lineno="2138">
30388 +<interface name="kernel_read_kernel_sysctls" lineno="2135">
30389 <summary>
30390 Read general kernel sysctls.
30391 </summary>
30392 @@ -86317,7 +87024,7 @@ Domain allowed access.
30393 </param>
30394 <infoflow type="read" weight="10"/>
30395 </interface>
30396 -<interface name="kernel_dontaudit_write_kernel_sysctl" lineno="2158">
30397 +<interface name="kernel_dontaudit_write_kernel_sysctl" lineno="2155">
30398 <summary>
30399 Do not audit attempts to write generic kernel sysctls.
30400 </summary>
30401 @@ -86327,7 +87034,7 @@ Domain to not audit.
30402 </summary>
30403 </param>
30404 </interface>
30405 -<interface name="kernel_rw_kernel_sysctl" lineno="2177">
30406 +<interface name="kernel_rw_kernel_sysctl" lineno="2174">
30407 <summary>
30408 Read and write generic kernel sysctls.
30409 </summary>
30410 @@ -86338,7 +87045,7 @@ Domain allowed access.
30411 </param>
30412 <rolecap/>
30413 </interface>
30414 -<interface name="kernel_mounton_kernel_sysctl_files" lineno="2198">
30415 +<interface name="kernel_mounton_kernel_sysctl_files" lineno="2195">
30416 <summary>
30417 Mount on kernel sysctl files.
30418 </summary>
30419 @@ -86349,7 +87056,7 @@ Domain allowed access.
30420 </param>
30421 <rolecap/>
30422 </interface>
30423 -<interface name="kernel_read_kernel_ns_lastpid_sysctls" lineno="2218">
30424 +<interface name="kernel_read_kernel_ns_lastpid_sysctls" lineno="2215">
30425 <summary>
30426 Read kernel ns lastpid sysctls.
30427 </summary>
30428 @@ -86360,7 +87067,7 @@ Domain allowed access.
30429 </param>
30430 <rolecap/>
30431 </interface>
30432 -<interface name="kernel_dontaudit_write_kernel_ns_lastpid_sysctl" lineno="2238">
30433 +<interface name="kernel_dontaudit_write_kernel_ns_lastpid_sysctl" lineno="2235">
30434 <summary>
30435 Do not audit attempts to write kernel ns lastpid sysctls.
30436 </summary>
30437 @@ -86370,7 +87077,7 @@ Domain to not audit.
30438 </summary>
30439 </param>
30440 </interface>
30441 -<interface name="kernel_rw_kernel_ns_lastpid_sysctl" lineno="2257">
30442 +<interface name="kernel_rw_kernel_ns_lastpid_sysctl" lineno="2254">
30443 <summary>
30444 Read and write kernel ns lastpid sysctls.
30445 </summary>
30446 @@ -86381,7 +87088,7 @@ Domain allowed access.
30447 </param>
30448 <rolecap/>
30449 </interface>
30450 -<interface name="kernel_search_fs_sysctls" lineno="2278">
30451 +<interface name="kernel_search_fs_sysctls" lineno="2275">
30452 <summary>
30453 Search filesystem sysctl directories.
30454 </summary>
30455 @@ -86392,7 +87099,7 @@ Domain allowed access.
30456 </param>
30457 <rolecap/>
30458 </interface>
30459 -<interface name="kernel_read_fs_sysctls" lineno="2297">
30460 +<interface name="kernel_read_fs_sysctls" lineno="2294">
30461 <summary>
30462 Read filesystem sysctls.
30463 </summary>
30464 @@ -86403,7 +87110,7 @@ Domain allowed access.
30465 </param>
30466 <rolecap/>
30467 </interface>
30468 -<interface name="kernel_rw_fs_sysctls" lineno="2318">
30469 +<interface name="kernel_rw_fs_sysctls" lineno="2315">
30470 <summary>
30471 Read and write filesystem sysctls.
30472 </summary>
30473 @@ -86414,7 +87121,7 @@ Domain allowed access.
30474 </param>
30475 <rolecap/>
30476 </interface>
30477 -<interface name="kernel_read_irq_sysctls" lineno="2339">
30478 +<interface name="kernel_read_irq_sysctls" lineno="2336">
30479 <summary>
30480 Read IRQ sysctls.
30481 </summary>
30482 @@ -86425,7 +87132,19 @@ Domain allowed access.
30483 </param>
30484 <rolecap/>
30485 </interface>
30486 -<interface name="kernel_rw_irq_sysctls" lineno="2360">
30487 +<interface name="kernel_dontaudit_search_fs_sysctls" lineno="2358">
30488 +<summary>
30489 +Do not audit attempts to search
30490 +filesystem sysctl directories.
30491 +</summary>
30492 +<param name="domain">
30493 +<summary>
30494 +Domain to not audit.
30495 +</summary>
30496 +</param>
30497 +<rolecap/>
30498 +</interface>
30499 +<interface name="kernel_rw_irq_sysctls" lineno="2377">
30500 <summary>
30501 Read and write IRQ sysctls.
30502 </summary>
30503 @@ -86436,7 +87155,7 @@ Domain allowed access.
30504 </param>
30505 <rolecap/>
30506 </interface>
30507 -<interface name="kernel_read_rpc_sysctls" lineno="2381">
30508 +<interface name="kernel_read_rpc_sysctls" lineno="2398">
30509 <summary>
30510 Read RPC sysctls.
30511 </summary>
30512 @@ -86447,7 +87166,7 @@ Domain allowed access.
30513 </param>
30514 <rolecap/>
30515 </interface>
30516 -<interface name="kernel_rw_rpc_sysctls" lineno="2402">
30517 +<interface name="kernel_rw_rpc_sysctls" lineno="2419">
30518 <summary>
30519 Read and write RPC sysctls.
30520 </summary>
30521 @@ -86458,7 +87177,7 @@ Domain allowed access.
30522 </param>
30523 <rolecap/>
30524 </interface>
30525 -<interface name="kernel_dontaudit_list_all_sysctls" lineno="2422">
30526 +<interface name="kernel_dontaudit_list_all_sysctls" lineno="2439">
30527 <summary>
30528 Do not audit attempts to list all sysctl directories.
30529 </summary>
30530 @@ -86468,7 +87187,7 @@ Domain to not audit.
30531 </summary>
30532 </param>
30533 </interface>
30534 -<interface name="kernel_read_all_sysctls" lineno="2442">
30535 +<interface name="kernel_read_all_sysctls" lineno="2459">
30536 <summary>
30537 Allow caller to read all sysctls.
30538 </summary>
30539 @@ -86479,7 +87198,7 @@ Domain allowed access.
30540 </param>
30541 <rolecap/>
30542 </interface>
30543 -<interface name="kernel_rw_all_sysctls" lineno="2465">
30544 +<interface name="kernel_rw_all_sysctls" lineno="2482">
30545 <summary>
30546 Read and write all sysctls.
30547 </summary>
30548 @@ -86490,7 +87209,7 @@ Domain allowed access.
30549 </param>
30550 <rolecap/>
30551 </interface>
30552 -<interface name="kernel_associate_proc" lineno="2490">
30553 +<interface name="kernel_associate_proc" lineno="2507">
30554 <summary>
30555 Associate a file to proc_t (/proc)
30556 </summary>
30557 @@ -86501,7 +87220,7 @@ Domain allowed access.
30558 </param>
30559 <rolecap/>
30560 </interface>
30561 -<interface name="kernel_kill_unlabeled" lineno="2507">
30562 +<interface name="kernel_kill_unlabeled" lineno="2524">
30563 <summary>
30564 Send a kill signal to unlabeled processes.
30565 </summary>
30566 @@ -86511,7 +87230,7 @@ Domain allowed access.
30567 </summary>
30568 </param>
30569 </interface>
30570 -<interface name="kernel_mount_unlabeled" lineno="2525">
30571 +<interface name="kernel_mount_unlabeled" lineno="2542">
30572 <summary>
30573 Mount a kernel unlabeled filesystem.
30574 </summary>
30575 @@ -86521,7 +87240,7 @@ Domain allowed access.
30576 </summary>
30577 </param>
30578 </interface>
30579 -<interface name="kernel_unmount_unlabeled" lineno="2543">
30580 +<interface name="kernel_unmount_unlabeled" lineno="2560">
30581 <summary>
30582 Unmount a kernel unlabeled filesystem.
30583 </summary>
30584 @@ -86531,7 +87250,7 @@ Domain allowed access.
30585 </summary>
30586 </param>
30587 </interface>
30588 -<interface name="kernel_signal_unlabeled" lineno="2561">
30589 +<interface name="kernel_signal_unlabeled" lineno="2578">
30590 <summary>
30591 Send general signals to unlabeled processes.
30592 </summary>
30593 @@ -86541,7 +87260,7 @@ Domain allowed access.
30594 </summary>
30595 </param>
30596 </interface>
30597 -<interface name="kernel_signull_unlabeled" lineno="2579">
30598 +<interface name="kernel_signull_unlabeled" lineno="2596">
30599 <summary>
30600 Send a null signal to unlabeled processes.
30601 </summary>
30602 @@ -86551,7 +87270,7 @@ Domain allowed access.
30603 </summary>
30604 </param>
30605 </interface>
30606 -<interface name="kernel_sigstop_unlabeled" lineno="2597">
30607 +<interface name="kernel_sigstop_unlabeled" lineno="2614">
30608 <summary>
30609 Send a stop signal to unlabeled processes.
30610 </summary>
30611 @@ -86561,7 +87280,7 @@ Domain allowed access.
30612 </summary>
30613 </param>
30614 </interface>
30615 -<interface name="kernel_sigchld_unlabeled" lineno="2615">
30616 +<interface name="kernel_sigchld_unlabeled" lineno="2632">
30617 <summary>
30618 Send a child terminated signal to unlabeled processes.
30619 </summary>
30620 @@ -86571,7 +87290,7 @@ Domain allowed access.
30621 </summary>
30622 </param>
30623 </interface>
30624 -<interface name="kernel_getattr_unlabeled_dirs" lineno="2633">
30625 +<interface name="kernel_getattr_unlabeled_dirs" lineno="2650">
30626 <summary>
30627 Get the attributes of unlabeled directories.
30628 </summary>
30629 @@ -86581,7 +87300,7 @@ Domain allowed access.
30630 </summary>
30631 </param>
30632 </interface>
30633 -<interface name="kernel_dontaudit_search_unlabeled" lineno="2651">
30634 +<interface name="kernel_dontaudit_search_unlabeled" lineno="2668">
30635 <summary>
30636 Do not audit attempts to search unlabeled directories.
30637 </summary>
30638 @@ -86591,7 +87310,7 @@ Domain to not audit.
30639 </summary>
30640 </param>
30641 </interface>
30642 -<interface name="kernel_list_unlabeled" lineno="2669">
30643 +<interface name="kernel_list_unlabeled" lineno="2686">
30644 <summary>
30645 List unlabeled directories.
30646 </summary>
30647 @@ -86601,7 +87320,7 @@ Domain allowed access.
30648 </summary>
30649 </param>
30650 </interface>
30651 -<interface name="kernel_read_unlabeled_state" lineno="2687">
30652 +<interface name="kernel_read_unlabeled_state" lineno="2704">
30653 <summary>
30654 Read the process state (/proc/pid) of all unlabeled_t.
30655 </summary>
30656 @@ -86611,7 +87330,7 @@ Domain allowed access.
30657 </summary>
30658 </param>
30659 </interface>
30660 -<interface name="kernel_dontaudit_list_unlabeled" lineno="2707">
30661 +<interface name="kernel_dontaudit_list_unlabeled" lineno="2724">
30662 <summary>
30663 Do not audit attempts to list unlabeled directories.
30664 </summary>
30665 @@ -86621,7 +87340,7 @@ Domain allowed access.
30666 </summary>
30667 </param>
30668 </interface>
30669 -<interface name="kernel_rw_unlabeled_dirs" lineno="2725">
30670 +<interface name="kernel_rw_unlabeled_dirs" lineno="2742">
30671 <summary>
30672 Read and write unlabeled directories.
30673 </summary>
30674 @@ -86631,7 +87350,7 @@ Domain allowed access.
30675 </summary>
30676 </param>
30677 </interface>
30678 -<interface name="kernel_delete_unlabeled_dirs" lineno="2743">
30679 +<interface name="kernel_delete_unlabeled_dirs" lineno="2760">
30680 <summary>
30681 Delete unlabeled directories.
30682 </summary>
30683 @@ -86641,7 +87360,7 @@ Domain allowed access.
30684 </summary>
30685 </param>
30686 </interface>
30687 -<interface name="kernel_manage_unlabeled_dirs" lineno="2761">
30688 +<interface name="kernel_manage_unlabeled_dirs" lineno="2778">
30689 <summary>
30690 Create, read, write, and delete unlabeled directories.
30691 </summary>
30692 @@ -86651,7 +87370,7 @@ Domain allowed access.
30693 </summary>
30694 </param>
30695 </interface>
30696 -<interface name="kernel_mounton_unlabeled_dirs" lineno="2779">
30697 +<interface name="kernel_mounton_unlabeled_dirs" lineno="2796">
30698 <summary>
30699 Mount a filesystem on an unlabeled directory.
30700 </summary>
30701 @@ -86661,7 +87380,7 @@ Domain allowed access.
30702 </summary>
30703 </param>
30704 </interface>
30705 -<interface name="kernel_read_unlabeled_files" lineno="2797">
30706 +<interface name="kernel_read_unlabeled_files" lineno="2814">
30707 <summary>
30708 Read unlabeled files.
30709 </summary>
30710 @@ -86671,7 +87390,7 @@ Domain allowed access.
30711 </summary>
30712 </param>
30713 </interface>
30714 -<interface name="kernel_rw_unlabeled_files" lineno="2815">
30715 +<interface name="kernel_rw_unlabeled_files" lineno="2832">
30716 <summary>
30717 Read and write unlabeled files.
30718 </summary>
30719 @@ -86681,7 +87400,7 @@ Domain allowed access.
30720 </summary>
30721 </param>
30722 </interface>
30723 -<interface name="kernel_delete_unlabeled_files" lineno="2833">
30724 +<interface name="kernel_delete_unlabeled_files" lineno="2850">
30725 <summary>
30726 Delete unlabeled files.
30727 </summary>
30728 @@ -86691,7 +87410,7 @@ Domain allowed access.
30729 </summary>
30730 </param>
30731 </interface>
30732 -<interface name="kernel_manage_unlabeled_files" lineno="2851">
30733 +<interface name="kernel_manage_unlabeled_files" lineno="2868">
30734 <summary>
30735 Create, read, write, and delete unlabeled files.
30736 </summary>
30737 @@ -86701,7 +87420,7 @@ Domain allowed access.
30738 </summary>
30739 </param>
30740 </interface>
30741 -<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2870">
30742 +<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2887">
30743 <summary>
30744 Do not audit attempts by caller to get the
30745 attributes of an unlabeled file.
30746 @@ -86712,7 +87431,7 @@ Domain to not audit.
30747 </summary>
30748 </param>
30749 </interface>
30750 -<interface name="kernel_dontaudit_read_unlabeled_files" lineno="2889">
30751 +<interface name="kernel_dontaudit_read_unlabeled_files" lineno="2906">
30752 <summary>
30753 Do not audit attempts by caller to
30754 read an unlabeled file.
30755 @@ -86723,7 +87442,33 @@ Domain to not audit.
30756 </summary>
30757 </param>
30758 </interface>
30759 -<interface name="kernel_delete_unlabeled_symlinks" lineno="2907">
30760 +<interface name="kernel_unlabeled_filetrans" lineno="2940">
30761 +<summary>
30762 +Create an object in unlabeled directories
30763 +with a private type.
30764 +</summary>
30765 +<param name="domain">
30766 +<summary>
30767 +Domain allowed access.
30768 +</summary>
30769 +</param>
30770 +<param name="private type">
30771 +<summary>
30772 +The type of the object to be created.
30773 +</summary>
30774 +</param>
30775 +<param name="object">
30776 +<summary>
30777 +The object class of the object being created.
30778 +</summary>
30779 +</param>
30780 +<param name="name" optional="true">
30781 +<summary>
30782 +The name of the object being created.
30783 +</summary>
30784 +</param>
30785 +</interface>
30786 +<interface name="kernel_delete_unlabeled_symlinks" lineno="2958">
30787 <summary>
30788 Delete unlabeled symbolic links.
30789 </summary>
30790 @@ -86733,7 +87478,7 @@ Domain allowed access.
30791 </summary>
30792 </param>
30793 </interface>
30794 -<interface name="kernel_manage_unlabeled_symlinks" lineno="2925">
30795 +<interface name="kernel_manage_unlabeled_symlinks" lineno="2976">
30796 <summary>
30797 Create, read, write, and delete unlabeled symbolic links.
30798 </summary>
30799 @@ -86743,7 +87488,7 @@ Domain allowed access.
30800 </summary>
30801 </param>
30802 </interface>
30803 -<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="2944">
30804 +<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="2995">
30805 <summary>
30806 Do not audit attempts by caller to get the
30807 attributes of unlabeled symbolic links.
30808 @@ -86754,7 +87499,7 @@ Domain to not audit.
30809 </summary>
30810 </param>
30811 </interface>
30812 -<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="2963">
30813 +<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="3014">
30814 <summary>
30815 Do not audit attempts by caller to get the
30816 attributes of unlabeled named pipes.
30817 @@ -86765,7 +87510,7 @@ Domain to not audit.
30818 </summary>
30819 </param>
30820 </interface>
30821 -<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="2982">
30822 +<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="3033">
30823 <summary>
30824 Do not audit attempts by caller to get the
30825 attributes of unlabeled named sockets.
30826 @@ -86776,7 +87521,7 @@ Domain to not audit.
30827 </summary>
30828 </param>
30829 </interface>
30830 -<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="3001">
30831 +<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="3052">
30832 <summary>
30833 Do not audit attempts by caller to get attributes for
30834 unlabeled block devices.
30835 @@ -86787,7 +87532,7 @@ Domain to not audit.
30836 </summary>
30837 </param>
30838 </interface>
30839 -<interface name="kernel_rw_unlabeled_blk_files" lineno="3019">
30840 +<interface name="kernel_rw_unlabeled_blk_files" lineno="3070">
30841 <summary>
30842 Read and write unlabeled block device nodes.
30843 </summary>
30844 @@ -86797,7 +87542,7 @@ Domain allowed access.
30845 </summary>
30846 </param>
30847 </interface>
30848 -<interface name="kernel_delete_unlabeled_blk_files" lineno="3037">
30849 +<interface name="kernel_delete_unlabeled_blk_files" lineno="3088">
30850 <summary>
30851 Delete unlabeled block device nodes.
30852 </summary>
30853 @@ -86807,7 +87552,7 @@ Domain allowed access.
30854 </summary>
30855 </param>
30856 </interface>
30857 -<interface name="kernel_manage_unlabeled_blk_files" lineno="3055">
30858 +<interface name="kernel_manage_unlabeled_blk_files" lineno="3106">
30859 <summary>
30860 Create, read, write, and delete unlabeled block device nodes.
30861 </summary>
30862 @@ -86817,7 +87562,7 @@ Domain allowed access.
30863 </summary>
30864 </param>
30865 </interface>
30866 -<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="3074">
30867 +<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="3125">
30868 <summary>
30869 Do not audit attempts by caller to get attributes for
30870 unlabeled character devices.
30871 @@ -86828,7 +87573,7 @@ Domain to not audit.
30872 </summary>
30873 </param>
30874 </interface>
30875 -<interface name="kernel_dontaudit_write_unlabeled_chr_files" lineno="3093">
30876 +<interface name="kernel_dontaudit_write_unlabeled_chr_files" lineno="3144">
30877 <summary>
30878 Do not audit attempts to
30879 write unlabeled character devices.
30880 @@ -86839,7 +87584,7 @@ Domain to not audit.
30881 </summary>
30882 </param>
30883 </interface>
30884 -<interface name="kernel_delete_unlabeled_chr_files" lineno="3111">
30885 +<interface name="kernel_delete_unlabeled_chr_files" lineno="3162">
30886 <summary>
30887 Delete unlabeled character device nodes.
30888 </summary>
30889 @@ -86849,7 +87594,7 @@ Domain allowed access.
30890 </summary>
30891 </param>
30892 </interface>
30893 -<interface name="kernel_manage_unlabeled_chr_files" lineno="3130">
30894 +<interface name="kernel_manage_unlabeled_chr_files" lineno="3181">
30895 <summary>
30896 Create, read, write, and delete unlabeled character device nodes.
30897 </summary>
30898 @@ -86859,7 +87604,7 @@ Domain allowed access.
30899 </summary>
30900 </param>
30901 </interface>
30902 -<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="3148">
30903 +<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="3199">
30904 <summary>
30905 Allow caller to relabel unlabeled directories.
30906 </summary>
30907 @@ -86869,7 +87614,7 @@ Domain allowed access.
30908 </summary>
30909 </param>
30910 </interface>
30911 -<interface name="kernel_relabelfrom_unlabeled_files" lineno="3166">
30912 +<interface name="kernel_relabelfrom_unlabeled_files" lineno="3217">
30913 <summary>
30914 Allow caller to relabel unlabeled files.
30915 </summary>
30916 @@ -86879,7 +87624,7 @@ Domain allowed access.
30917 </summary>
30918 </param>
30919 </interface>
30920 -<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="3185">
30921 +<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="3236">
30922 <summary>
30923 Allow caller to relabel unlabeled symbolic links.
30924 </summary>
30925 @@ -86889,7 +87634,7 @@ Domain allowed access.
30926 </summary>
30927 </param>
30928 </interface>
30929 -<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="3204">
30930 +<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="3255">
30931 <summary>
30932 Allow caller to relabel unlabeled named pipes.
30933 </summary>
30934 @@ -86899,7 +87644,7 @@ Domain allowed access.
30935 </summary>
30936 </param>
30937 </interface>
30938 -<interface name="kernel_delete_unlabeled_pipes" lineno="3223">
30939 +<interface name="kernel_delete_unlabeled_pipes" lineno="3274">
30940 <summary>
30941 Delete unlabeled named pipes
30942 </summary>
30943 @@ -86909,7 +87654,7 @@ Domain allowed access.
30944 </summary>
30945 </param>
30946 </interface>
30947 -<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="3241">
30948 +<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="3292">
30949 <summary>
30950 Allow caller to relabel unlabeled named sockets.
30951 </summary>
30952 @@ -86919,7 +87664,7 @@ Domain allowed access.
30953 </summary>
30954 </param>
30955 </interface>
30956 -<interface name="kernel_delete_unlabeled_sockets" lineno="3260">
30957 +<interface name="kernel_delete_unlabeled_sockets" lineno="3311">
30958 <summary>
30959 Delete unlabeled named sockets.
30960 </summary>
30961 @@ -86929,7 +87674,7 @@ Domain allowed access.
30962 </summary>
30963 </param>
30964 </interface>
30965 -<interface name="kernel_relabelfrom_unlabeled_blk_devs" lineno="3278">
30966 +<interface name="kernel_relabelfrom_unlabeled_blk_devs" lineno="3329">
30967 <summary>
30968 Allow caller to relabel from unlabeled block devices.
30969 </summary>
30970 @@ -86939,7 +87684,7 @@ Domain allowed access.
30971 </summary>
30972 </param>
30973 </interface>
30974 -<interface name="kernel_relabelfrom_unlabeled_chr_devs" lineno="3296">
30975 +<interface name="kernel_relabelfrom_unlabeled_chr_devs" lineno="3347">
30976 <summary>
30977 Allow caller to relabel from unlabeled character devices.
30978 </summary>
30979 @@ -86949,7 +87694,7 @@ Domain allowed access.
30980 </summary>
30981 </param>
30982 </interface>
30983 -<interface name="kernel_sendrecv_unlabeled_association" lineno="3329">
30984 +<interface name="kernel_sendrecv_unlabeled_association" lineno="3380">
30985 <summary>
30986 Send and receive messages from an
30987 unlabeled IPSEC association.
30988 @@ -86974,7 +87719,7 @@ Domain allowed access.
30989 </summary>
30990 </param>
30991 </interface>
30992 -<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="3362">
30993 +<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="3413">
30994 <summary>
30995 Do not audit attempts to send and receive messages
30996 from an unlabeled IPSEC association.
30997 @@ -86999,7 +87744,7 @@ Domain to not audit.
30998 </summary>
30999 </param>
31000 </interface>
31001 -<interface name="kernel_tcp_recvfrom_unlabeled" lineno="3389">
31002 +<interface name="kernel_tcp_recvfrom_unlabeled" lineno="3440">
31003 <summary>
31004 Receive TCP packets from an unlabeled connection.
31005 </summary>
31006 @@ -87018,7 +87763,7 @@ Domain allowed access.
31007 </summary>
31008 </param>
31009 </interface>
31010 -<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="3418">
31011 +<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="3469">
31012 <summary>
31013 Do not audit attempts to receive TCP packets from an unlabeled
31014 connection.
31015 @@ -87039,7 +87784,7 @@ Domain to not audit.
31016 </summary>
31017 </param>
31018 </interface>
31019 -<interface name="kernel_udp_recvfrom_unlabeled" lineno="3445">
31020 +<interface name="kernel_udp_recvfrom_unlabeled" lineno="3496">
31021 <summary>
31022 Receive UDP packets from an unlabeled connection.
31023 </summary>
31024 @@ -87058,7 +87803,7 @@ Domain allowed access.
31025 </summary>
31026 </param>
31027 </interface>
31028 -<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="3474">
31029 +<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="3525">
31030 <summary>
31031 Do not audit attempts to receive UDP packets from an unlabeled
31032 connection.
31033 @@ -87079,7 +87824,7 @@ Domain to not audit.
31034 </summary>
31035 </param>
31036 </interface>
31037 -<interface name="kernel_raw_recvfrom_unlabeled" lineno="3501">
31038 +<interface name="kernel_raw_recvfrom_unlabeled" lineno="3552">
31039 <summary>
31040 Receive Raw IP packets from an unlabeled connection.
31041 </summary>
31042 @@ -87098,7 +87843,7 @@ Domain allowed access.
31043 </summary>
31044 </param>
31045 </interface>
31046 -<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="3530">
31047 +<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="3581">
31048 <summary>
31049 Do not audit attempts to receive Raw IP packets from an unlabeled
31050 connection.
31051 @@ -87119,7 +87864,7 @@ Domain to not audit.
31052 </summary>
31053 </param>
31054 </interface>
31055 -<interface name="kernel_sendrecv_unlabeled_packets" lineno="3560">
31056 +<interface name="kernel_sendrecv_unlabeled_packets" lineno="3611">
31057 <summary>
31058 Send and receive unlabeled packets.
31059 </summary>
31060 @@ -87141,7 +87886,7 @@ Domain allowed access.
31061 </summary>
31062 </param>
31063 </interface>
31064 -<interface name="kernel_recvfrom_unlabeled_peer" lineno="3588">
31065 +<interface name="kernel_recvfrom_unlabeled_peer" lineno="3639">
31066 <summary>
31067 Receive packets from an unlabeled peer.
31068 </summary>
31069 @@ -87161,7 +87906,7 @@ Domain allowed access.
31070 </summary>
31071 </param>
31072 </interface>
31073 -<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="3616">
31074 +<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="3667">
31075 <summary>
31076 Do not audit attempts to receive packets from an unlabeled peer.
31077 </summary>
31078 @@ -87181,7 +87926,7 @@ Domain to not audit.
31079 </summary>
31080 </param>
31081 </interface>
31082 -<interface name="kernel_relabelfrom_unlabeled_database" lineno="3634">
31083 +<interface name="kernel_relabelfrom_unlabeled_database" lineno="3685">
31084 <summary>
31085 Relabel from unlabeled database objects.
31086 </summary>
31087 @@ -87191,7 +87936,7 @@ Domain allowed access.
31088 </summary>
31089 </param>
31090 </interface>
31091 -<interface name="kernel_unconfined" lineno="3671">
31092 +<interface name="kernel_unconfined" lineno="3722">
31093 <summary>
31094 Unconfined access to kernel module resources.
31095 </summary>
31096 @@ -87201,7 +87946,7 @@ Domain allowed access.
31097 </summary>
31098 </param>
31099 </interface>
31100 -<interface name="kernel_read_vm_overcommit_sysctl" lineno="3691">
31101 +<interface name="kernel_read_vm_overcommit_sysctl" lineno="3742">
31102 <summary>
31103 Read virtual memory overcommit sysctl.
31104 </summary>
31105 @@ -87212,7 +87957,7 @@ Domain allowed access.
31106 </param>
31107 <rolecap/>
31108 </interface>
31109 -<interface name="kernel_rw_vm_overcommit_sysctl" lineno="3711">
31110 +<interface name="kernel_rw_vm_overcommit_sysctl" lineno="3762">
31111 <summary>
31112 Read and write virtual memory overcommit sysctl.
31113 </summary>
31114 @@ -87223,7 +87968,7 @@ Domain allowed access.
31115 </param>
31116 <rolecap/>
31117 </interface>
31118 -<interface name="kernel_ib_access_unlabeled_pkeys" lineno="3730">
31119 +<interface name="kernel_ib_access_unlabeled_pkeys" lineno="3781">
31120 <summary>
31121 Access unlabeled infiniband pkeys.
31122 </summary>
31123 @@ -87233,7 +87978,7 @@ Domain allowed access.
31124 </summary>
31125 </param>
31126 </interface>
31127 -<interface name="kernel_ib_manage_subnet_unlabeled_endports" lineno="3748">
31128 +<interface name="kernel_ib_manage_subnet_unlabeled_endports" lineno="3799">
31129 <summary>
31130 Manage subnet on unlabeled Infiniband endports.
31131 </summary>
31132 @@ -87288,7 +88033,7 @@ Domain target for user exemption.
31133 </param>
31134 <rolecap/>
31135 </interface>
31136 -<interface name="mcs_file_write_all" lineno="66">
31137 +<interface name="mcs_file_write_all" lineno="62">
31138 <summary>
31139 This domain is allowed to write files and directories
31140 regardless of their MCS category set.
31141 @@ -87300,7 +88045,7 @@ Domain target for user exemption.
31142 </param>
31143 <rolecap/>
31144 </interface>
31145 -<interface name="mcs_killall" lineno="86">
31146 +<interface name="mcs_killall" lineno="78">
31147 <summary>
31148 This domain is allowed to sigkill and sigstop
31149 all domains regardless of their MCS category set.
31150 @@ -87312,7 +88057,7 @@ Domain target for user exemption.
31151 </param>
31152 <rolecap/>
31153 </interface>
31154 -<interface name="mcs_ptrace_all" lineno="106">
31155 +<interface name="mcs_ptrace_all" lineno="94">
31156 <summary>
31157 This domain is allowed to ptrace
31158 all domains regardless of their MCS
31159 @@ -87324,7 +88069,7 @@ Domain target for user exemption.
31160 </summary>
31161 </param>
31162 </interface>
31163 -<interface name="mcs_process_set_categories" lineno="126">
31164 +<interface name="mcs_process_set_categories" lineno="110">
31165 <summary>
31166 Make specified domain MCS trusted
31167 for setting any category set for
31168 @@ -90955,22 +91700,33 @@ The prefix to be used for deriving type names.
31169 </summary>
31170 </param>
31171 </template>
31172 -<interface name="apache_role" lineno="120">
31173 +<template name="apache_role" lineno="131">
31174 <summary>
31175 Role access for apache.
31176 </summary>
31177 -<param name="role">
31178 +<param name="role_prefix">
31179 <summary>
31180 -Role allowed access
31181 +The prefix of the user role (e.g., user
31182 +is the prefix for user_r).
31183 </summary>
31184 </param>
31185 -<param name="domain">
31186 +<param name="user_domain">
31187 <summary>
31188 User domain for the role.
31189 </summary>
31190 </param>
31191 -</interface>
31192 -<interface name="apache_read_user_scripts" lineno="175">
31193 +<param name="user_exec_domain">
31194 +<summary>
31195 +User exec domain for execute and transition access.
31196 +</summary>
31197 +</param>
31198 +<param name="role">
31199 +<summary>
31200 +Role allowed access
31201 +</summary>
31202 +</param>
31203 +</template>
31204 +<interface name="apache_read_user_scripts" lineno="190">
31205 <summary>
31206 Read user httpd script executable files.
31207 </summary>
31208 @@ -90980,7 +91736,7 @@ Domain allowed access.
31209 </summary>
31210 </param>
31211 </interface>
31212 -<interface name="apache_read_user_content" lineno="195">
31213 +<interface name="apache_read_user_content" lineno="210">
31214 <summary>
31215 Read user httpd content.
31216 </summary>
31217 @@ -90990,7 +91746,7 @@ Domain allowed access.
31218 </summary>
31219 </param>
31220 </interface>
31221 -<interface name="apache_domtrans" lineno="215">
31222 +<interface name="apache_domtrans" lineno="230">
31223 <summary>
31224 Execute httpd with a domain transition.
31225 </summary>
31226 @@ -91000,7 +91756,7 @@ Domain allowed to transition.
31227 </summary>
31228 </param>
31229 </interface>
31230 -<interface name="apache_initrc_domtrans" lineno="234">
31231 +<interface name="apache_initrc_domtrans" lineno="249">
31232 <summary>
31233 Execute httpd server in the httpd domain.
31234 </summary>
31235 @@ -91010,7 +91766,7 @@ Domain allowed to transition.
31236 </summary>
31237 </param>
31238 </interface>
31239 -<interface name="apache_signal" lineno="252">
31240 +<interface name="apache_signal" lineno="267">
31241 <summary>
31242 Send generic signals to httpd.
31243 </summary>
31244 @@ -91020,7 +91776,7 @@ Domain allowed access.
31245 </summary>
31246 </param>
31247 </interface>
31248 -<interface name="apache_signull" lineno="270">
31249 +<interface name="apache_signull" lineno="285">
31250 <summary>
31251 Send null signals to httpd.
31252 </summary>
31253 @@ -91030,7 +91786,7 @@ Domain allowed access.
31254 </summary>
31255 </param>
31256 </interface>
31257 -<interface name="apache_sigchld" lineno="288">
31258 +<interface name="apache_sigchld" lineno="303">
31259 <summary>
31260 Send child terminated signals to httpd.
31261 </summary>
31262 @@ -91040,7 +91796,7 @@ Domain allowed access.
31263 </summary>
31264 </param>
31265 </interface>
31266 -<interface name="apache_use_fds" lineno="307">
31267 +<interface name="apache_use_fds" lineno="322">
31268 <summary>
31269 Inherit and use file descriptors
31270 from httpd.
31271 @@ -91051,7 +91807,7 @@ Domain allowed access.
31272 </summary>
31273 </param>
31274 </interface>
31275 -<interface name="apache_dontaudit_rw_fifo_file" lineno="326">
31276 +<interface name="apache_dontaudit_rw_fifo_file" lineno="341">
31277 <summary>
31278 Do not audit attempts to read and
31279 write httpd unnamed pipes.
31280 @@ -91062,7 +91818,7 @@ Domain to not audit.
31281 </summary>
31282 </param>
31283 </interface>
31284 -<interface name="apache_dontaudit_rw_stream_sockets" lineno="345">
31285 +<interface name="apache_dontaudit_rw_stream_sockets" lineno="360">
31286 <summary>
31287 Do not audit attempts to read and
31288 write httpd unix domain stream sockets.
31289 @@ -91073,7 +91829,7 @@ Domain to not audit.
31290 </summary>
31291 </param>
31292 </interface>
31293 -<interface name="apache_rw_stream_sockets" lineno="364">
31294 +<interface name="apache_rw_stream_sockets" lineno="379">
31295 <summary>
31296 Read and write httpd unix domain
31297 stream sockets.
31298 @@ -91084,7 +91840,7 @@ Domain allowed access.
31299 </summary>
31300 </param>
31301 </interface>
31302 -<interface name="apache_dontaudit_rw_tcp_sockets" lineno="383">
31303 +<interface name="apache_dontaudit_rw_tcp_sockets" lineno="398">
31304 <summary>
31305 Do not audit attempts to read and
31306 write httpd TCP sockets.
31307 @@ -91095,7 +91851,7 @@ Domain to not audit.
31308 </summary>
31309 </param>
31310 </interface>
31311 -<interface name="apache_reload" lineno="401">
31312 +<interface name="apache_reload" lineno="416">
31313 <summary>
31314 Reload the httpd service (systemd).
31315 </summary>
31316 @@ -91105,7 +91861,7 @@ Domain allowed access.
31317 </summary>
31318 </param>
31319 </interface>
31320 -<interface name="apache_read_all_ra_content" lineno="420">
31321 +<interface name="apache_read_all_ra_content" lineno="435">
31322 <summary>
31323 Read all appendable content
31324 </summary>
31325 @@ -91115,7 +91871,7 @@ Domain allowed access.
31326 </summary>
31327 </param>
31328 </interface>
31329 -<interface name="apache_append_all_ra_content" lineno="439">
31330 +<interface name="apache_append_all_ra_content" lineno="454">
31331 <summary>
31332 Append to all appendable web content
31333 </summary>
31334 @@ -91125,7 +91881,7 @@ Domain allowed access.
31335 </summary>
31336 </param>
31337 </interface>
31338 -<interface name="apache_read_all_rw_content" lineno="457">
31339 +<interface name="apache_read_all_rw_content" lineno="472">
31340 <summary>
31341 Read all read/write content
31342 </summary>
31343 @@ -91135,7 +91891,7 @@ Domain allowed access.
31344 </summary>
31345 </param>
31346 </interface>
31347 -<interface name="apache_manage_all_rw_content" lineno="476">
31348 +<interface name="apache_manage_all_rw_content" lineno="491">
31349 <summary>
31350 Manage all read/write content
31351 </summary>
31352 @@ -91145,7 +91901,7 @@ Domain allowed access.
31353 </summary>
31354 </param>
31355 </interface>
31356 -<interface name="apache_read_all_content" lineno="495">
31357 +<interface name="apache_read_all_content" lineno="510">
31358 <summary>
31359 Read all web content.
31360 </summary>
31361 @@ -91155,7 +91911,7 @@ Domain allowed access.
31362 </summary>
31363 </param>
31364 </interface>
31365 -<interface name="apache_search_all_content" lineno="517">
31366 +<interface name="apache_search_all_content" lineno="532">
31367 <summary>
31368 Search all apache content.
31369 </summary>
31370 @@ -91165,7 +91921,7 @@ Domain allowed access.
31371 </summary>
31372 </param>
31373 </interface>
31374 -<interface name="apache_list_all_content" lineno="535">
31375 +<interface name="apache_list_all_content" lineno="550">
31376 <summary>
31377 List all apache content.
31378 </summary>
31379 @@ -91175,7 +91931,7 @@ Domain allowed access.
31380 </summary>
31381 </param>
31382 </interface>
31383 -<interface name="apache_manage_all_content" lineno="555">
31384 +<interface name="apache_manage_all_content" lineno="570">
31385 <summary>
31386 Create, read, write, and delete
31387 all httpd content.
31388 @@ -91187,7 +91943,7 @@ Domain allowed access.
31389 </param>
31390 <rolecap/>
31391 </interface>
31392 -<interface name="apache_setattr_cache_dirs" lineno="579">
31393 +<interface name="apache_setattr_cache_dirs" lineno="594">
31394 <summary>
31395 Set attributes httpd cache directories.
31396 </summary>
31397 @@ -91197,7 +91953,7 @@ Domain allowed access.
31398 </summary>
31399 </param>
31400 </interface>
31401 -<interface name="apache_list_cache" lineno="597">
31402 +<interface name="apache_list_cache" lineno="612">
31403 <summary>
31404 List httpd cache directories.
31405 </summary>
31406 @@ -91207,7 +91963,7 @@ Domain allowed access.
31407 </summary>
31408 </param>
31409 </interface>
31410 -<interface name="apache_rw_cache_files" lineno="615">
31411 +<interface name="apache_rw_cache_files" lineno="630">
31412 <summary>
31413 Read and write httpd cache files.
31414 </summary>
31415 @@ -91217,7 +91973,7 @@ Domain allowed access.
31416 </summary>
31417 </param>
31418 </interface>
31419 -<interface name="apache_delete_cache_dirs" lineno="633">
31420 +<interface name="apache_delete_cache_dirs" lineno="648">
31421 <summary>
31422 Delete httpd cache directories.
31423 </summary>
31424 @@ -91227,7 +91983,7 @@ Domain allowed access.
31425 </summary>
31426 </param>
31427 </interface>
31428 -<interface name="apache_delete_cache_files" lineno="651">
31429 +<interface name="apache_delete_cache_files" lineno="666">
31430 <summary>
31431 Delete httpd cache files.
31432 </summary>
31433 @@ -91237,7 +91993,7 @@ Domain allowed access.
31434 </summary>
31435 </param>
31436 </interface>
31437 -<interface name="apache_read_config" lineno="670">
31438 +<interface name="apache_read_config" lineno="685">
31439 <summary>
31440 Read httpd configuration files.
31441 </summary>
31442 @@ -91248,7 +92004,7 @@ Domain allowed access.
31443 </param>
31444 <rolecap/>
31445 </interface>
31446 -<interface name="apache_search_config" lineno="691">
31447 +<interface name="apache_search_config" lineno="706">
31448 <summary>
31449 Search httpd configuration directories.
31450 </summary>
31451 @@ -91258,7 +92014,7 @@ Domain allowed access.
31452 </summary>
31453 </param>
31454 </interface>
31455 -<interface name="apache_manage_config" lineno="711">
31456 +<interface name="apache_manage_config" lineno="726">
31457 <summary>
31458 Create, read, write, and delete
31459 httpd configuration files.
31460 @@ -91269,7 +92025,7 @@ Domain allowed access.
31461 </summary>
31462 </param>
31463 </interface>
31464 -<interface name="apache_domtrans_helper" lineno="733">
31465 +<interface name="apache_domtrans_helper" lineno="748">
31466 <summary>
31467 Execute the Apache helper program
31468 with a domain transition.
31469 @@ -91280,7 +92036,7 @@ Domain allowed access.
31470 </summary>
31471 </param>
31472 </interface>
31473 -<interface name="apache_run_helper" lineno="760">
31474 +<interface name="apache_run_helper" lineno="775">
31475 <summary>
31476 Execute the Apache helper program with
31477 a domain transition, and allow the
31478 @@ -91298,7 +92054,7 @@ Role allowed access.
31479 </param>
31480 <rolecap/>
31481 </interface>
31482 -<interface name="apache_read_log" lineno="780">
31483 +<interface name="apache_read_log" lineno="795">
31484 <summary>
31485 Read httpd log files.
31486 </summary>
31487 @@ -91309,7 +92065,7 @@ Domain allowed access.
31488 </param>
31489 <rolecap/>
31490 </interface>
31491 -<interface name="apache_append_log" lineno="801">
31492 +<interface name="apache_append_log" lineno="816">
31493 <summary>
31494 Append httpd log files.
31495 </summary>
31496 @@ -91319,7 +92075,7 @@ Domain allowed access.
31497 </summary>
31498 </param>
31499 </interface>
31500 -<interface name="apache_dontaudit_append_log" lineno="822">
31501 +<interface name="apache_dontaudit_append_log" lineno="837">
31502 <summary>
31503 Do not audit attempts to append
31504 httpd log files.
31505 @@ -91330,7 +92086,7 @@ Domain to not audit.
31506 </summary>
31507 </param>
31508 </interface>
31509 -<interface name="apache_manage_log" lineno="841">
31510 +<interface name="apache_manage_log" lineno="856">
31511 <summary>
31512 Create, read, write, and delete
31513 httpd log files.
31514 @@ -91341,7 +92097,7 @@ Domain allowed access.
31515 </summary>
31516 </param>
31517 </interface>
31518 -<interface name="apache_write_log" lineno="862">
31519 +<interface name="apache_write_log" lineno="877">
31520 <summary>
31521 Write apache log files.
31522 </summary>
31523 @@ -91351,7 +92107,7 @@ Domain allowed access.
31524 </summary>
31525 </param>
31526 </interface>
31527 -<interface name="apache_dontaudit_search_modules" lineno="882">
31528 +<interface name="apache_dontaudit_search_modules" lineno="897">
31529 <summary>
31530 Do not audit attempts to search
31531 httpd module directories.
31532 @@ -91362,7 +92118,7 @@ Domain to not audit.
31533 </summary>
31534 </param>
31535 </interface>
31536 -<interface name="apache_list_modules" lineno="900">
31537 +<interface name="apache_list_modules" lineno="915">
31538 <summary>
31539 List httpd module directories.
31540 </summary>
31541 @@ -91372,7 +92128,7 @@ Domain allowed access.
31542 </summary>
31543 </param>
31544 </interface>
31545 -<interface name="apache_exec_modules" lineno="918">
31546 +<interface name="apache_exec_modules" lineno="933">
31547 <summary>
31548 Execute httpd module files.
31549 </summary>
31550 @@ -91382,7 +92138,7 @@ Domain allowed access.
31551 </summary>
31552 </param>
31553 </interface>
31554 -<interface name="apache_read_module_files" lineno="938">
31555 +<interface name="apache_read_module_files" lineno="953">
31556 <summary>
31557 Read httpd module files.
31558 </summary>
31559 @@ -91392,7 +92148,7 @@ Domain allowed access.
31560 </summary>
31561 </param>
31562 </interface>
31563 -<interface name="apache_domtrans_rotatelogs" lineno="958">
31564 +<interface name="apache_domtrans_rotatelogs" lineno="973">
31565 <summary>
31566 Execute a domain transition to
31567 run httpd_rotatelogs.
31568 @@ -91403,7 +92159,7 @@ Domain allowed to transition.
31569 </summary>
31570 </param>
31571 </interface>
31572 -<interface name="apache_list_sys_content" lineno="977">
31573 +<interface name="apache_list_sys_content" lineno="992">
31574 <summary>
31575 List httpd system content directories.
31576 </summary>
31577 @@ -91413,7 +92169,7 @@ Domain allowed access.
31578 </summary>
31579 </param>
31580 </interface>
31581 -<interface name="apache_manage_sys_content" lineno="998">
31582 +<interface name="apache_manage_sys_content" lineno="1013">
31583 <summary>
31584 Create, read, write, and delete
31585 httpd system content files.
31586 @@ -91425,7 +92181,7 @@ Domain allowed access.
31587 </param>
31588 <rolecap/>
31589 </interface>
31590 -<interface name="apache_manage_sys_rw_content" lineno="1020">
31591 +<interface name="apache_manage_sys_rw_content" lineno="1035">
31592 <summary>
31593 Create, read, write, and delete
31594 httpd system rw content.
31595 @@ -91436,7 +92192,7 @@ Domain allowed access.
31596 </summary>
31597 </param>
31598 </interface>
31599 -<interface name="apache_domtrans_sys_script" lineno="1042">
31600 +<interface name="apache_domtrans_sys_script" lineno="1057">
31601 <summary>
31602 Execute all httpd scripts in the
31603 system script domain.
31604 @@ -91447,7 +92203,7 @@ Domain allowed to transition.
31605 </summary>
31606 </param>
31607 </interface>
31608 -<interface name="apache_dontaudit_rw_sys_script_stream_sockets" lineno="1065">
31609 +<interface name="apache_dontaudit_rw_sys_script_stream_sockets" lineno="1080">
31610 <summary>
31611 Do not audit attempts to read and
31612 write httpd system script unix
31613 @@ -91459,7 +92215,7 @@ Domain to not audit.
31614 </summary>
31615 </param>
31616 </interface>
31617 -<interface name="apache_domtrans_all_scripts" lineno="1084">
31618 +<interface name="apache_domtrans_all_scripts" lineno="1099">
31619 <summary>
31620 Execute all user scripts in the user
31621 script domain.
31622 @@ -91470,7 +92226,7 @@ Domain allowed to transition.
31623 </summary>
31624 </param>
31625 </interface>
31626 -<interface name="apache_run_all_scripts" lineno="1109">
31627 +<interface name="apache_run_all_scripts" lineno="1124">
31628 <summary>
31629 Execute all user scripts in the user
31630 script domain. Add user script domains
31631 @@ -91487,7 +92243,7 @@ Role allowed access.
31632 </summary>
31633 </param>
31634 </interface>
31635 -<interface name="apache_read_squirrelmail_data" lineno="1128">
31636 +<interface name="apache_read_squirrelmail_data" lineno="1143">
31637 <summary>
31638 Read httpd squirrelmail data files.
31639 </summary>
31640 @@ -91497,7 +92253,7 @@ Domain allowed access.
31641 </summary>
31642 </param>
31643 </interface>
31644 -<interface name="apache_append_squirrelmail_data" lineno="1146">
31645 +<interface name="apache_append_squirrelmail_data" lineno="1161">
31646 <summary>
31647 Append httpd squirrelmail data files.
31648 </summary>
31649 @@ -91507,7 +92263,7 @@ Domain allowed access.
31650 </summary>
31651 </param>
31652 </interface>
31653 -<interface name="apache_delete_squirrelmail_spool" lineno="1164">
31654 +<interface name="apache_delete_squirrelmail_spool" lineno="1179">
31655 <summary>
31656 delete httpd squirrelmail spool files.
31657 </summary>
31658 @@ -91517,7 +92273,7 @@ Domain allowed access.
31659 </summary>
31660 </param>
31661 </interface>
31662 -<interface name="apache_search_sys_content" lineno="1182">
31663 +<interface name="apache_search_sys_content" lineno="1197">
31664 <summary>
31665 Search httpd system content.
31666 </summary>
31667 @@ -91527,7 +92283,7 @@ Domain allowed access.
31668 </summary>
31669 </param>
31670 </interface>
31671 -<interface name="apache_read_sys_content" lineno="1201">
31672 +<interface name="apache_read_sys_content" lineno="1216">
31673 <summary>
31674 Read httpd system content.
31675 </summary>
31676 @@ -91537,7 +92293,7 @@ Domain allowed access.
31677 </summary>
31678 </param>
31679 </interface>
31680 -<interface name="apache_search_sys_scripts" lineno="1221">
31681 +<interface name="apache_search_sys_scripts" lineno="1236">
31682 <summary>
31683 Search httpd system CGI directories.
31684 </summary>
31685 @@ -91547,7 +92303,7 @@ Domain allowed access.
31686 </summary>
31687 </param>
31688 </interface>
31689 -<interface name="apache_manage_all_user_content" lineno="1241">
31690 +<interface name="apache_manage_all_user_content" lineno="1256">
31691 <summary>
31692 Create, read, write, and delete all
31693 user httpd content.
31694 @@ -91559,7 +92315,7 @@ Domain allowed access.
31695 </param>
31696 <rolecap/>
31697 </interface>
31698 -<interface name="apache_search_sys_script_state" lineno="1262">
31699 +<interface name="apache_search_sys_script_state" lineno="1277">
31700 <summary>
31701 Search system script state directories.
31702 </summary>
31703 @@ -91569,7 +92325,7 @@ Domain allowed access.
31704 </summary>
31705 </param>
31706 </interface>
31707 -<interface name="apache_read_tmp_files" lineno="1280">
31708 +<interface name="apache_read_tmp_files" lineno="1295">
31709 <summary>
31710 Read httpd tmp files.
31711 </summary>
31712 @@ -91579,7 +92335,7 @@ Domain allowed access.
31713 </summary>
31714 </param>
31715 </interface>
31716 -<interface name="apache_dontaudit_write_tmp_files" lineno="1300">
31717 +<interface name="apache_dontaudit_write_tmp_files" lineno="1315">
31718 <summary>
31719 Do not audit attempts to write
31720 httpd tmp files.
31721 @@ -91590,7 +92346,7 @@ Domain to not audit.
31722 </summary>
31723 </param>
31724 </interface>
31725 -<interface name="apache_delete_lib_files" lineno="1318">
31726 +<interface name="apache_delete_lib_files" lineno="1333">
31727 <summary>
31728 Delete httpd_var_lib_t files
31729 </summary>
31730 @@ -91600,7 +92356,7 @@ Domain that can delete the files
31731 </summary>
31732 </param>
31733 </interface>
31734 -<interface name="apache_cgi_domain" lineno="1349">
31735 +<interface name="apache_cgi_domain" lineno="1364">
31736 <summary>
31737 Execute CGI in the specified domain.
31738 </summary>
31739 @@ -91622,7 +92378,7 @@ Type of the executable to enter the cgi domain.
31740 </summary>
31741 </param>
31742 </interface>
31743 -<interface name="apache_admin" lineno="1377">
31744 +<interface name="apache_admin" lineno="1392">
31745 <summary>
31746 All of the rules required to
31747 administrate an apache environment.
31748 @@ -92814,22 +93570,33 @@ Role allowed access.
31749 </module>
31750 <module name="bluetooth" filename="policy/modules/services/bluetooth.if">
31751 <summary>Bluetooth tools and system services.</summary>
31752 -<interface name="bluetooth_role" lineno="18">
31753 +<template name="bluetooth_role" lineno="29">
31754 <summary>
31755 Role access for bluetooth.
31756 </summary>
31757 -<param name="role">
31758 +<param name="role_prefix">
31759 <summary>
31760 -Role allowed access
31761 +The prefix of the user role (e.g., user
31762 +is the prefix for user_r).
31763 </summary>
31764 </param>
31765 -<param name="domain">
31766 +<param name="user_domain">
31767 <summary>
31768 -User domain for the role
31769 +User domain for the role.
31770 </summary>
31771 </param>
31772 -</interface>
31773 -<interface name="bluetooth_stream_connect" lineno="63">
31774 +<param name="user_exec_domain">
31775 +<summary>
31776 +User exec domain for execute and transition access.
31777 +</summary>
31778 +</param>
31779 +<param name="role">
31780 +<summary>
31781 +Role allowed access
31782 +</summary>
31783 +</param>
31784 +</template>
31785 +<interface name="bluetooth_stream_connect" lineno="78">
31786 <summary>
31787 Connect to bluetooth over a unix domain
31788 stream socket.
31789 @@ -92840,7 +93607,7 @@ Domain allowed access.
31790 </summary>
31791 </param>
31792 </interface>
31793 -<interface name="bluetooth_domtrans" lineno="84">
31794 +<interface name="bluetooth_domtrans" lineno="99">
31795 <summary>
31796 Execute bluetooth in the bluetooth domain.
31797 </summary>
31798 @@ -92850,7 +93617,7 @@ Domain allowed to transition.
31799 </summary>
31800 </param>
31801 </interface>
31802 -<interface name="bluetooth_read_config" lineno="103">
31803 +<interface name="bluetooth_read_config" lineno="118">
31804 <summary>
31805 Read bluetooth configuration files.
31806 </summary>
31807 @@ -92860,7 +93627,7 @@ Domain allowed access.
31808 </summary>
31809 </param>
31810 </interface>
31811 -<interface name="bluetooth_dbus_chat" lineno="122">
31812 +<interface name="bluetooth_dbus_chat" lineno="137">
31813 <summary>
31814 Send and receive messages from
31815 bluetooth over dbus.
31816 @@ -92871,7 +93638,7 @@ Domain allowed access.
31817 </summary>
31818 </param>
31819 </interface>
31820 -<interface name="bluetooth_dontaudit_read_helper_state" lineno="143">
31821 +<interface name="bluetooth_dontaudit_read_helper_state" lineno="158">
31822 <summary>
31823 Do not audit attempts to read
31824 bluetooth process state files.
31825 @@ -92882,7 +93649,7 @@ Domain to not audit.
31826 </summary>
31827 </param>
31828 </interface>
31829 -<interface name="bluetooth_admin" lineno="169">
31830 +<interface name="bluetooth_admin" lineno="184">
31831 <summary>
31832 All of the rules required to
31833 administrate an bluetooth environment.
31834 @@ -94150,6 +94917,790 @@ Domain allowed access.
31835 <rolecap/>
31836 </interface>
31837 </module>
31838 +<module name="container" filename="policy/modules/services/container.if">
31839 +<summary>Policy for containers</summary>
31840 +<template name="container_domain_template" lineno="13">
31841 +<summary>
31842 +The template to define a container domain.
31843 +</summary>
31844 +<param name="domain_prefix">
31845 +<summary>
31846 +Domain prefix to be used.
31847 +</summary>
31848 +</param>
31849 +</template>
31850 +<template name="container_engine_domain_template" lineno="38">
31851 +<summary>
31852 +The template to define a container
31853 +engine domain.
31854 +</summary>
31855 +<param name="domain_prefix">
31856 +<summary>
31857 +Domain prefix to be used.
31858 +</summary>
31859 +</param>
31860 +</template>
31861 +<interface name="container_system_engine" lineno="75">
31862 +<summary>
31863 +Allow the specified container engine
31864 +domain all the rules required to
31865 +function as a system container engine.
31866 +</summary>
31867 +<param name="domain">
31868 +<summary>
31869 +Domain allowed access.
31870 +</summary>
31871 +</param>
31872 +</interface>
31873 +<interface name="container_user_engine" lineno="95">
31874 +<summary>
31875 +Allow the specified container engine
31876 +domain all the rules required to
31877 +function as a user container engine.
31878 +</summary>
31879 +<param name="domain">
31880 +<summary>
31881 +Domain allowed access.
31882 +</summary>
31883 +</param>
31884 +</interface>
31885 +<template name="container_base_role" lineno="131">
31886 +<summary>
31887 +Base role access for containers. This
31888 +grants all the rules necessary for
31889 +common container usage.
31890 +</summary>
31891 +<param name="role_prefix">
31892 +<summary>
31893 +The prefix of the user role (e.g., user
31894 +is the prefix for user_r).
31895 +</summary>
31896 +</param>
31897 +<param name="user_domain">
31898 +<summary>
31899 +User domain for the role.
31900 +</summary>
31901 +</param>
31902 +<param name="user_exec_domain">
31903 +<summary>
31904 +User exec domain for execute and transition access.
31905 +</summary>
31906 +</param>
31907 +<param name="role">
31908 +<summary>
31909 +Role allowed access.
31910 +</summary>
31911 +</param>
31912 +</template>
31913 +<template name="container_system_role" lineno="187">
31914 +<summary>
31915 +Role access for system containers.
31916 +</summary>
31917 +<param name="role_prefix">
31918 +<summary>
31919 +The prefix of the user role (e.g., user
31920 +is the prefix for user_r).
31921 +</summary>
31922 +</param>
31923 +<param name="user_domain">
31924 +<summary>
31925 +User domain for the role.
31926 +</summary>
31927 +</param>
31928 +<param name="user_exec_domain">
31929 +<summary>
31930 +User exec domain for execute and transition access.
31931 +</summary>
31932 +</param>
31933 +<param name="role">
31934 +<summary>
31935 +Role allowed access.
31936 +</summary>
31937 +</param>
31938 +</template>
31939 +<template name="container_user_role" lineno="229">
31940 +<summary>
31941 +Role access for user containers.
31942 +</summary>
31943 +<param name="role_prefix">
31944 +<summary>
31945 +The prefix of the user role (e.g., user
31946 +is the prefix for user_r).
31947 +</summary>
31948 +</param>
31949 +<param name="user_domain">
31950 +<summary>
31951 +User domain for the role.
31952 +</summary>
31953 +</param>
31954 +<param name="user_exec_domain">
31955 +<summary>
31956 +User exec domain for execute and transition access.
31957 +</summary>
31958 +</param>
31959 +<param name="role">
31960 +<summary>
31961 +Role allowed access.
31962 +</summary>
31963 +</param>
31964 +</template>
31965 +<interface name="container_domtrans_generic_engine" lineno="307">
31966 +<summary>
31967 +Execute generic container engines in the
31968 +container engine domain.
31969 +</summary>
31970 +<param name="domain">
31971 +<summary>
31972 +Domain allowed to transition.
31973 +</summary>
31974 +</param>
31975 +</interface>
31976 +<interface name="container_run_generic_engine" lineno="333">
31977 +<summary>
31978 +Execute generic container engines in the
31979 +container engine domain, and allow the
31980 +specified role the container domain.
31981 +</summary>
31982 +<param name="domain">
31983 +<summary>
31984 +Domain allowed to transition
31985 +</summary>
31986 +</param>
31987 +<param name="role">
31988 +<summary>
31989 +The role to be allowed the container domain.
31990 +</summary>
31991 +</param>
31992 +</interface>
31993 +<interface name="container_engine_executable_file" lineno="353">
31994 +<summary>
31995 +Make the specified type usable for files
31996 +that are executables for container engines.
31997 +</summary>
31998 +<param name="type">
31999 +<summary>
32000 +Type to be used for files.
32001 +</summary>
32002 +</param>
32003 +</interface>
32004 +<interface name="container_generic_engine_domtrans" lineno="380">
32005 +<summary>
32006 +Execute a generic container engine
32007 +executable with an automatic transition
32008 +to a private type.
32009 +</summary>
32010 +<param name="domain">
32011 +<summary>
32012 +Domain allowed to transition.
32013 +</summary>
32014 +</param>
32015 +<param name="target_domain">
32016 +<summary>
32017 +The type of the new process.
32018 +</summary>
32019 +</param>
32020 +</interface>
32021 +<interface name="container_engine_executable_entrypoint" lineno="401">
32022 +<summary>
32023 +Allow the generic container engine
32024 +executables to be an entrypoint
32025 +for the specified domain.
32026 +</summary>
32027 +<param name="domain">
32028 +<summary>
32029 +Domain allowed access.
32030 +</summary>
32031 +</param>
32032 +</interface>
32033 +<interface name="container_engine_dbus_chat" lineno="420">
32034 +<summary>
32035 +Send and receive messages from
32036 +container engines over dbus.
32037 +</summary>
32038 +<param name="domain">
32039 +<summary>
32040 +Domain allowed access.
32041 +</summary>
32042 +</param>
32043 +</interface>
32044 +<interface name="container_runtime_named_socket_activation" lineno="443">
32045 +<summary>
32046 +Allow the specified domain to be started
32047 +by systemd socket activation using a
32048 +named socket labeled the container
32049 +runtime type.
32050 +</summary>
32051 +<param name="domain">
32052 +<summary>
32053 +Domain allowed access.
32054 +</summary>
32055 +</param>
32056 +</interface>
32057 +<interface name="container_manage_engine_tmp_files" lineno="462">
32058 +<summary>
32059 +Allow the specified domain to manage
32060 +container engine temporary files.
32061 +</summary>
32062 +<param name="domain">
32063 +<summary>
32064 +Domain allowed access.
32065 +</summary>
32066 +</param>
32067 +</interface>
32068 +<interface name="container_manage_engine_tmp_sock_files" lineno="482">
32069 +<summary>
32070 +Allow the specified domain to manage
32071 +container engine temporary named sockets.
32072 +</summary>
32073 +<param name="domain">
32074 +<summary>
32075 +Domain allowed access.
32076 +</summary>
32077 +</param>
32078 +</interface>
32079 +<interface name="container_engine_tmp_filetrans" lineno="514">
32080 +<summary>
32081 +Allow the specified domain to create
32082 +objects in generic temporary directories
32083 +with an automatic type transition to
32084 +the container engine temporary file type.
32085 +</summary>
32086 +<param name="domain">
32087 +<summary>
32088 +Domain allowed access.
32089 +</summary>
32090 +</param>
32091 +<param name="object">
32092 +<summary>
32093 +The object class of the object being created.
32094 +</summary>
32095 +</param>
32096 +<param name="name" optional="true">
32097 +<summary>
32098 +The name of the object being created.
32099 +</summary>
32100 +</param>
32101 +</interface>
32102 +<interface name="container_read_system_container_state" lineno="533">
32103 +<summary>
32104 +Read the process state (/proc/pid)
32105 +of all system containers.
32106 +</summary>
32107 +<param name="domain">
32108 +<summary>
32109 +Domain allowed access.
32110 +</summary>
32111 +</param>
32112 +</interface>
32113 +<interface name="container_read_user_container_state" lineno="552">
32114 +<summary>
32115 +Read the process state (/proc/pid)
32116 +of all user containers.
32117 +</summary>
32118 +<param name="domain">
32119 +<summary>
32120 +Domain allowed access.
32121 +</summary>
32122 +</param>
32123 +</interface>
32124 +<interface name="container_manage_all_containers" lineno="572">
32125 +<summary>
32126 +All of the permissions necessary
32127 +for a container engine to manage
32128 +container processes.
32129 +</summary>
32130 +<param name="domain">
32131 +<summary>
32132 +Domain allowed access.
32133 +</summary>
32134 +</param>
32135 +</interface>
32136 +<interface name="container_domtrans" lineno="592">
32137 +<summary>
32138 +Allow the specified domain to
32139 +perform a type transition to
32140 +container domains.
32141 +</summary>
32142 +<param name="domain">
32143 +<summary>
32144 +Domain allowed to transition.
32145 +</summary>
32146 +</param>
32147 +</interface>
32148 +<interface name="container_stream_connect_system_containers" lineno="611">
32149 +<summary>
32150 +Connect to a system container domain
32151 +over a unix stream socket.
32152 +</summary>
32153 +<param name="domain">
32154 +<summary>
32155 +Domain allowed access.
32156 +</summary>
32157 +</param>
32158 +</interface>
32159 +<interface name="container_stream_connect_user_containers" lineno="633">
32160 +<summary>
32161 +Connect to a user container domain
32162 +over a unix stream socket.
32163 +</summary>
32164 +<param name="domain">
32165 +<summary>
32166 +Domain allowed access.
32167 +</summary>
32168 +</param>
32169 +</interface>
32170 +<interface name="container_stream_connect_all_containers" lineno="655">
32171 +<summary>
32172 +Connect to a container domain
32173 +over a unix stream socket.
32174 +</summary>
32175 +<param name="domain">
32176 +<summary>
32177 +Domain allowed access.
32178 +</summary>
32179 +</param>
32180 +</interface>
32181 +<interface name="container_signal_all_containers" lineno="678">
32182 +<summary>
32183 +Allow the specified domain to
32184 +send all signals to a container
32185 +domain.
32186 +</summary>
32187 +<param name="domain">
32188 +<summary>
32189 +Domain allowed to transition.
32190 +</summary>
32191 +</param>
32192 +</interface>
32193 +<interface name="container_setattr_container_ptys" lineno="696">
32194 +<summary>
32195 +Set the attributes of container ptys.
32196 +</summary>
32197 +<param name="domain">
32198 +<summary>
32199 +Domain allowed access.
32200 +</summary>
32201 +</param>
32202 +</interface>
32203 +<interface name="container_use_container_ptys" lineno="714">
32204 +<summary>
32205 +Read and write container ptys.
32206 +</summary>
32207 +<param name="domain">
32208 +<summary>
32209 +Domain allowed access.
32210 +</summary>
32211 +</param>
32212 +</interface>
32213 +<interface name="container_mountpoint" lineno="733">
32214 +<summary>
32215 +Make the specified type usable as a mountpoint
32216 +for containers.
32217 +</summary>
32218 +<param name="file_type">
32219 +<summary>
32220 +Type to be used as a mountpoint.
32221 +</summary>
32222 +</param>
32223 +</interface>
32224 +<interface name="container_manage_config_files" lineno="752">
32225 +<summary>
32226 +Allow the specified domain to
32227 +manage container config files.
32228 +</summary>
32229 +<param name="domain">
32230 +<summary>
32231 +Domain allowed access.
32232 +</summary>
32233 +</param>
32234 +</interface>
32235 +<interface name="container_file_root_filetrans" lineno="773">
32236 +<summary>
32237 +Allow the specified domain to
32238 +create container files in the
32239 +root directory with a type
32240 +transition.
32241 +</summary>
32242 +<param name="domain">
32243 +<summary>
32244 +Domain allowed access.
32245 +</summary>
32246 +</param>
32247 +</interface>
32248 +<interface name="container_manage_dirs" lineno="792">
32249 +<summary>
32250 +Allow the specified domain to
32251 +manage container file directories.
32252 +</summary>
32253 +<param name="domain">
32254 +<summary>
32255 +Domain allowed access.
32256 +</summary>
32257 +</param>
32258 +</interface>
32259 +<interface name="container_manage_files" lineno="811">
32260 +<summary>
32261 +Allow the specified domain to
32262 +manage container files.
32263 +</summary>
32264 +<param name="domain">
32265 +<summary>
32266 +Domain allowed access.
32267 +</summary>
32268 +</param>
32269 +</interface>
32270 +<interface name="container_manage_lnk_files" lineno="830">
32271 +<summary>
32272 +Allow the specified domain to
32273 +manage container lnk files.
32274 +</summary>
32275 +<param name="domain">
32276 +<summary>
32277 +Domain allowed access.
32278 +</summary>
32279 +</param>
32280 +</interface>
32281 +<interface name="container_manage_fifo_files" lineno="849">
32282 +<summary>
32283 +Allow the specified domain to
32284 +manage container fifo files.
32285 +</summary>
32286 +<param name="domain">
32287 +<summary>
32288 +Domain allowed access.
32289 +</summary>
32290 +</param>
32291 +</interface>
32292 +<interface name="container_manage_sock_files" lineno="868">
32293 +<summary>
32294 +Allow the specified domain to
32295 +manage container sock files.
32296 +</summary>
32297 +<param name="domain">
32298 +<summary>
32299 +Domain allowed access.
32300 +</summary>
32301 +</param>
32302 +</interface>
32303 +<interface name="container_rw_chr_files" lineno="887">
32304 +<summary>
32305 +Allow the specified domain to read
32306 +and write container chr files.
32307 +</summary>
32308 +<param name="domain">
32309 +<summary>
32310 +Domain allowed access.
32311 +</summary>
32312 +</param>
32313 +</interface>
32314 +<interface name="container_dontaudit_rw_chr_files" lineno="906">
32315 +<summary>
32316 +Do not audit attempts to read
32317 +and write container chr files.
32318 +</summary>
32319 +<param name="domain">
32320 +<summary>
32321 +Domain allowed access.
32322 +</summary>
32323 +</param>
32324 +</interface>
32325 +<interface name="container_manage_chr_files" lineno="925">
32326 +<summary>
32327 +Allow the specified domain to
32328 +manage container chr files.
32329 +</summary>
32330 +<param name="domain">
32331 +<summary>
32332 +Domain allowed access.
32333 +</summary>
32334 +</param>
32335 +</interface>
32336 +<interface name="container_manage_home_config" lineno="944">
32337 +<summary>
32338 +Allow the specified domain to
32339 +manage container config home content.
32340 +</summary>
32341 +<param name="domain">
32342 +<summary>
32343 +Domain allowed access.
32344 +</summary>
32345 +</param>
32346 +</interface>
32347 +<interface name="container_config_home_filetrans" lineno="976">
32348 +<summary>
32349 +Allow the specified domain to create
32350 +objects in an xdg_config directory
32351 +with an automatic type transition to
32352 +the container config home type.
32353 +</summary>
32354 +<param name="domain">
32355 +<summary>
32356 +Domain allowed access.
32357 +</summary>
32358 +</param>
32359 +<param name="object">
32360 +<summary>
32361 +The object class of the object being created.
32362 +</summary>
32363 +</param>
32364 +<param name="name" optional="true">
32365 +<summary>
32366 +The name of the object being created.
32367 +</summary>
32368 +</param>
32369 +</interface>
32370 +<interface name="container_manage_home_data_files" lineno="996">
32371 +<summary>
32372 +Allow the specified domain to
32373 +manage container data home files.
32374 +</summary>
32375 +<param name="domain">
32376 +<summary>
32377 +Domain allowed access.
32378 +</summary>
32379 +</param>
32380 +</interface>
32381 +<interface name="container_manage_home_data_fifo_files" lineno="1016">
32382 +<summary>
32383 +Allow the specified domain to
32384 +manage container data home named
32385 +pipes.
32386 +</summary>
32387 +<param name="domain">
32388 +<summary>
32389 +Domain allowed access.
32390 +</summary>
32391 +</param>
32392 +</interface>
32393 +<interface name="container_manage_home_data_sock_files" lineno="1036">
32394 +<summary>
32395 +Allow the specified domain to
32396 +manage container data home named
32397 +sockets.
32398 +</summary>
32399 +<param name="domain">
32400 +<summary>
32401 +Domain allowed access.
32402 +</summary>
32403 +</param>
32404 +</interface>
32405 +<interface name="container_relabel_all_content" lineno="1056">
32406 +<summary>
32407 +Allow the specified domain to
32408 +relabel container files and
32409 +directories.
32410 +</summary>
32411 +<param name="domain">
32412 +<summary>
32413 +Domain allowed access.
32414 +</summary>
32415 +</param>
32416 +</interface>
32417 +<interface name="container_relabel_fs" lineno="1075">
32418 +<summary>
32419 +Allow the specified domain to
32420 +relabel container filesystems.
32421 +</summary>
32422 +<param name="domain">
32423 +<summary>
32424 +Domain allowed access.
32425 +</summary>
32426 +</param>
32427 +</interface>
32428 +<interface name="container_getattr_fs" lineno="1095">
32429 +<summary>
32430 +Allow the specified domain to
32431 +get the attributes of container
32432 +filesystems.
32433 +</summary>
32434 +<param name="domain">
32435 +<summary>
32436 +Domain allowed access.
32437 +</summary>
32438 +</param>
32439 +</interface>
32440 +<interface name="container_search_runtime" lineno="1114">
32441 +<summary>
32442 +Allow the specified domain to search
32443 +runtime container directories.
32444 +</summary>
32445 +<param name="domain">
32446 +<summary>
32447 +Domain allowed access.
32448 +</summary>
32449 +</param>
32450 +</interface>
32451 +<interface name="container_manage_runtime_files" lineno="1134">
32452 +<summary>
32453 +Allow the specified domain to manage
32454 +runtime container files.
32455 +</summary>
32456 +<param name="domain">
32457 +<summary>
32458 +Domain allowed access.
32459 +</summary>
32460 +</param>
32461 +</interface>
32462 +<interface name="container_manage_runtime_fifo_files" lineno="1153">
32463 +<summary>
32464 +Allow the specified domain to manage
32465 +runtime container named pipes.
32466 +</summary>
32467 +<param name="domain">
32468 +<summary>
32469 +Domain allowed access.
32470 +</summary>
32471 +</param>
32472 +</interface>
32473 +<interface name="container_manage_runtime_sock_files" lineno="1172">
32474 +<summary>
32475 +Allow the specified domain to manage
32476 +runtime container named sockets.
32477 +</summary>
32478 +<param name="domain">
32479 +<summary>
32480 +Domain allowed access.
32481 +</summary>
32482 +</param>
32483 +</interface>
32484 +<interface name="container_manage_user_runtime_files" lineno="1191">
32485 +<summary>
32486 +Allow the specified domain to manage
32487 +user runtime container files.
32488 +</summary>
32489 +<param name="domain">
32490 +<summary>
32491 +Domain allowed access.
32492 +</summary>
32493 +</param>
32494 +</interface>
32495 +<interface name="container_rw_user_runtime_sock_files" lineno="1210">
32496 +<summary>
32497 +Allow the specified domain to read and
32498 +write user runtime container named sockets.
32499 +</summary>
32500 +<param name="domain">
32501 +<summary>
32502 +Domain allowed access.
32503 +</summary>
32504 +</param>
32505 +</interface>
32506 +<interface name="container_search_var_lib" lineno="1229">
32507 +<summary>
32508 +Allow the specified domain to search
32509 +container directories in /var/lib.
32510 +</summary>
32511 +<param name="domain">
32512 +<summary>
32513 +Domain allowed access.
32514 +</summary>
32515 +</param>
32516 +</interface>
32517 +<interface name="container_manage_var_lib_files" lineno="1249">
32518 +<summary>
32519 +Allow the specified domain to manage
32520 +container files in /var/lib.
32521 +</summary>
32522 +<param name="domain">
32523 +<summary>
32524 +Domain allowed access.
32525 +</summary>
32526 +</param>
32527 +</interface>
32528 +<interface name="container_manage_var_lib_fifo_files" lineno="1268">
32529 +<summary>
32530 +Allow the specified domain to manage
32531 +container named pipes in /var/lib.
32532 +</summary>
32533 +<param name="domain">
32534 +<summary>
32535 +Domain allowed access.
32536 +</summary>
32537 +</param>
32538 +</interface>
32539 +<interface name="container_manage_var_lib_sock_files" lineno="1287">
32540 +<summary>
32541 +Allow the specified domain to manage
32542 +container named sockets in /var/lib.
32543 +</summary>
32544 +<param name="domain">
32545 +<summary>
32546 +Domain allowed access.
32547 +</summary>
32548 +</param>
32549 +</interface>
32550 +<interface name="container_unlabeled_var_lib_filetrans" lineno="1318">
32551 +<summary>
32552 +Allow the specified domain to create
32553 +objects in unlabeled directories with
32554 +an automatic type transition to the
32555 +container var lib type.
32556 +</summary>
32557 +<param name="domain">
32558 +<summary>
32559 +Domain allowed access.
32560 +</summary>
32561 +</param>
32562 +<param name="object">
32563 +<summary>
32564 +The object class of the object being created.
32565 +</summary>
32566 +</param>
32567 +<param name="name" optional="true">
32568 +<summary>
32569 +The name of the object being created.
32570 +</summary>
32571 +</param>
32572 +</interface>
32573 +<interface name="container_admin" lineno="1346">
32574 +<summary>
32575 +All of the rules required to
32576 +administrate a container
32577 +environment.
32578 +</summary>
32579 +<param name="domain">
32580 +<summary>
32581 +Domain allowed access.
32582 +</summary>
32583 +</param>
32584 +<param name="role">
32585 +<summary>
32586 +Role allowed access.
32587 +</summary>
32588 +</param>
32589 +<rolecap/>
32590 +</interface>
32591 +<tunable name="container_manage_cgroup" dftval="false">
32592 +<desc>
32593 +<p>
32594 +Allow containers to manage cgroups.
32595 +This is required for systemd to run inside
32596 +containers.
32597 +</p>
32598 +</desc>
32599 +</tunable>
32600 +<tunable name="container_mounton_non_security" dftval="false">
32601 +<desc>
32602 +<p>
32603 +Allow container engines to mount on all non-security files.
32604 +</p>
32605 +</desc>
32606 +</tunable>
32607 +<tunable name="container_use_nfs" dftval="false">
32608 +<desc>
32609 +<p>
32610 +Allow containers to use NFS filesystems.
32611 +</p>
32612 +</desc>
32613 +</tunable>
32614 +<tunable name="container_use_samba" dftval="false">
32615 +<desc>
32616 +<p>
32617 +Allow containers to use CIFS filesystems.
32618 +</p>
32619 +</desc>
32620 +</tunable>
32621 +</module>
32622 <module name="corosync" filename="policy/modules/services/corosync.if">
32623 <summary>Corosync Cluster Engine.</summary>
32624 <interface name="corosync_domtrans" lineno="13">
32625 @@ -94445,53 +95996,86 @@ Domain prefix to be used.
32626 </summary>
32627 </param>
32628 </template>
32629 -<interface name="cron_role" lineno="59">
32630 +<template name="cron_role" lineno="70">
32631 <summary>
32632 Role access for cron.
32633 </summary>
32634 -<param name="role">
32635 +<param name="role_prefix">
32636 <summary>
32637 -Role allowed access.
32638 +The prefix of the user role (e.g., user
32639 +is the prefix for user_r).
32640 </summary>
32641 </param>
32642 -<param name="domain">
32643 +<param name="user_domain">
32644 <summary>
32645 User domain for the role.
32646 </summary>
32647 </param>
32648 +<param name="user_exec_domain">
32649 +<summary>
32650 +User exec domain for execute and transition access.
32651 +</summary>
32652 +</param>
32653 +<param name="role">
32654 +<summary>
32655 +Role allowed access
32656 +</summary>
32657 +</param>
32658 <rolecap/>
32659 -</interface>
32660 -<interface name="cron_unconfined_role" lineno="140">
32661 +</template>
32662 +<template name="cron_unconfined_role" lineno="162">
32663 <summary>
32664 Role access for unconfined cron.
32665 </summary>
32666 -<param name="role">
32667 +<param name="role_prefix">
32668 <summary>
32669 -Role allowed access.
32670 +The prefix of the user role (e.g., user
32671 +is the prefix for user_r).
32672 </summary>
32673 </param>
32674 -<param name="domain">
32675 +<param name="user_domain">
32676 <summary>
32677 User domain for the role.
32678 </summary>
32679 </param>
32680 -</interface>
32681 -<interface name="cron_admin_role" lineno="221">
32682 +<param name="user_exec_domain">
32683 <summary>
32684 -Role access for admin cron.
32685 +User exec domain for execute and transition access.
32686 </summary>
32687 +</param>
32688 <param name="role">
32689 <summary>
32690 -Role allowed access.
32691 +Role allowed access
32692 </summary>
32693 </param>
32694 -<param name="domain">
32695 +</template>
32696 +<template name="cron_admin_role" lineno="254">
32697 +<summary>
32698 +Role access for admin cron.
32699 +</summary>
32700 +<param name="role_prefix">
32701 +<summary>
32702 +The prefix of the user role (e.g., user
32703 +is the prefix for user_r).
32704 +</summary>
32705 +</param>
32706 +<param name="user_domain">
32707 <summary>
32708 User domain for the role.
32709 </summary>
32710 </param>
32711 -</interface>
32712 -<interface name="cron_system_entry" lineno="312">
32713 +<param name="user_exec_domain">
32714 +<summary>
32715 +User exec domain for execute and transition access.
32716 +</summary>
32717 +</param>
32718 +<param name="role">
32719 +<summary>
32720 +Role allowed access
32721 +</summary>
32722 +</param>
32723 +</template>
32724 +<interface name="cron_system_entry" lineno="345">
32725 <summary>
32726 Make the specified program domain
32727 accessible from the system cron jobs.
32728 @@ -94507,7 +96091,7 @@ The type of the file used as an entrypoint to this domain.
32729 </summary>
32730 </param>
32731 </interface>
32732 -<interface name="cron_domtrans" lineno="333">
32733 +<interface name="cron_domtrans" lineno="366">
32734 <summary>
32735 Execute cron in the cron system domain.
32736 </summary>
32737 @@ -94517,7 +96101,7 @@ Domain allowed to transition.
32738 </summary>
32739 </param>
32740 </interface>
32741 -<interface name="cron_exec" lineno="352">
32742 +<interface name="cron_exec" lineno="385">
32743 <summary>
32744 Execute crond in the caller domain.
32745 </summary>
32746 @@ -94527,7 +96111,7 @@ Domain allowed access.
32747 </summary>
32748 </param>
32749 </interface>
32750 -<interface name="cron_initrc_domtrans" lineno="371">
32751 +<interface name="cron_initrc_domtrans" lineno="404">
32752 <summary>
32753 Execute crond server in the crond domain.
32754 </summary>
32755 @@ -94537,7 +96121,7 @@ Domain allowed to transition.
32756 </summary>
32757 </param>
32758 </interface>
32759 -<interface name="cron_use_fds" lineno="389">
32760 +<interface name="cron_use_fds" lineno="422">
32761 <summary>
32762 Use crond file descriptors.
32763 </summary>
32764 @@ -94547,7 +96131,7 @@ Domain allowed access.
32765 </summary>
32766 </param>
32767 </interface>
32768 -<interface name="cron_sigchld" lineno="407">
32769 +<interface name="cron_sigchld" lineno="440">
32770 <summary>
32771 Send child terminated signals to crond.
32772 </summary>
32773 @@ -94557,7 +96141,7 @@ Domain allowed access.
32774 </summary>
32775 </param>
32776 </interface>
32777 -<interface name="cron_setattr_log_files" lineno="425">
32778 +<interface name="cron_setattr_log_files" lineno="458">
32779 <summary>
32780 Set the attributes of cron log files.
32781 </summary>
32782 @@ -94567,7 +96151,7 @@ Domain allowed access.
32783 </summary>
32784 </param>
32785 </interface>
32786 -<interface name="cron_create_log_files" lineno="443">
32787 +<interface name="cron_create_log_files" lineno="476">
32788 <summary>
32789 Create cron log files.
32790 </summary>
32791 @@ -94577,7 +96161,7 @@ Domain allowed access.
32792 </summary>
32793 </param>
32794 </interface>
32795 -<interface name="cron_write_log_files" lineno="461">
32796 +<interface name="cron_write_log_files" lineno="494">
32797 <summary>
32798 Write to cron log files.
32799 </summary>
32800 @@ -94587,7 +96171,7 @@ Domain allowed access.
32801 </summary>
32802 </param>
32803 </interface>
32804 -<interface name="cron_manage_log_files" lineno="480">
32805 +<interface name="cron_manage_log_files" lineno="513">
32806 <summary>
32807 Create, read, write and delete
32808 cron log files.
32809 @@ -94598,7 +96182,7 @@ Domain allowed access.
32810 </summary>
32811 </param>
32812 </interface>
32813 -<interface name="cron_generic_log_filetrans_log" lineno="511">
32814 +<interface name="cron_generic_log_filetrans_log" lineno="544">
32815 <summary>
32816 Create specified objects in generic
32817 log directories with the cron log file type.
32818 @@ -94619,7 +96203,7 @@ The name of the object being created.
32819 </summary>
32820 </param>
32821 </interface>
32822 -<interface name="cron_read_pipes" lineno="529">
32823 +<interface name="cron_read_pipes" lineno="562">
32824 <summary>
32825 Read cron daemon unnamed pipes.
32826 </summary>
32827 @@ -94629,7 +96213,7 @@ Domain allowed access.
32828 </summary>
32829 </param>
32830 </interface>
32831 -<interface name="cron_dontaudit_write_pipes" lineno="548">
32832 +<interface name="cron_dontaudit_write_pipes" lineno="581">
32833 <summary>
32834 Do not audit attempts to write
32835 cron daemon unnamed pipes.
32836 @@ -94640,7 +96224,7 @@ Domain to not audit.
32837 </summary>
32838 </param>
32839 </interface>
32840 -<interface name="cron_rw_pipes" lineno="566">
32841 +<interface name="cron_rw_pipes" lineno="599">
32842 <summary>
32843 Read and write crond unnamed pipes.
32844 </summary>
32845 @@ -94650,7 +96234,7 @@ Domain allowed access.
32846 </summary>
32847 </param>
32848 </interface>
32849 -<interface name="cron_rw_tcp_sockets" lineno="584">
32850 +<interface name="cron_rw_tcp_sockets" lineno="617">
32851 <summary>
32852 Read and write crond TCP sockets.
32853 </summary>
32854 @@ -94660,7 +96244,7 @@ Domain allowed access.
32855 </summary>
32856 </param>
32857 </interface>
32858 -<interface name="cron_dontaudit_rw_tcp_sockets" lineno="603">
32859 +<interface name="cron_dontaudit_rw_tcp_sockets" lineno="636">
32860 <summary>
32861 Do not audit attempts to read and
32862 write cron daemon TCP sockets.
32863 @@ -94671,7 +96255,7 @@ Domain to not audit.
32864 </summary>
32865 </param>
32866 </interface>
32867 -<interface name="cron_search_spool" lineno="621">
32868 +<interface name="cron_search_spool" lineno="654">
32869 <summary>
32870 Search cron spool directories.
32871 </summary>
32872 @@ -94681,7 +96265,7 @@ Domain allowed access.
32873 </summary>
32874 </param>
32875 </interface>
32876 -<interface name="cron_manage_pid_files" lineno="641">
32877 +<interface name="cron_manage_pid_files" lineno="674">
32878 <summary>
32879 Create, read, write, and delete
32880 crond pid files. (Deprecated)
32881 @@ -94692,7 +96276,7 @@ Domain allowed access.
32882 </summary>
32883 </param>
32884 </interface>
32885 -<interface name="cron_anacron_domtrans_system_job" lineno="656">
32886 +<interface name="cron_anacron_domtrans_system_job" lineno="689">
32887 <summary>
32888 Execute anacron in the cron
32889 system domain.
32890 @@ -94703,7 +96287,7 @@ Domain allowed to transition.
32891 </summary>
32892 </param>
32893 </interface>
32894 -<interface name="cron_use_system_job_fds" lineno="675">
32895 +<interface name="cron_use_system_job_fds" lineno="708">
32896 <summary>
32897 Use system cron job file descriptors.
32898 </summary>
32899 @@ -94713,7 +96297,7 @@ Domain allowed access.
32900 </summary>
32901 </param>
32902 </interface>
32903 -<interface name="cron_manage_system_spool" lineno="693">
32904 +<interface name="cron_manage_system_spool" lineno="726">
32905 <summary>
32906 Create, read, write, and delete the system spool.
32907 </summary>
32908 @@ -94723,7 +96307,7 @@ Domain allowed access.
32909 </summary>
32910 </param>
32911 </interface>
32912 -<interface name="cron_read_system_spool" lineno="712">
32913 +<interface name="cron_read_system_spool" lineno="745">
32914 <summary>
32915 Read the system spool.
32916 </summary>
32917 @@ -94733,7 +96317,7 @@ Domain allowed access.
32918 </summary>
32919 </param>
32920 </interface>
32921 -<interface name="cron_rw_tmp_files" lineno="732">
32922 +<interface name="cron_rw_tmp_files" lineno="765">
32923 <summary>
32924 Read and write crond temporary files.
32925 </summary>
32926 @@ -94743,7 +96327,7 @@ Domain allowed access.
32927 </summary>
32928 </param>
32929 </interface>
32930 -<interface name="cron_read_system_job_lib_files" lineno="750">
32931 +<interface name="cron_read_system_job_lib_files" lineno="783">
32932 <summary>
32933 Read system cron job lib files.
32934 </summary>
32935 @@ -94753,7 +96337,7 @@ Domain allowed access.
32936 </summary>
32937 </param>
32938 </interface>
32939 -<interface name="cron_manage_system_job_lib_files" lineno="770">
32940 +<interface name="cron_manage_system_job_lib_files" lineno="803">
32941 <summary>
32942 Create, read, write, and delete
32943 system cron job lib files.
32944 @@ -94764,7 +96348,7 @@ Domain allowed access.
32945 </summary>
32946 </param>
32947 </interface>
32948 -<interface name="cron_write_system_job_pipes" lineno="789">
32949 +<interface name="cron_write_system_job_pipes" lineno="822">
32950 <summary>
32951 Write system cron job unnamed pipes.
32952 </summary>
32953 @@ -94774,7 +96358,7 @@ Domain allowed access.
32954 </summary>
32955 </param>
32956 </interface>
32957 -<interface name="cron_rw_system_job_pipes" lineno="808">
32958 +<interface name="cron_rw_system_job_pipes" lineno="841">
32959 <summary>
32960 Read and write system cron job
32961 unnamed pipes.
32962 @@ -94785,7 +96369,7 @@ Domain allowed access.
32963 </summary>
32964 </param>
32965 </interface>
32966 -<interface name="cron_rw_system_job_stream_sockets" lineno="827">
32967 +<interface name="cron_rw_system_job_stream_sockets" lineno="860">
32968 <summary>
32969 Read and write inherited system cron
32970 job unix domain stream sockets.
32971 @@ -94796,7 +96380,7 @@ Domain allowed access.
32972 </summary>
32973 </param>
32974 </interface>
32975 -<interface name="cron_read_system_job_tmp_files" lineno="845">
32976 +<interface name="cron_read_system_job_tmp_files" lineno="878">
32977 <summary>
32978 Read system cron job temporary files.
32979 </summary>
32980 @@ -94806,7 +96390,7 @@ Domain allowed access.
32981 </summary>
32982 </param>
32983 </interface>
32984 -<interface name="cron_dontaudit_append_system_job_tmp_files" lineno="865">
32985 +<interface name="cron_dontaudit_append_system_job_tmp_files" lineno="898">
32986 <summary>
32987 Do not audit attempts to append temporary
32988 system cron job files.
32989 @@ -94817,7 +96401,7 @@ Domain to not audit.
32990 </summary>
32991 </param>
32992 </interface>
32993 -<interface name="cron_rw_inherited_system_job_tmp_files" lineno="883">
32994 +<interface name="cron_rw_inherited_system_job_tmp_files" lineno="916">
32995 <summary>
32996 Read and write to inherited system cron job temporary files.
32997 </summary>
32998 @@ -94827,7 +96411,7 @@ Domain allowed access.
32999 </summary>
33000 </param>
33001 </interface>
33002 -<interface name="cron_dontaudit_write_system_job_tmp_files" lineno="902">
33003 +<interface name="cron_dontaudit_write_system_job_tmp_files" lineno="935">
33004 <summary>
33005 Do not audit attempts to write temporary
33006 system cron job files.
33007 @@ -94838,7 +96422,7 @@ Domain to not audit.
33008 </summary>
33009 </param>
33010 </interface>
33011 -<interface name="cron_exec_crontab" lineno="921">
33012 +<interface name="cron_exec_crontab" lineno="954">
33013 <summary>
33014 Execute crontab in the caller domain.
33015 </summary>
33016 @@ -94849,7 +96433,7 @@ Domain allowed access.
33017 </param>
33018 <rolecap/>
33019 </interface>
33020 -<interface name="cron_admin" lineno="947">
33021 +<interface name="cron_admin" lineno="980">
33022 <summary>
33023 All of the rules required to
33024 administrate a cron environment.
33025 @@ -95366,7 +96950,7 @@ User domain for the role
33026 </summary>
33027 </param>
33028 </template>
33029 -<interface name="dbus_system_bus_client" lineno="139">
33030 +<interface name="dbus_system_bus_client" lineno="140">
33031 <summary>
33032 Template for creating connections to
33033 the system bus.
33034 @@ -95377,7 +96961,7 @@ Domain allowed access.
33035 </summary>
33036 </param>
33037 </interface>
33038 -<interface name="dbus_connect_all_session_bus" lineno="178">
33039 +<interface name="dbus_connect_all_session_bus" lineno="179">
33040 <summary>
33041 Acquire service on all DBUS
33042 session busses.
33043 @@ -95388,7 +96972,7 @@ Domain allowed access.
33044 </summary>
33045 </param>
33046 </interface>
33047 -<template name="dbus_connect_spec_session_bus" lineno="204">
33048 +<template name="dbus_connect_spec_session_bus" lineno="205">
33049 <summary>
33050 Acquire service on specified
33051 DBUS session bus.
33052 @@ -95405,7 +96989,7 @@ Domain allowed access.
33053 </summary>
33054 </param>
33055 </template>
33056 -<interface name="dbus_all_session_bus_client" lineno="224">
33057 +<interface name="dbus_all_session_bus_client" lineno="225">
33058 <summary>
33059 Creating connections to all
33060 DBUS session busses.
33061 @@ -95416,7 +97000,7 @@ Domain allowed access.
33062 </summary>
33063 </param>
33064 </interface>
33065 -<template name="dbus_spec_session_bus_client" lineno="256">
33066 +<template name="dbus_spec_session_bus_client" lineno="257">
33067 <summary>
33068 Creating connections to specified
33069 DBUS session bus.
33070 @@ -95433,7 +97017,7 @@ Domain allowed access.
33071 </summary>
33072 </param>
33073 </template>
33074 -<interface name="dbus_send_all_session_bus" lineno="283">
33075 +<interface name="dbus_send_all_session_bus" lineno="284">
33076 <summary>
33077 Send messages to all DBUS
33078 session busses.
33079 @@ -95444,7 +97028,7 @@ Domain allowed access.
33080 </summary>
33081 </param>
33082 </interface>
33083 -<template name="dbus_send_spec_session_bus" lineno="309">
33084 +<template name="dbus_send_spec_session_bus" lineno="310">
33085 <summary>
33086 Send messages to specified
33087 DBUS session busses.
33088 @@ -95461,7 +97045,29 @@ Domain allowed access.
33089 </summary>
33090 </param>
33091 </template>
33092 -<interface name="dbus_read_config" lineno="328">
33093 +<interface name="dbus_getattr_session_runtime_socket" lineno="330">
33094 +<summary>
33095 +Allow the specified domain to get the
33096 +attributes of the session dbus sock file.
33097 +</summary>
33098 +<param name="domain">
33099 +<summary>
33100 +Domain allowed access.
33101 +</summary>
33102 +</param>
33103 +</interface>
33104 +<interface name="dbus_write_session_runtime_socket" lineno="349">
33105 +<summary>
33106 +Allow the specified domain to write to
33107 +the session dbus sock file.
33108 +</summary>
33109 +<param name="domain">
33110 +<summary>
33111 +Domain allowed access.
33112 +</summary>
33113 +</param>
33114 +</interface>
33115 +<interface name="dbus_read_config" lineno="367">
33116 <summary>
33117 Read dbus configuration content.
33118 </summary>
33119 @@ -95471,7 +97077,7 @@ Domain allowed access.
33120 </summary>
33121 </param>
33122 </interface>
33123 -<interface name="dbus_read_lib_files" lineno="347">
33124 +<interface name="dbus_read_lib_files" lineno="386">
33125 <summary>
33126 Read system dbus lib files.
33127 </summary>
33128 @@ -95481,7 +97087,7 @@ Domain allowed access.
33129 </summary>
33130 </param>
33131 </interface>
33132 -<interface name="dbus_relabel_lib_dirs" lineno="367">
33133 +<interface name="dbus_relabel_lib_dirs" lineno="406">
33134 <summary>
33135 Relabel system dbus lib directory.
33136 </summary>
33137 @@ -95491,7 +97097,7 @@ Domain allowed access.
33138 </summary>
33139 </param>
33140 </interface>
33141 -<interface name="dbus_manage_lib_files" lineno="387">
33142 +<interface name="dbus_manage_lib_files" lineno="426">
33143 <summary>
33144 Create, read, write, and delete
33145 system dbus lib files.
33146 @@ -95502,7 +97108,7 @@ Domain allowed access.
33147 </summary>
33148 </param>
33149 </interface>
33150 -<interface name="dbus_all_session_domain" lineno="413">
33151 +<interface name="dbus_all_session_domain" lineno="452">
33152 <summary>
33153 Allow a application domain to be
33154 started by the specified session bus.
33155 @@ -95519,7 +97125,7 @@ entry point to this domain.
33156 </summary>
33157 </param>
33158 </interface>
33159 -<template name="dbus_spec_session_domain" lineno="447">
33160 +<template name="dbus_spec_session_domain" lineno="486">
33161 <summary>
33162 Allow a application domain to be
33163 started by the specified session bus.
33164 @@ -95542,7 +97148,7 @@ entry point to this domain.
33165 </summary>
33166 </param>
33167 </template>
33168 -<interface name="dbus_connect_system_bus" lineno="468">
33169 +<interface name="dbus_connect_system_bus" lineno="507">
33170 <summary>
33171 Acquire service on the DBUS system bus.
33172 </summary>
33173 @@ -95552,7 +97158,7 @@ Domain allowed access.
33174 </summary>
33175 </param>
33176 </interface>
33177 -<interface name="dbus_send_system_bus" lineno="487">
33178 +<interface name="dbus_send_system_bus" lineno="526">
33179 <summary>
33180 Send messages to the DBUS system bus.
33181 </summary>
33182 @@ -95562,7 +97168,7 @@ Domain allowed access.
33183 </summary>
33184 </param>
33185 </interface>
33186 -<interface name="dbus_system_bus_unconfined" lineno="506">
33187 +<interface name="dbus_system_bus_unconfined" lineno="545">
33188 <summary>
33189 Unconfined access to DBUS system bus.
33190 </summary>
33191 @@ -95572,7 +97178,7 @@ Domain allowed access.
33192 </summary>
33193 </param>
33194 </interface>
33195 -<interface name="dbus_system_domain" lineno="531">
33196 +<interface name="dbus_system_domain" lineno="570">
33197 <summary>
33198 Create a domain for processes which
33199 can be started by the DBUS system bus.
33200 @@ -95588,7 +97194,7 @@ Type of the program to be used as an entry point to this domain.
33201 </summary>
33202 </param>
33203 </interface>
33204 -<interface name="dbus_use_system_bus_fds" lineno="571">
33205 +<interface name="dbus_use_system_bus_fds" lineno="610">
33206 <summary>
33207 Use and inherit DBUS system bus
33208 file descriptors.
33209 @@ -95599,7 +97205,7 @@ Domain allowed access.
33210 </summary>
33211 </param>
33212 </interface>
33213 -<interface name="dbus_dontaudit_system_bus_rw_tcp_sockets" lineno="590">
33214 +<interface name="dbus_dontaudit_system_bus_rw_tcp_sockets" lineno="629">
33215 <summary>
33216 Do not audit attempts to read and
33217 write DBUS system bus TCP sockets.
33218 @@ -95610,7 +97216,7 @@ Domain to not audit.
33219 </summary>
33220 </param>
33221 </interface>
33222 -<interface name="dbus_watch_system_bus_runtime_dirs" lineno="608">
33223 +<interface name="dbus_watch_system_bus_runtime_dirs" lineno="647">
33224 <summary>
33225 Watch system bus runtime directories.
33226 </summary>
33227 @@ -95620,7 +97226,7 @@ Domain allowed access.
33228 </summary>
33229 </param>
33230 </interface>
33231 -<interface name="dbus_list_system_bus_runtime" lineno="626">
33232 +<interface name="dbus_list_system_bus_runtime" lineno="665">
33233 <summary>
33234 List system bus runtime directories.
33235 </summary>
33236 @@ -95630,7 +97236,7 @@ Domain allowed access.
33237 </summary>
33238 </param>
33239 </interface>
33240 -<interface name="dbus_watch_system_bus_runtime_named_sockets" lineno="644">
33241 +<interface name="dbus_watch_system_bus_runtime_named_sockets" lineno="683">
33242 <summary>
33243 Watch system bus runtime named sockets.
33244 </summary>
33245 @@ -95640,7 +97246,7 @@ Domain allowed access.
33246 </summary>
33247 </param>
33248 </interface>
33249 -<interface name="dbus_read_system_bus_runtime_named_sockets" lineno="662">
33250 +<interface name="dbus_read_system_bus_runtime_named_sockets" lineno="701">
33251 <summary>
33252 Read system bus runtime named sockets.
33253 </summary>
33254 @@ -95650,7 +97256,7 @@ Domain allowed access.
33255 </summary>
33256 </param>
33257 </interface>
33258 -<interface name="dbus_unconfined" lineno="680">
33259 +<interface name="dbus_unconfined" lineno="719">
33260 <summary>
33261 Unconfined access to DBUS.
33262 </summary>
33263 @@ -95660,7 +97266,7 @@ Domain allowed access.
33264 </summary>
33265 </param>
33266 </interface>
33267 -<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="710">
33268 +<interface name="dbus_generic_pid_filetrans_system_dbusd_var_run" lineno="749">
33269 <summary>
33270 Create resources in /run or /var/run with the system_dbusd_runtime_t
33271 label. This method is deprecated in favor of the init_daemon_run_dir
33272 @@ -95682,7 +97288,7 @@ Optional file name used for the resource
33273 </summary>
33274 </param>
33275 </interface>
33276 -<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="724">
33277 +<interface name="dbus_create_system_dbusd_var_run_dirs" lineno="763">
33278 <summary>
33279 Create directories with the system_dbusd_runtime_t label
33280 </summary>
33281 @@ -95999,22 +97605,33 @@ Role allowed access.
33282 </module>
33283 <module name="dirmngr" filename="policy/modules/services/dirmngr.if">
33284 <summary>Server for managing and downloading certificate revocation lists.</summary>
33285 -<interface name="dirmngr_role" lineno="18">
33286 +<template name="dirmngr_role" lineno="29">
33287 <summary>
33288 Role access for dirmngr.
33289 </summary>
33290 -<param name="role">
33291 +<param name="role_prefix">
33292 <summary>
33293 -Role allowed access.
33294 +The prefix of the user role (e.g., user
33295 +is the prefix for user_r).
33296 </summary>
33297 </param>
33298 -<param name="domain">
33299 +<param name="user_domain">
33300 <summary>
33301 User domain for the role.
33302 </summary>
33303 </param>
33304 -</interface>
33305 -<interface name="dirmngr_domtrans" lineno="47">
33306 +<param name="user_exec_domain">
33307 +<summary>
33308 +User exec domain for execute and transition access.
33309 +</summary>
33310 +</param>
33311 +<param name="role">
33312 +<summary>
33313 +Role allowed access
33314 +</summary>
33315 +</param>
33316 +</template>
33317 +<interface name="dirmngr_domtrans" lineno="62">
33318 <summary>
33319 Execute dirmngr in the dirmngr domain.
33320 </summary>
33321 @@ -96024,7 +97641,7 @@ Domain allowed to transition.
33322 </summary>
33323 </param>
33324 </interface>
33325 -<interface name="dirmngr_exec" lineno="66">
33326 +<interface name="dirmngr_exec" lineno="81">
33327 <summary>
33328 Execute the dirmngr in the caller domain.
33329 </summary>
33330 @@ -96034,7 +97651,7 @@ Domain allowed access.
33331 </summary>
33332 </param>
33333 </interface>
33334 -<interface name="dirmngr_stream_connect" lineno="85">
33335 +<interface name="dirmngr_stream_connect" lineno="100">
33336 <summary>
33337 Connect to dirmngr socket
33338 </summary>
33339 @@ -96044,7 +97661,7 @@ Domain allowed access.
33340 </summary>
33341 </param>
33342 </interface>
33343 -<interface name="dirmngr_admin" lineno="114">
33344 +<interface name="dirmngr_admin" lineno="129">
33345 <summary>
33346 All of the rules required to
33347 administrate an dirmngr environment.
33348 @@ -96367,6 +97984,147 @@ Role allowed access.
33349 <rolecap/>
33350 </interface>
33351 </module>
33352 +<module name="docker" filename="policy/modules/services/docker.if">
33353 +<summary>Policy for docker</summary>
33354 +<interface name="docker_domtrans_cli" lineno="13">
33355 +<summary>
33356 +Execute docker CLI in the docker CLI domain.
33357 +</summary>
33358 +<param name="domain">
33359 +<summary>
33360 +Domain allowed to transition.
33361 +</summary>
33362 +</param>
33363 +</interface>
33364 +<interface name="docker_run_cli" lineno="39">
33365 +<summary>
33366 +Execute docker CLI in the docker CLI
33367 +domain, and allow the specified role
33368 +the docker CLI domain.
33369 +</summary>
33370 +<param name="domain">
33371 +<summary>
33372 +Domain allowed to transition.
33373 +</summary>
33374 +</param>
33375 +<param name="role">
33376 +<summary>
33377 +The role to be allowed the docker domain.
33378 +</summary>
33379 +</param>
33380 +</interface>
33381 +<interface name="docker_domtrans_user_daemon" lineno="59">
33382 +<summary>
33383 +Execute docker in the docker user domain.
33384 +</summary>
33385 +<param name="domain">
33386 +<summary>
33387 +Domain allowed to transition.
33388 +</summary>
33389 +</param>
33390 +</interface>
33391 +<interface name="docker_run_user_daemon" lineno="85">
33392 +<summary>
33393 +Execute docker in the docker user
33394 +domain, and allow the specified
33395 +role the docker user domain.
33396 +</summary>
33397 +<param name="domain">
33398 +<summary>
33399 +Domain allowed to transition.
33400 +</summary>
33401 +</param>
33402 +<param name="role">
33403 +<summary>
33404 +The role to be allowed the docker domain.
33405 +</summary>
33406 +</param>
33407 +</interface>
33408 +<interface name="docker_domtrans_user_cli" lineno="106">
33409 +<summary>
33410 +Execute docker CLI in the docker CLI
33411 +user domain.
33412 +</summary>
33413 +<param name="domain">
33414 +<summary>
33415 +Domain allowed to transition.
33416 +</summary>
33417 +</param>
33418 +</interface>
33419 +<interface name="docker_run_user_cli" lineno="133">
33420 +<summary>
33421 +Execute docker CLI in the docker CLI
33422 +user domain, and allow the specified
33423 +role the docker CLI user domain.
33424 +</summary>
33425 +<param name="domain">
33426 +<summary>
33427 +Domain allowed to transition.
33428 +</summary>
33429 +</param>
33430 +<param name="role">
33431 +<summary>
33432 +The role to be allowed the docker
33433 +user domain.
33434 +</summary>
33435 +</param>
33436 +</interface>
33437 +<template name="docker_user_role" lineno="170">
33438 +<summary>
33439 +Role access for rootless docker.
33440 +</summary>
33441 +<param name="role_prefix">
33442 +<summary>
33443 +The prefix of the user role (e.g., user
33444 +is the prefix for user_r).
33445 +</summary>
33446 +</param>
33447 +<param name="user_domain">
33448 +<summary>
33449 +User domain for the role.
33450 +</summary>
33451 +</param>
33452 +<param name="user_exec_domain">
33453 +<summary>
33454 +User exec domain for execute and transition access.
33455 +</summary>
33456 +</param>
33457 +<param name="role">
33458 +<summary>
33459 +Role allowed access.
33460 +</summary>
33461 +</param>
33462 +<rolecap/>
33463 +</template>
33464 +<interface name="docker_signal_user_daemon" lineno="205">
33465 +<summary>
33466 +Send signals to the rootless docker daemon.
33467 +</summary>
33468 +<param name="domain">
33469 +<summary>
33470 +Domain allowed to transition.
33471 +</summary>
33472 +</param>
33473 +</interface>
33474 +<interface name="docker_admin" lineno="231">
33475 +<summary>
33476 +All of the rules required to
33477 +administrate a docker
33478 +environment.
33479 +</summary>
33480 +<param name="domain">
33481 +<summary>
33482 +Domain allowed access.
33483 +</summary>
33484 +</param>
33485 +<param name="role">
33486 +<summary>
33487 +Role allowed access.
33488 +</summary>
33489 +</param>
33490 +<rolecap/>
33491 +</interface>
33492 +</module>
33493 <module name="dovecot" filename="policy/modules/services/dovecot.if">
33494 <summary>POP and IMAP mail server.</summary>
33495 <interface name="dovecot_stream_connect" lineno="14">
33496 @@ -97299,22 +99057,33 @@ Role allowed access.
33497 </module>
33498 <module name="git" filename="policy/modules/services/git.if">
33499 <summary>GIT revision control system.</summary>
33500 -<interface name="git_role" lineno="18">
33501 +<template name="git_role" lineno="29">
33502 <summary>
33503 Role access for Git session.
33504 </summary>
33505 -<param name="role">
33506 +<param name="role_prefix">
33507 <summary>
33508 -Role allowed access.
33509 +The prefix of the user role (e.g., user
33510 +is the prefix for user_r).
33511 </summary>
33512 </param>
33513 -<param name="domain">
33514 +<param name="user_domain">
33515 <summary>
33516 User domain for the role.
33517 </summary>
33518 </param>
33519 -</interface>
33520 -<template name="git_client_role_template" lineno="71">
33521 +<param name="user_exec_domain">
33522 +<summary>
33523 +User exec domain for execute and transition access.
33524 +</summary>
33525 +</param>
33526 +<param name="role">
33527 +<summary>
33528 +Role allowed access
33529 +</summary>
33530 +</param>
33531 +</template>
33532 +<template name="git_client_role_template" lineno="91">
33533 <summary>
33534 Role access for Git client.
33535 </summary>
33536 @@ -97324,18 +99093,23 @@ The prefix of the user role (e.g., user
33537 is the prefix for user_r).
33538 </summary>
33539 </param>
33540 -<param name="user_role">
33541 +<param name="user_domain">
33542 <summary>
33543 -The role associated with the user domain.
33544 +User domain for the role.
33545 </summary>
33546 </param>
33547 -<param name="user_domain">
33548 +<param name="user_exec_domain">
33549 <summary>
33550 -The type of the user domain.
33551 +User exec domain for execute and transition access.
33552 +</summary>
33553 +</param>
33554 +<param name="role">
33555 +<summary>
33556 +Role allowed access
33557 </summary>
33558 </param>
33559 </template>
33560 -<interface name="git_read_generic_sys_content_files" lineno="127">
33561 +<interface name="git_read_generic_sys_content_files" lineno="151">
33562 <summary>
33563 Read generic system content files.
33564 </summary>
33565 @@ -97869,23 +99643,34 @@ Domain prefix to be used.
33566 </summary>
33567 </param>
33568 </template>
33569 -<interface name="hadoop_role" lineno="109">
33570 +<template name="hadoop_role" lineno="120">
33571 <summary>
33572 Role access for hadoop.
33573 </summary>
33574 -<param name="role">
33575 +<param name="role_prefix">
33576 <summary>
33577 -Role allowed access.
33578 +The prefix of the user role (e.g., user
33579 +is the prefix for user_r).
33580 </summary>
33581 </param>
33582 -<param name="domain">
33583 +<param name="user_domain">
33584 <summary>
33585 -Domain allowed access.
33586 +User domain for the role.
33587 +</summary>
33588 +</param>
33589 +<param name="user_exec_domain">
33590 +<summary>
33591 +User exec domain for execute and transition access.
33592 +</summary>
33593 +</param>
33594 +<param name="role">
33595 +<summary>
33596 +Role allowed access
33597 </summary>
33598 </param>
33599 <rolecap/>
33600 -</interface>
33601 -<interface name="hadoop_domtrans" lineno="141">
33602 +</template>
33603 +<interface name="hadoop_domtrans" lineno="157">
33604 <summary>
33605 Execute hadoop in the
33606 hadoop domain.
33607 @@ -97896,7 +99681,7 @@ Domain allowed to transition.
33608 </summary>
33609 </param>
33610 </interface>
33611 -<interface name="hadoop_recvfrom" lineno="160">
33612 +<interface name="hadoop_recvfrom" lineno="176">
33613 <summary>
33614 Receive from hadoop peer.
33615 </summary>
33616 @@ -97906,7 +99691,7 @@ Domain allowed access.
33617 </summary>
33618 </param>
33619 </interface>
33620 -<interface name="hadoop_domtrans_zookeeper_client" lineno="179">
33621 +<interface name="hadoop_domtrans_zookeeper_client" lineno="195">
33622 <summary>
33623 Execute zookeeper client in the
33624 zookeeper client domain.
33625 @@ -97917,7 +99702,7 @@ Domain allowed to transition.
33626 </summary>
33627 </param>
33628 </interface>
33629 -<interface name="hadoop_recvfrom_zookeeper_client" lineno="198">
33630 +<interface name="hadoop_recvfrom_zookeeper_client" lineno="214">
33631 <summary>
33632 Receive from zookeeper peer.
33633 </summary>
33634 @@ -97927,7 +99712,7 @@ Domain allowed access.
33635 </summary>
33636 </param>
33637 </interface>
33638 -<interface name="hadoop_domtrans_zookeeper_server" lineno="217">
33639 +<interface name="hadoop_domtrans_zookeeper_server" lineno="233">
33640 <summary>
33641 Execute zookeeper server in the
33642 zookeeper server domain.
33643 @@ -97938,7 +99723,7 @@ Domain allowed to transition.
33644 </summary>
33645 </param>
33646 </interface>
33647 -<interface name="hadoop_recvfrom_zookeeper_server" lineno="236">
33648 +<interface name="hadoop_recvfrom_zookeeper_server" lineno="252">
33649 <summary>
33650 Receive from zookeeper server peer.
33651 </summary>
33652 @@ -97948,7 +99733,7 @@ Domain allowed access.
33653 </summary>
33654 </param>
33655 </interface>
33656 -<interface name="hadoop_initrc_domtrans_zookeeper_server" lineno="255">
33657 +<interface name="hadoop_initrc_domtrans_zookeeper_server" lineno="271">
33658 <summary>
33659 Execute zookeeper server in the
33660 zookeeper domain.
33661 @@ -97959,7 +99744,7 @@ Domain allowed to transition.
33662 </summary>
33663 </param>
33664 </interface>
33665 -<interface name="hadoop_recvfrom_datanode" lineno="273">
33666 +<interface name="hadoop_recvfrom_datanode" lineno="289">
33667 <summary>
33668 Receive from datanode peer.
33669 </summary>
33670 @@ -97969,7 +99754,7 @@ Domain allowed access.
33671 </summary>
33672 </param>
33673 </interface>
33674 -<interface name="hadoop_read_config" lineno="291">
33675 +<interface name="hadoop_read_config" lineno="307">
33676 <summary>
33677 Read hadoop configuration files.
33678 </summary>
33679 @@ -97979,7 +99764,7 @@ Domain allowed access.
33680 </summary>
33681 </param>
33682 </interface>
33683 -<interface name="hadoop_exec_config" lineno="310">
33684 +<interface name="hadoop_exec_config" lineno="326">
33685 <summary>
33686 Execute hadoop configuration files.
33687 </summary>
33688 @@ -97989,7 +99774,7 @@ Domain allowed access.
33689 </summary>
33690 </param>
33691 </interface>
33692 -<interface name="hadoop_recvfrom_jobtracker" lineno="329">
33693 +<interface name="hadoop_recvfrom_jobtracker" lineno="345">
33694 <summary>
33695 Receive from jobtracker peer.
33696 </summary>
33697 @@ -97999,7 +99784,7 @@ Domain allowed access.
33698 </summary>
33699 </param>
33700 </interface>
33701 -<interface name="hadoop_match_lan_spd" lineno="347">
33702 +<interface name="hadoop_match_lan_spd" lineno="363">
33703 <summary>
33704 Match hadoop lan association.
33705 </summary>
33706 @@ -98009,7 +99794,7 @@ Domain allowed access.
33707 </summary>
33708 </param>
33709 </interface>
33710 -<interface name="hadoop_recvfrom_namenode" lineno="365">
33711 +<interface name="hadoop_recvfrom_namenode" lineno="381">
33712 <summary>
33713 Receive from namenode peer.
33714 </summary>
33715 @@ -98019,7 +99804,7 @@ Domain allowed access.
33716 </summary>
33717 </param>
33718 </interface>
33719 -<interface name="hadoop_recvfrom_secondarynamenode" lineno="383">
33720 +<interface name="hadoop_recvfrom_secondarynamenode" lineno="399">
33721 <summary>
33722 Receive from secondary namenode peer.
33723 </summary>
33724 @@ -98029,7 +99814,7 @@ Domain allowed access.
33725 </summary>
33726 </param>
33727 </interface>
33728 -<interface name="hadoop_recvfrom_tasktracker" lineno="401">
33729 +<interface name="hadoop_recvfrom_tasktracker" lineno="417">
33730 <summary>
33731 Receive from tasktracker peer.
33732 </summary>
33733 @@ -98039,7 +99824,7 @@ Domain allowed access.
33734 </summary>
33735 </param>
33736 </interface>
33737 -<interface name="hadoop_admin" lineno="426">
33738 +<interface name="hadoop_admin" lineno="442">
33739 <summary>
33740 All of the rules required to
33741 administrate an hadoop environment.
33742 @@ -99397,22 +101182,33 @@ Role allowed access.
33743 </module>
33744 <module name="lpd" filename="policy/modules/services/lpd.if">
33745 <summary>Line printer daemon.</summary>
33746 -<interface name="lpd_role" lineno="18">
33747 +<template name="lpd_role" lineno="29">
33748 <summary>
33749 Role access for lpd.
33750 </summary>
33751 -<param name="role">
33752 +<param name="role_prefix">
33753 <summary>
33754 -Role allowed access.
33755 +The prefix of the user role (e.g., user
33756 +is the prefix for user_r).
33757 </summary>
33758 </param>
33759 -<param name="domain">
33760 +<param name="user_domain">
33761 <summary>
33762 User domain for the role.
33763 </summary>
33764 </param>
33765 -</interface>
33766 -<interface name="lpd_domtrans_checkpc" lineno="58">
33767 +<param name="user_exec_domain">
33768 +<summary>
33769 +User exec domain for execute and transition access.
33770 +</summary>
33771 +</param>
33772 +<param name="role">
33773 +<summary>
33774 +Role allowed access
33775 +</summary>
33776 +</param>
33777 +</template>
33778 +<interface name="lpd_domtrans_checkpc" lineno="73">
33779 <summary>
33780 Execute lpd in the lpd domain.
33781 </summary>
33782 @@ -99422,7 +101218,7 @@ Domain allowed to transition.
33783 </summary>
33784 </param>
33785 </interface>
33786 -<interface name="lpd_run_checkpc" lineno="85">
33787 +<interface name="lpd_run_checkpc" lineno="100">
33788 <summary>
33789 Execute amrecover in the lpd
33790 domain, and allow the specified
33791 @@ -99440,7 +101236,7 @@ Role allowed access.
33792 </param>
33793 <rolecap/>
33794 </interface>
33795 -<interface name="lpd_list_spool" lineno="104">
33796 +<interface name="lpd_list_spool" lineno="119">
33797 <summary>
33798 List printer spool directories.
33799 </summary>
33800 @@ -99450,7 +101246,7 @@ Domain allowed access.
33801 </summary>
33802 </param>
33803 </interface>
33804 -<interface name="lpd_read_spool" lineno="123">
33805 +<interface name="lpd_read_spool" lineno="138">
33806 <summary>
33807 Read printer spool files.
33808 </summary>
33809 @@ -99460,7 +101256,7 @@ Domain allowed access.
33810 </summary>
33811 </param>
33812 </interface>
33813 -<interface name="lpd_manage_spool" lineno="143">
33814 +<interface name="lpd_manage_spool" lineno="158">
33815 <summary>
33816 Create, read, write, and delete
33817 printer spool content.
33818 @@ -99471,7 +101267,7 @@ Domain allowed access.
33819 </summary>
33820 </param>
33821 </interface>
33822 -<interface name="lpd_relabel_spool" lineno="164">
33823 +<interface name="lpd_relabel_spool" lineno="179">
33824 <summary>
33825 Relabel spool files.
33826 </summary>
33827 @@ -99481,7 +101277,7 @@ Domain allowed access.
33828 </summary>
33829 </param>
33830 </interface>
33831 -<interface name="lpd_read_config" lineno="184">
33832 +<interface name="lpd_read_config" lineno="199">
33833 <summary>
33834 Read printer configuration files.
33835 </summary>
33836 @@ -99492,7 +101288,7 @@ Domain allowed access.
33837 </param>
33838 <rolecap/>
33839 </interface>
33840 -<interface name="lpd_domtrans_lpr" lineno="203">
33841 +<interface name="lpd_domtrans_lpr" lineno="218">
33842 <summary>
33843 Transition to a user lpr domain.
33844 </summary>
33845 @@ -99502,7 +101298,7 @@ Domain allowed to transition.
33846 </summary>
33847 </param>
33848 </interface>
33849 -<interface name="lpd_run_lpr" lineno="229">
33850 +<interface name="lpd_run_lpr" lineno="244">
33851 <summary>
33852 Execute lpr in the lpr domain, and
33853 allow the specified role the lpr domain.
33854 @@ -99519,7 +101315,7 @@ Role allowed access.
33855 </param>
33856 <rolecap/>
33857 </interface>
33858 -<interface name="lpd_exec_lpr" lineno="248">
33859 +<interface name="lpd_exec_lpr" lineno="263">
33860 <summary>
33861 Execute lpr in the caller domain.
33862 </summary>
33863 @@ -100375,22 +102171,33 @@ Domain prefix to be used.
33864 </summary>
33865 </param>
33866 </template>
33867 -<interface name="mta_role" lineno="77">
33868 +<template name="mta_role" lineno="88">
33869 <summary>
33870 Role access for mta.
33871 </summary>
33872 -<param name="role">
33873 +<param name="role_prefix">
33874 <summary>
33875 -Role allowed access.
33876 +The prefix of the user role (e.g., user
33877 +is the prefix for user_r).
33878 </summary>
33879 </param>
33880 -<param name="domain">
33881 +<param name="user_domain">
33882 <summary>
33883 User domain for the role.
33884 </summary>
33885 </param>
33886 -</interface>
33887 -<interface name="mta_mailserver" lineno="137">
33888 +<param name="user_exec_domain">
33889 +<summary>
33890 +User exec domain for execute and transition access.
33891 +</summary>
33892 +</param>
33893 +<param name="role">
33894 +<summary>
33895 +Role allowed access
33896 +</summary>
33897 +</param>
33898 +</template>
33899 +<interface name="mta_mailserver" lineno="152">
33900 <summary>
33901 Make the specified domain usable for a mail server.
33902 </summary>
33903 @@ -100405,7 +102212,7 @@ Type of the program to be used as an entry point to this domain.
33904 </summary>
33905 </param>
33906 </interface>
33907 -<interface name="mta_agent_executable" lineno="156">
33908 +<interface name="mta_agent_executable" lineno="171">
33909 <summary>
33910 Make the specified type a MTA executable file.
33911 </summary>
33912 @@ -100415,7 +102222,7 @@ Type to be used as a mail client.
33913 </summary>
33914 </param>
33915 </interface>
33916 -<interface name="mta_read_mail_home_files" lineno="176">
33917 +<interface name="mta_read_mail_home_files" lineno="191">
33918 <summary>
33919 Read mta mail home files.
33920 </summary>
33921 @@ -100425,7 +102232,7 @@ Domain allowed access.
33922 </summary>
33923 </param>
33924 </interface>
33925 -<interface name="mta_manage_mail_home_files" lineno="196">
33926 +<interface name="mta_manage_mail_home_files" lineno="211">
33927 <summary>
33928 Create, read, write, and delete
33929 mta mail home files.
33930 @@ -100436,7 +102243,7 @@ Domain allowed access.
33931 </summary>
33932 </param>
33933 </interface>
33934 -<interface name="mta_home_filetrans_mail_home" lineno="227">
33935 +<interface name="mta_home_filetrans_mail_home" lineno="242">
33936 <summary>
33937 Create specified objects in user home
33938 directories with the generic mail
33939 @@ -100458,7 +102265,7 @@ The name of the object being created.
33940 </summary>
33941 </param>
33942 </interface>
33943 -<interface name="mta_manage_mail_home_rw_content" lineno="246">
33944 +<interface name="mta_manage_mail_home_rw_content" lineno="261">
33945 <summary>
33946 Create, read, write, and delete
33947 mta mail home rw content.
33948 @@ -100469,7 +102276,7 @@ Domain allowed access.
33949 </summary>
33950 </param>
33951 </interface>
33952 -<interface name="mta_home_filetrans_mail_home_rw" lineno="280">
33953 +<interface name="mta_home_filetrans_mail_home_rw" lineno="295">
33954 <summary>
33955 Create specified objects in user home
33956 directories with the generic mail
33957 @@ -100491,7 +102298,7 @@ The name of the object being created.
33958 </summary>
33959 </param>
33960 </interface>
33961 -<interface name="mta_system_content" lineno="298">
33962 +<interface name="mta_system_content" lineno="313">
33963 <summary>
33964 Make the specified type by a system MTA.
33965 </summary>
33966 @@ -100501,7 +102308,7 @@ Type to be used as a mail client.
33967 </summary>
33968 </param>
33969 </interface>
33970 -<interface name="mta_sendmail_mailserver" lineno="331">
33971 +<interface name="mta_sendmail_mailserver" lineno="346">
33972 <summary>
33973 Modified mailserver interface for
33974 sendmail daemon use.
33975 @@ -100526,7 +102333,7 @@ The type to be used for the mail server.
33976 </summary>
33977 </param>
33978 </interface>
33979 -<interface name="mta_use_mailserver_fds" lineno="352">
33980 +<interface name="mta_use_mailserver_fds" lineno="367">
33981 <summary>
33982 Inherit FDs from mailserver_domain domains
33983 </summary>
33984 @@ -100536,7 +102343,7 @@ Type for a list server or delivery agent that inherits fds
33985 </summary>
33986 </param>
33987 </interface>
33988 -<interface name="mta_mailserver_sender" lineno="371">
33989 +<interface name="mta_mailserver_sender" lineno="386">
33990 <summary>
33991 Make a type a mailserver type used
33992 for sending mail.
33993 @@ -100547,7 +102354,7 @@ Mail server domain type used for sending mail.
33994 </summary>
33995 </param>
33996 </interface>
33997 -<interface name="mta_mailserver_delivery" lineno="390">
33998 +<interface name="mta_mailserver_delivery" lineno="405">
33999 <summary>
34000 Make a type a mailserver type used
34001 for delivering mail to local users.
34002 @@ -100558,7 +102365,7 @@ Mail server domain type used for delivering mail.
34003 </summary>
34004 </param>
34005 </interface>
34006 -<interface name="mta_mailserver_user_agent" lineno="410">
34007 +<interface name="mta_mailserver_user_agent" lineno="425">
34008 <summary>
34009 Make a type a mailserver type used
34010 for sending mail on behalf of local
34011 @@ -100570,7 +102377,7 @@ Mail server domain type used for sending local mail.
34012 </summary>
34013 </param>
34014 </interface>
34015 -<interface name="mta_send_mail" lineno="428">
34016 +<interface name="mta_send_mail" lineno="443">
34017 <summary>
34018 Send mail from the system.
34019 </summary>
34020 @@ -100580,7 +102387,7 @@ Domain allowed to transition.
34021 </summary>
34022 </param>
34023 </interface>
34024 -<interface name="mta_sendmail_domtrans" lineno="473">
34025 +<interface name="mta_sendmail_domtrans" lineno="488">
34026 <summary>
34027 Execute send mail in a specified domain.
34028 </summary>
34029 @@ -100605,7 +102412,7 @@ Domain to transition to.
34030 </summary>
34031 </param>
34032 </interface>
34033 -<interface name="mta_signal_system_mail" lineno="495">
34034 +<interface name="mta_signal_system_mail" lineno="510">
34035 <summary>
34036 Send signals to system mail.
34037 </summary>
34038 @@ -100615,7 +102422,7 @@ Domain allowed access.
34039 </summary>
34040 </param>
34041 </interface>
34042 -<interface name="mta_kill_system_mail" lineno="513">
34043 +<interface name="mta_kill_system_mail" lineno="528">
34044 <summary>
34045 Send kill signals to system mail.
34046 </summary>
34047 @@ -100625,7 +102432,7 @@ Domain allowed access.
34048 </summary>
34049 </param>
34050 </interface>
34051 -<interface name="mta_sendmail_exec" lineno="531">
34052 +<interface name="mta_sendmail_exec" lineno="546">
34053 <summary>
34054 Execute sendmail in the caller domain.
34055 </summary>
34056 @@ -100635,7 +102442,7 @@ Domain allowed access.
34057 </summary>
34058 </param>
34059 </interface>
34060 -<interface name="mta_sendmail_entry_point" lineno="551">
34061 +<interface name="mta_sendmail_entry_point" lineno="566">
34062 <summary>
34063 Make sendmail usable as an entry
34064 point for the domain.
34065 @@ -100646,7 +102453,7 @@ Domain to be entered.
34066 </summary>
34067 </param>
34068 </interface>
34069 -<interface name="mta_read_config" lineno="570">
34070 +<interface name="mta_read_config" lineno="585">
34071 <summary>
34072 Read mail server configuration content.
34073 </summary>
34074 @@ -100657,7 +102464,7 @@ Domain allowed access.
34075 </param>
34076 <rolecap/>
34077 </interface>
34078 -<interface name="mta_write_config" lineno="592">
34079 +<interface name="mta_write_config" lineno="607">
34080 <summary>
34081 Write mail server configuration files.
34082 </summary>
34083 @@ -100668,7 +102475,7 @@ Domain allowed access.
34084 </param>
34085 <rolecap/>
34086 </interface>
34087 -<interface name="mta_read_aliases" lineno="611">
34088 +<interface name="mta_read_aliases" lineno="626">
34089 <summary>
34090 Read mail address alias files.
34091 </summary>
34092 @@ -100678,7 +102485,7 @@ Domain allowed access.
34093 </summary>
34094 </param>
34095 </interface>
34096 -<interface name="mta_map_aliases" lineno="639">
34097 +<interface name="mta_map_aliases" lineno="654">
34098 <summary>
34099 Read mail address alias files.
34100 </summary>
34101 @@ -100688,7 +102495,7 @@ Domain allowed access.
34102 </summary>
34103 </param>
34104 </interface>
34105 -<interface name="mta_manage_aliases" lineno="658">
34106 +<interface name="mta_manage_aliases" lineno="673">
34107 <summary>
34108 Create, read, write, and delete
34109 mail address alias content.
34110 @@ -100699,7 +102506,7 @@ Domain allowed access.
34111 </summary>
34112 </param>
34113 </interface>
34114 -<interface name="mta_etc_filetrans_aliases" lineno="700">
34115 +<interface name="mta_etc_filetrans_aliases" lineno="715">
34116 <summary>
34117 Create specified object in generic
34118 etc directories with the mail address
34119 @@ -100721,7 +102528,7 @@ The name of the object being created.
34120 </summary>
34121 </param>
34122 </interface>
34123 -<interface name="mta_spec_filetrans_aliases" lineno="735">
34124 +<interface name="mta_spec_filetrans_aliases" lineno="750">
34125 <summary>
34126 Create specified objects in specified
34127 directories with a type transition to
34128 @@ -100748,7 +102555,7 @@ The name of the object being created.
34129 </summary>
34130 </param>
34131 </interface>
34132 -<interface name="mta_rw_aliases" lineno="754">
34133 +<interface name="mta_rw_aliases" lineno="769">
34134 <summary>
34135 Read and write mail alias files.
34136 </summary>
34137 @@ -100759,7 +102566,7 @@ Domain allowed access.
34138 </param>
34139 <rolecap/>
34140 </interface>
34141 -<interface name="mta_dontaudit_rw_delivery_tcp_sockets" lineno="784">
34142 +<interface name="mta_dontaudit_rw_delivery_tcp_sockets" lineno="799">
34143 <summary>
34144 Do not audit attempts to read
34145 and write TCP sockets of mail
34146 @@ -100771,7 +102578,7 @@ Domain to not audit.
34147 </summary>
34148 </param>
34149 </interface>
34150 -<interface name="mta_list_spool" lineno="802">
34151 +<interface name="mta_list_spool" lineno="817">
34152 <summary>
34153 Allow listing the mail spool.
34154 </summary>
34155 @@ -100781,7 +102588,7 @@ Domain to not audit.
34156 </summary>
34157 </param>
34158 </interface>
34159 -<interface name="mta_read_spool_symlinks" lineno="820">
34160 +<interface name="mta_read_spool_symlinks" lineno="835">
34161 <summary>
34162 Allow reading mail spool symlinks.
34163 </summary>
34164 @@ -100791,7 +102598,7 @@ Domain to not audit.
34165 </summary>
34166 </param>
34167 </interface>
34168 -<interface name="mta_dontaudit_read_spool_symlinks" lineno="839">
34169 +<interface name="mta_dontaudit_read_spool_symlinks" lineno="854">
34170 <summary>
34171 Do not audit attempts to read
34172 mail spool symlinks.
34173 @@ -100802,7 +102609,7 @@ Domain to not audit.
34174 </summary>
34175 </param>
34176 </interface>
34177 -<interface name="mta_getattr_spool" lineno="857">
34178 +<interface name="mta_getattr_spool" lineno="872">
34179 <summary>
34180 Get attributes of mail spool content.
34181 </summary>
34182 @@ -100812,7 +102619,7 @@ Domain allowed access.
34183 </summary>
34184 </param>
34185 </interface>
34186 -<interface name="mta_dontaudit_getattr_spool_files" lineno="879">
34187 +<interface name="mta_dontaudit_getattr_spool_files" lineno="894">
34188 <summary>
34189 Do not audit attempts to get
34190 attributes of mail spool files.
34191 @@ -100823,7 +102630,7 @@ Domain to not audit.
34192 </summary>
34193 </param>
34194 </interface>
34195 -<interface name="mta_spool_filetrans" lineno="917">
34196 +<interface name="mta_spool_filetrans" lineno="932">
34197 <summary>
34198 Create specified objects in the
34199 mail spool directory with a
34200 @@ -100850,7 +102657,7 @@ The name of the object being created.
34201 </summary>
34202 </param>
34203 </interface>
34204 -<interface name="mta_read_spool_files" lineno="936">
34205 +<interface name="mta_read_spool_files" lineno="951">
34206 <summary>
34207 Read mail spool files.
34208 </summary>
34209 @@ -100860,7 +102667,7 @@ Domain allowed access.
34210 </summary>
34211 </param>
34212 </interface>
34213 -<interface name="mta_rw_spool" lineno="956">
34214 +<interface name="mta_rw_spool" lineno="971">
34215 <summary>
34216 Read and write mail spool files.
34217 </summary>
34218 @@ -100870,7 +102677,7 @@ Domain allowed access.
34219 </summary>
34220 </param>
34221 </interface>
34222 -<interface name="mta_append_spool" lineno="977">
34223 +<interface name="mta_append_spool" lineno="992">
34224 <summary>
34225 Create, read, and write mail spool files.
34226 </summary>
34227 @@ -100880,7 +102687,7 @@ Domain allowed access.
34228 </summary>
34229 </param>
34230 </interface>
34231 -<interface name="mta_delete_spool" lineno="998">
34232 +<interface name="mta_delete_spool" lineno="1013">
34233 <summary>
34234 Delete mail spool files.
34235 </summary>
34236 @@ -100890,7 +102697,7 @@ Domain allowed access.
34237 </summary>
34238 </param>
34239 </interface>
34240 -<interface name="mta_manage_spool" lineno="1018">
34241 +<interface name="mta_manage_spool" lineno="1033">
34242 <summary>
34243 Create, read, write, and delete
34244 mail spool content.
34245 @@ -100901,7 +102708,7 @@ Domain allowed access.
34246 </summary>
34247 </param>
34248 </interface>
34249 -<interface name="mta_watch_spool" lineno="1040">
34250 +<interface name="mta_watch_spool" lineno="1055">
34251 <summary>
34252 Watch mail spool content.
34253 </summary>
34254 @@ -100911,7 +102718,7 @@ Domain allowed access.
34255 </summary>
34256 </param>
34257 </interface>
34258 -<interface name="mta_queue_filetrans" lineno="1075">
34259 +<interface name="mta_queue_filetrans" lineno="1090">
34260 <summary>
34261 Create specified objects in the
34262 mail queue spool directory with a
34263 @@ -100938,7 +102745,7 @@ The name of the object being created.
34264 </summary>
34265 </param>
34266 </interface>
34267 -<interface name="mta_search_queue" lineno="1094">
34268 +<interface name="mta_search_queue" lineno="1109">
34269 <summary>
34270 Search mail queue directories.
34271 </summary>
34272 @@ -100948,7 +102755,7 @@ Domain allowed access.
34273 </summary>
34274 </param>
34275 </interface>
34276 -<interface name="mta_list_queue" lineno="1113">
34277 +<interface name="mta_list_queue" lineno="1128">
34278 <summary>
34279 List mail queue directories.
34280 </summary>
34281 @@ -100958,7 +102765,7 @@ Domain allowed access.
34282 </summary>
34283 </param>
34284 </interface>
34285 -<interface name="mta_read_queue" lineno="1132">
34286 +<interface name="mta_read_queue" lineno="1147">
34287 <summary>
34288 Read mail queue files.
34289 </summary>
34290 @@ -100968,7 +102775,7 @@ Domain allowed access.
34291 </summary>
34292 </param>
34293 </interface>
34294 -<interface name="mta_dontaudit_rw_queue" lineno="1152">
34295 +<interface name="mta_dontaudit_rw_queue" lineno="1167">
34296 <summary>
34297 Do not audit attempts to read and
34298 write mail queue content.
34299 @@ -100979,7 +102786,7 @@ Domain to not audit.
34300 </summary>
34301 </param>
34302 </interface>
34303 -<interface name="mta_manage_queue" lineno="1172">
34304 +<interface name="mta_manage_queue" lineno="1187">
34305 <summary>
34306 Create, read, write, and delete
34307 mail queue content.
34308 @@ -100990,7 +102797,7 @@ Domain allowed access.
34309 </summary>
34310 </param>
34311 </interface>
34312 -<interface name="mta_read_sendmail_bin" lineno="1192">
34313 +<interface name="mta_read_sendmail_bin" lineno="1207">
34314 <summary>
34315 Read sendmail binary.
34316 </summary>
34317 @@ -101000,7 +102807,7 @@ Domain allowed access.
34318 </summary>
34319 </param>
34320 </interface>
34321 -<interface name="mta_rw_user_mail_stream_sockets" lineno="1211">
34322 +<interface name="mta_rw_user_mail_stream_sockets" lineno="1226">
34323 <summary>
34324 Read and write unix domain stream
34325 sockets of all base mail domains.
34326 @@ -102637,6 +104444,45 @@ Domain allowed access.
34327 </param>
34328 </interface>
34329 </module>
34330 +<module name="obfs4proxy" filename="policy/modules/services/obfs4proxy.if">
34331 +<summary>obfs4proxy.</summary>
34332 +<interface name="obfs4proxy_domtrans" lineno="13">
34333 +<summary>
34334 +Execute a domain transition to run obfs4proxy.
34335 +</summary>
34336 +<param name="domain">
34337 +<summary>
34338 +Domain allowed to transition.
34339 +</summary>
34340 +</param>
34341 +</interface>
34342 +<interface name="obfs4proxy_signal" lineno="32">
34343 +<summary>
34344 +Send terminated signals to obfs4proxy.
34345 +</summary>
34346 +<param name="domain">
34347 +<summary>
34348 +Domain allowed access.
34349 +</summary>
34350 +</param>
34351 +</interface>
34352 +<tunable name="obfs4proxy_bind_all_unreserved_ports" dftval="false">
34353 +<desc>
34354 +<p>
34355 +Determine whether obfs4proxy can bind
34356 +tcp sockets to all unreserved ports.
34357 +</p>
34358 +</desc>
34359 +</tunable>
34360 +<tunable name="obfs4proxy_bind_http_ports" dftval="false">
34361 +<desc>
34362 +<p>
34363 +Determine whether obfs4proxy can bind
34364 +tcp sockets to all http ports.
34365 +</p>
34366 +</desc>
34367 +</tunable>
34368 +</module>
34369 <module name="oddjob" filename="policy/modules/services/oddjob.if">
34370 <summary>D-BUS service which runs odd jobs on behalf of client applications.</summary>
34371 <interface name="oddjob_domtrans" lineno="13">
34372 @@ -103503,6 +105349,166 @@ Role allowed access.
34373 <rolecap/>
34374 </interface>
34375 </module>
34376 +<module name="podman" filename="policy/modules/services/podman.if">
34377 +<summary>Policy for podman</summary>
34378 +<interface name="podman_domtrans" lineno="13">
34379 +<summary>
34380 +Execute podman in the podman domain.
34381 +</summary>
34382 +<param name="domain">
34383 +<summary>
34384 +Domain allowed to transition.
34385 +</summary>
34386 +</param>
34387 +</interface>
34388 +<interface name="podman_run" lineno="39">
34389 +<summary>
34390 +Execute podman in the podman domain,
34391 +and allow the specified role the
34392 +podman domain.
34393 +</summary>
34394 +<param name="domain">
34395 +<summary>
34396 +Domain allowed to transition.
34397 +</summary>
34398 +</param>
34399 +<param name="role">
34400 +<summary>
34401 +The role to be allowed the podman domain.
34402 +</summary>
34403 +</param>
34404 +</interface>
34405 +<interface name="podman_domtrans_user" lineno="60">
34406 +<summary>
34407 +Execute podman in the podman user
34408 +domain (rootless podman).
34409 +</summary>
34410 +<param name="domain">
34411 +<summary>
34412 +Domain allowed to transition.
34413 +</summary>
34414 +</param>
34415 +</interface>
34416 +<interface name="podman_run_user" lineno="87">
34417 +<summary>
34418 +Execute podman in the podman user
34419 +domain, and allow the specified role
34420 +the podman user domain (rootless
34421 +podman).
34422 +</summary>
34423 +<param name="domain">
34424 +<summary>
34425 +Domain allowed to transition.
34426 +</summary>
34427 +</param>
34428 +<param name="role">
34429 +<summary>
34430 +The role to be allowed the podman domain.
34431 +</summary>
34432 +</param>
34433 +</interface>
34434 +<interface name="podman_domtrans_conmon" lineno="107">
34435 +<summary>
34436 +Execute conmon in the conmon domain.
34437 +</summary>
34438 +<param name="domain">
34439 +<summary>
34440 +Domain allowed to transition.
34441 +</summary>
34442 +</param>
34443 +</interface>
34444 +<interface name="podman_run_conmon" lineno="133">
34445 +<summary>
34446 +Execute conmon in the conmon domain,
34447 +and allow the specified role the
34448 +conmon domain.
34449 +</summary>
34450 +<param name="domain">
34451 +<summary>
34452 +Domain allowed to transition.
34453 +</summary>
34454 +</param>
34455 +<param name="role">
34456 +<summary>
34457 +The role to be allowed the conmon domain.
34458 +</summary>
34459 +</param>
34460 +</interface>
34461 +<interface name="podman_domtrans_conmon_user" lineno="154">
34462 +<summary>
34463 +Execute conmon in the conmon user
34464 +domain (rootless podman).
34465 +</summary>
34466 +<param name="domain">
34467 +<summary>
34468 +Domain allowed to transition.
34469 +</summary>
34470 +</param>
34471 +</interface>
34472 +<interface name="podman_run_conmon_user" lineno="181">
34473 +<summary>
34474 +Execute conmon in the conmon user
34475 +domain, and allow the specified role
34476 +the conmon user domain (rootless
34477 +podman).
34478 +</summary>
34479 +<param name="domain">
34480 +<summary>
34481 +Domain allowed to transition.
34482 +</summary>
34483 +</param>
34484 +<param name="role">
34485 +<summary>
34486 +The role to be allowed the conmon domain.
34487 +</summary>
34488 +</param>
34489 +</interface>
34490 +<template name="podman_user_role" lineno="218">
34491 +<summary>
34492 +Role access for rootless podman.
34493 +</summary>
34494 +<param name="role_prefix">
34495 +<summary>
34496 +The prefix of the user role (e.g., user
34497 +is the prefix for user_r).
34498 +</summary>
34499 +</param>
34500 +<param name="user_domain">
34501 +<summary>
34502 +User domain for the role.
34503 +</summary>
34504 +</param>
34505 +<param name="user_exec_domain">
34506 +<summary>
34507 +User exec domain for execute and transition access.
34508 +</summary>
34509 +</param>
34510 +<param name="role">
34511 +<summary>
34512 +Role allowed access.
34513 +</summary>
34514 +</param>
34515 +<rolecap/>
34516 +</template>
34517 +<interface name="podman_admin" lineno="255">
34518 +<summary>
34519 +All of the rules required to
34520 +administrate a podman
34521 +environment.
34522 +</summary>
34523 +<param name="domain">
34524 +<summary>
34525 +Domain allowed access.
34526 +</summary>
34527 +</param>
34528 +<param name="role">
34529 +<summary>
34530 +Role allowed access.
34531 +</summary>
34532 +</param>
34533 +<rolecap/>
34534 +</interface>
34535 +</module>
34536 <module name="policykit" filename="policy/modules/services/policykit.if">
34537 <summary>Policy framework for controlling privileges for system-wide services.</summary>
34538 <interface name="policykit_dbus_chat" lineno="14">
34539 @@ -104187,22 +106193,33 @@ Role allowed access.
34540 </module>
34541 <module name="postgresql" filename="policy/modules/services/postgresql.if">
34542 <summary>PostgreSQL relational database</summary>
34543 -<interface name="postgresql_role" lineno="18">
34544 +<template name="postgresql_role" lineno="29">
34545 <summary>
34546 Role access for SE-PostgreSQL.
34547 </summary>
34548 -<param name="user_role">
34549 +<param name="role_prefix">
34550 <summary>
34551 -The role associated with the user domain.
34552 +The prefix of the user role (e.g., user
34553 +is the prefix for user_r).
34554 </summary>
34555 </param>
34556 <param name="user_domain">
34557 <summary>
34558 -The type of the user domain.
34559 +User domain for the role.
34560 </summary>
34561 </param>
34562 -</interface>
34563 -<interface name="postgresql_loadable_module" lineno="109">
34564 +<param name="user_exec_domain">
34565 +<summary>
34566 +User exec domain for execute and transition access.
34567 +</summary>
34568 +</param>
34569 +<param name="role">
34570 +<summary>
34571 +Role allowed access
34572 +</summary>
34573 +</param>
34574 +</template>
34575 +<interface name="postgresql_loadable_module" lineno="125">
34576 <summary>
34577 Marks as a SE-PostgreSQL loadable shared library module
34578 </summary>
34579 @@ -104212,7 +106229,7 @@ Type marked as a database object type.
34580 </summary>
34581 </param>
34582 </interface>
34583 -<interface name="postgresql_database_object" lineno="127">
34584 +<interface name="postgresql_database_object" lineno="143">
34585 <summary>
34586 Marks as a SE-PostgreSQL database object type
34587 </summary>
34588 @@ -104222,7 +106239,7 @@ Type marked as a database object type.
34589 </summary>
34590 </param>
34591 </interface>
34592 -<interface name="postgresql_schema_object" lineno="145">
34593 +<interface name="postgresql_schema_object" lineno="161">
34594 <summary>
34595 Marks as a SE-PostgreSQL schema object type
34596 </summary>
34597 @@ -104232,7 +106249,7 @@ Type marked as a schema object type.
34598 </summary>
34599 </param>
34600 </interface>
34601 -<interface name="postgresql_table_object" lineno="163">
34602 +<interface name="postgresql_table_object" lineno="179">
34603 <summary>
34604 Marks as a SE-PostgreSQL table/column/tuple object type
34605 </summary>
34606 @@ -104242,7 +106259,7 @@ Type marked as a table/column/tuple object type.
34607 </summary>
34608 </param>
34609 </interface>
34610 -<interface name="postgresql_system_table_object" lineno="181">
34611 +<interface name="postgresql_system_table_object" lineno="197">
34612 <summary>
34613 Marks as a SE-PostgreSQL system table/column/tuple object type
34614 </summary>
34615 @@ -104252,7 +106269,7 @@ Type marked as a table/column/tuple object type.
34616 </summary>
34617 </param>
34618 </interface>
34619 -<interface name="postgresql_sequence_object" lineno="200">
34620 +<interface name="postgresql_sequence_object" lineno="216">
34621 <summary>
34622 Marks as a SE-PostgreSQL sequence type
34623 </summary>
34624 @@ -104262,7 +106279,7 @@ Type marked as a sequence type.
34625 </summary>
34626 </param>
34627 </interface>
34628 -<interface name="postgresql_view_object" lineno="218">
34629 +<interface name="postgresql_view_object" lineno="234">
34630 <summary>
34631 Marks as a SE-PostgreSQL view object type
34632 </summary>
34633 @@ -104272,7 +106289,7 @@ Type marked as a view object type.
34634 </summary>
34635 </param>
34636 </interface>
34637 -<interface name="postgresql_procedure_object" lineno="236">
34638 +<interface name="postgresql_procedure_object" lineno="252">
34639 <summary>
34640 Marks as a SE-PostgreSQL procedure object type
34641 </summary>
34642 @@ -104282,7 +106299,7 @@ Type marked as a procedure object type.
34643 </summary>
34644 </param>
34645 </interface>
34646 -<interface name="postgresql_trusted_procedure_object" lineno="254">
34647 +<interface name="postgresql_trusted_procedure_object" lineno="270">
34648 <summary>
34649 Marks as a SE-PostgreSQL trusted procedure object type
34650 </summary>
34651 @@ -104292,7 +106309,7 @@ Type marked as a trusted procedure object type.
34652 </summary>
34653 </param>
34654 </interface>
34655 -<interface name="postgresql_language_object" lineno="274">
34656 +<interface name="postgresql_language_object" lineno="290">
34657 <summary>
34658 Marks as a SE-PostgreSQL procedural language object type
34659 </summary>
34660 @@ -104302,7 +106319,7 @@ Type marked as a procedural language object type.
34661 </summary>
34662 </param>
34663 </interface>
34664 -<interface name="postgresql_blob_object" lineno="292">
34665 +<interface name="postgresql_blob_object" lineno="308">
34666 <summary>
34667 Marks as a SE-PostgreSQL binary large object type
34668 </summary>
34669 @@ -104312,7 +106329,7 @@ Type marked as a database binary large object type.
34670 </summary>
34671 </param>
34672 </interface>
34673 -<interface name="postgresql_search_db" lineno="310">
34674 +<interface name="postgresql_search_db" lineno="326">
34675 <summary>
34676 Allow the specified domain to search postgresql's database directory.
34677 </summary>
34678 @@ -104322,7 +106339,7 @@ Domain allowed access.
34679 </summary>
34680 </param>
34681 </interface>
34682 -<interface name="postgresql_manage_db" lineno="327">
34683 +<interface name="postgresql_manage_db" lineno="343">
34684 <summary>
34685 Allow the specified domain to manage postgresql's database.
34686 </summary>
34687 @@ -104332,7 +106349,7 @@ Domain allowed access.
34688 </summary>
34689 </param>
34690 </interface>
34691 -<interface name="postgresql_exec" lineno="347">
34692 +<interface name="postgresql_exec" lineno="363">
34693 <summary>
34694 Execute postgresql in the calling domain.
34695 </summary>
34696 @@ -104342,7 +106359,7 @@ Domain allowed access
34697 </summary>
34698 </param>
34699 </interface>
34700 -<interface name="postgresql_domtrans" lineno="365">
34701 +<interface name="postgresql_domtrans" lineno="381">
34702 <summary>
34703 Execute postgresql in the postgresql domain.
34704 </summary>
34705 @@ -104352,7 +106369,7 @@ Domain allowed to transition.
34706 </summary>
34707 </param>
34708 </interface>
34709 -<interface name="postgresql_signal" lineno="383">
34710 +<interface name="postgresql_signal" lineno="399">
34711 <summary>
34712 Allow domain to signal postgresql
34713 </summary>
34714 @@ -104362,7 +106379,7 @@ Domain allowed access.
34715 </summary>
34716 </param>
34717 </interface>
34718 -<interface name="postgresql_read_config" lineno="401">
34719 +<interface name="postgresql_read_config" lineno="417">
34720 <summary>
34721 Allow the specified domain to read postgresql's etc.
34722 </summary>
34723 @@ -104373,7 +106390,7 @@ Domain allowed access.
34724 </param>
34725 <rolecap/>
34726 </interface>
34727 -<interface name="postgresql_tcp_connect" lineno="422">
34728 +<interface name="postgresql_tcp_connect" lineno="438">
34729 <summary>
34730 Allow the specified domain to connect to postgresql with a tcp socket.
34731 </summary>
34732 @@ -104383,7 +106400,7 @@ Domain allowed access.
34733 </summary>
34734 </param>
34735 </interface>
34736 -<interface name="postgresql_stream_connect" lineno="443">
34737 +<interface name="postgresql_stream_connect" lineno="459">
34738 <summary>
34739 Allow the specified domain to connect to postgresql with a unix socket.
34740 </summary>
34741 @@ -104394,7 +106411,7 @@ Domain allowed access.
34742 </param>
34743 <rolecap/>
34744 </interface>
34745 -<interface name="postgresql_unpriv_client" lineno="465">
34746 +<interface name="postgresql_unpriv_client" lineno="481">
34747 <summary>
34748 Allow the specified domain unprivileged accesses to unifined database objects
34749 managed by SE-PostgreSQL,
34750 @@ -104405,7 +106422,7 @@ Domain allowed access.
34751 </summary>
34752 </param>
34753 </interface>
34754 -<interface name="postgresql_unconfined" lineno="557">
34755 +<interface name="postgresql_unconfined" lineno="573">
34756 <summary>
34757 Allow the specified domain unconfined accesses to any database objects
34758 managed by SE-PostgreSQL,
34759 @@ -104416,7 +106433,7 @@ Domain allowed access.
34760 </summary>
34761 </param>
34762 </interface>
34763 -<interface name="postgresql_admin" lineno="581">
34764 +<interface name="postgresql_admin" lineno="597">
34765 <summary>
34766 All of the rules required to administrate an postgresql environment
34767 </summary>
34768 @@ -105231,22 +107248,33 @@ Role allowed access.
34769 </module>
34770 <module name="pyzor" filename="policy/modules/services/pyzor.if">
34771 <summary>Pyzor is a distributed, collaborative spam detection and filtering network.</summary>
34772 -<interface name="pyzor_role" lineno="18">
34773 +<template name="pyzor_role" lineno="29">
34774 <summary>
34775 Role access for pyzor.
34776 </summary>
34777 -<param name="role">
34778 +<param name="role_prefix">
34779 <summary>
34780 -Role allowed access
34781 +The prefix of the user role (e.g., user
34782 +is the prefix for user_r).
34783 </summary>
34784 </param>
34785 -<param name="domain">
34786 +<param name="user_domain">
34787 <summary>
34788 -User domain for the role
34789 +User domain for the role.
34790 </summary>
34791 </param>
34792 -</interface>
34793 -<interface name="pyzor_signal" lineno="49">
34794 +<param name="user_exec_domain">
34795 +<summary>
34796 +User exec domain for execute and transition access.
34797 +</summary>
34798 +</param>
34799 +<param name="role">
34800 +<summary>
34801 +Role allowed access
34802 +</summary>
34803 +</param>
34804 +</template>
34805 +<interface name="pyzor_signal" lineno="64">
34806 <summary>
34807 Send generic signals to pyzor.
34808 </summary>
34809 @@ -105256,7 +107284,7 @@ Domain allowed access.
34810 </summary>
34811 </param>
34812 </interface>
34813 -<interface name="pyzor_domtrans" lineno="67">
34814 +<interface name="pyzor_domtrans" lineno="82">
34815 <summary>
34816 Execute pyzor with a domain transition.
34817 </summary>
34818 @@ -105266,7 +107294,7 @@ Domain allowed to transition.
34819 </summary>
34820 </param>
34821 </interface>
34822 -<interface name="pyzor_exec" lineno="86">
34823 +<interface name="pyzor_exec" lineno="101">
34824 <summary>
34825 Execute pyzor in the caller domain.
34826 </summary>
34827 @@ -105276,7 +107304,7 @@ Domain allowed access.
34828 </summary>
34829 </param>
34830 </interface>
34831 -<interface name="pyzor_admin" lineno="112">
34832 +<interface name="pyzor_admin" lineno="127">
34833 <summary>
34834 All of the rules required to
34835 administrate an pyzor environment.
34836 @@ -105563,22 +107591,33 @@ Domain prefix to be used.
34837 </summary>
34838 </param>
34839 </template>
34840 -<interface name="razor_role" lineno="51">
34841 +<template name="razor_role" lineno="62">
34842 <summary>
34843 Role access for razor.
34844 </summary>
34845 -<param name="role">
34846 +<param name="role_prefix">
34847 <summary>
34848 -Role allowed access.
34849 +The prefix of the user role (e.g., user
34850 +is the prefix for user_r).
34851 </summary>
34852 </param>
34853 -<param name="domain">
34854 +<param name="user_domain">
34855 <summary>
34856 User domain for the role.
34857 </summary>
34858 </param>
34859 -</interface>
34860 -<interface name="razor_domtrans" lineno="82">
34861 +<param name="user_exec_domain">
34862 +<summary>
34863 +User exec domain for execute and transition access.
34864 +</summary>
34865 +</param>
34866 +<param name="role">
34867 +<summary>
34868 +Role allowed access
34869 +</summary>
34870 +</param>
34871 +</template>
34872 +<interface name="razor_domtrans" lineno="97">
34873 <summary>
34874 Execute razor in the system razor domain.
34875 </summary>
34876 @@ -105588,7 +107627,7 @@ Domain allowed to transition.
34877 </summary>
34878 </param>
34879 </interface>
34880 -<interface name="razor_manage_home_content" lineno="102">
34881 +<interface name="razor_manage_home_content" lineno="117">
34882 <summary>
34883 Create, read, write, and delete
34884 razor home content.
34885 @@ -105599,7 +107638,7 @@ Domain allowed access.
34886 </summary>
34887 </param>
34888 </interface>
34889 -<interface name="razor_read_lib_files" lineno="123">
34890 +<interface name="razor_read_lib_files" lineno="138">
34891 <summary>
34892 Read razor lib files.
34893 </summary>
34894 @@ -106007,6 +108046,73 @@ Role allowed access.
34895 <rolecap/>
34896 </interface>
34897 </module>
34898 +<module name="rootlesskit" filename="policy/modules/services/rootlesskit.if">
34899 +<summary>Policy for RootlessKit</summary>
34900 +<interface name="rootlesskit_exec" lineno="13">
34901 +<summary>
34902 +Execute rootlesskit in the caller domain.
34903 +</summary>
34904 +<param name="domain">
34905 +<summary>
34906 +Domain allowed access.
34907 +</summary>
34908 +</param>
34909 +</interface>
34910 +<interface name="rootlesskit_domtrans" lineno="31">
34911 +<summary>
34912 +Execute rootlesskit in the rootlesskit domain.
34913 +</summary>
34914 +<param name="domain">
34915 +<summary>
34916 +Domain allowed to transition.
34917 +</summary>
34918 +</param>
34919 +</interface>
34920 +<interface name="rootlesskit_run" lineno="57">
34921 +<summary>
34922 +Execute rootlesskit in the rootlesskit
34923 +domain, and allow the specified role
34924 +the rootlesskit domain.
34925 +</summary>
34926 +<param name="domain">
34927 +<summary>
34928 +Domain allowed to transition.
34929 +</summary>
34930 +</param>
34931 +<param name="role">
34932 +<summary>
34933 +The role to be allowed the rootlesskit domain.
34934 +</summary>
34935 +</param>
34936 +</interface>
34937 +<template name="rootlesskit_role" lineno="94">
34938 +<summary>
34939 +Role access for rootlesskit.
34940 +</summary>
34941 +<param name="role_prefix">
34942 +<summary>
34943 +The prefix of the user role (e.g., user
34944 +is the prefix for user_r).
34945 +</summary>
34946 +</param>
34947 +<param name="user_domain">
34948 +<summary>
34949 +User domain for the role.
34950 +</summary>
34951 +</param>
34952 +<param name="user_exec_domain">
34953 +<summary>
34954 +User exec domain for execute and transition access.
34955 +</summary>
34956 +</param>
34957 +<param name="role">
34958 +<summary>
34959 +Role allowed access.
34960 +</summary>
34961 +</param>
34962 +<rolecap/>
34963 +</template>
34964 +</module>
34965 <module name="rpc" filename="policy/modules/services/rpc.if">
34966 <summary>Remote Procedure Call Daemon.</summary>
34967 <interface name="rpc_stub" lineno="13">
34968 @@ -108037,22 +110143,33 @@ Role allowed access.
34969 </module>
34970 <module name="spamassassin" filename="policy/modules/services/spamassassin.if">
34971 <summary>Filter used for removing unsolicited email.</summary>
34972 -<interface name="spamassassin_role" lineno="18">
34973 +<template name="spamassassin_role" lineno="29">
34974 <summary>
34975 Role access for spamassassin.
34976 </summary>
34977 -<param name="role">
34978 +<param name="role_prefix">
34979 <summary>
34980 -Role allowed access.
34981 +The prefix of the user role (e.g., user
34982 +is the prefix for user_r).
34983 </summary>
34984 </param>
34985 -<param name="domain">
34986 +<param name="user_domain">
34987 <summary>
34988 User domain for the role.
34989 </summary>
34990 </param>
34991 -</interface>
34992 -<interface name="spamassassin_run_update" lineno="57">
34993 +<param name="user_exec_domain">
34994 +<summary>
34995 +User exec domain for execute and transition access.
34996 +</summary>
34997 +</param>
34998 +<param name="role">
34999 +<summary>
35000 +Role allowed access
35001 +</summary>
35002 +</param>
35003 +</template>
35004 +<interface name="spamassassin_run_update" lineno="73">
35005 <summary>
35006 Execute sa-update in the spamd-update domain,
35007 and allow the specified role
35008 @@ -108070,7 +110187,7 @@ Role allowed access.
35009 </summary>
35010 </param>
35011 </interface>
35012 -<interface name="spamassassin_exec" lineno="77">
35013 +<interface name="spamassassin_exec" lineno="93">
35014 <summary>
35015 Execute the standalone spamassassin
35016 program in the caller directory.
35017 @@ -108081,7 +110198,7 @@ Domain allowed access.
35018 </summary>
35019 </param>
35020 </interface>
35021 -<interface name="spamassassin_signal_spamd" lineno="96">
35022 +<interface name="spamassassin_signal_spamd" lineno="112">
35023 <summary>
35024 Send generic signals to spamd.
35025 </summary>
35026 @@ -108091,7 +110208,7 @@ Domain allowed access.
35027 </summary>
35028 </param>
35029 </interface>
35030 -<interface name="spamassassin_reload" lineno="115">
35031 +<interface name="spamassassin_reload" lineno="131">
35032 <summary>
35033 reload SA service
35034 </summary>
35035 @@ -108102,7 +110219,7 @@ Domain allowed access.
35036 </param>
35037 <rolecap/>
35038 </interface>
35039 -<interface name="spamassassin_status" lineno="135">
35040 +<interface name="spamassassin_status" lineno="151">
35041 <summary>
35042 Get SA service status
35043 </summary>
35044 @@ -108113,7 +110230,7 @@ Domain allowed access.
35045 </param>
35046 <rolecap/>
35047 </interface>
35048 -<interface name="spamassassin_exec_spamd" lineno="154">
35049 +<interface name="spamassassin_exec_spamd" lineno="170">
35050 <summary>
35051 Execute spamd in the caller domain.
35052 </summary>
35053 @@ -108123,7 +110240,7 @@ Domain allowed access.
35054 </summary>
35055 </param>
35056 </interface>
35057 -<interface name="spamassassin_domtrans_client" lineno="173">
35058 +<interface name="spamassassin_domtrans_client" lineno="189">
35059 <summary>
35060 Execute spamc in the spamc domain.
35061 </summary>
35062 @@ -108133,7 +110250,7 @@ Domain allowed to transition.
35063 </summary>
35064 </param>
35065 </interface>
35066 -<interface name="spamassassin_exec_client" lineno="192">
35067 +<interface name="spamassassin_exec_client" lineno="208">
35068 <summary>
35069 Execute spamc in the caller domain.
35070 </summary>
35071 @@ -108143,7 +110260,7 @@ Domain allowed access.
35072 </summary>
35073 </param>
35074 </interface>
35075 -<interface name="spamassassin_kill_client" lineno="211">
35076 +<interface name="spamassassin_kill_client" lineno="227">
35077 <summary>
35078 Send kill signals to spamc.
35079 </summary>
35080 @@ -108153,7 +110270,7 @@ Domain allowed access.
35081 </summary>
35082 </param>
35083 </interface>
35084 -<interface name="spamassassin_domtrans_local_client" lineno="230">
35085 +<interface name="spamassassin_domtrans_local_client" lineno="246">
35086 <summary>
35087 Execute spamassassin standalone client
35088 in the user spamassassin domain.
35089 @@ -108164,7 +110281,7 @@ Domain allowed to transition.
35090 </summary>
35091 </param>
35092 </interface>
35093 -<interface name="spamassassin_manage_spamd_home_content" lineno="250">
35094 +<interface name="spamassassin_manage_spamd_home_content" lineno="266">
35095 <summary>
35096 Create, read, write, and delete
35097 spamd home content.
35098 @@ -108175,7 +110292,7 @@ Domain allowed access.
35099 </summary>
35100 </param>
35101 </interface>
35102 -<interface name="spamassassin_relabel_spamd_home_content" lineno="271">
35103 +<interface name="spamassassin_relabel_spamd_home_content" lineno="287">
35104 <summary>
35105 Relabel spamd home content.
35106 </summary>
35107 @@ -108185,7 +110302,7 @@ Domain allowed access.
35108 </summary>
35109 </param>
35110 </interface>
35111 -<interface name="spamassassin_home_filetrans_spamd_home" lineno="303">
35112 +<interface name="spamassassin_home_filetrans_spamd_home" lineno="319">
35113 <summary>
35114 Create objects in user home
35115 directories with the spamd home type.
35116 @@ -108206,7 +110323,7 @@ The name of the object being created.
35117 </summary>
35118 </param>
35119 </interface>
35120 -<interface name="spamassassin_read_lib_files" lineno="321">
35121 +<interface name="spamassassin_read_lib_files" lineno="337">
35122 <summary>
35123 Read spamd lib files.
35124 </summary>
35125 @@ -108216,7 +110333,7 @@ Domain allowed access.
35126 </summary>
35127 </param>
35128 </interface>
35129 -<interface name="spamassassin_manage_lib_files" lineno="341">
35130 +<interface name="spamassassin_manage_lib_files" lineno="357">
35131 <summary>
35132 Create, read, write, and delete
35133 spamd lib files.
35134 @@ -108227,7 +110344,7 @@ Domain allowed access.
35135 </summary>
35136 </param>
35137 </interface>
35138 -<interface name="spamassassin_read_spamd_pid_files" lineno="360">
35139 +<interface name="spamassassin_read_spamd_pid_files" lineno="376">
35140 <summary>
35141 Read spamd pid files. (Deprecated)
35142 </summary>
35143 @@ -108237,7 +110354,7 @@ Domain allowed access.
35144 </summary>
35145 </param>
35146 </interface>
35147 -<interface name="spamassassin_read_spamd_runtime_files" lineno="375">
35148 +<interface name="spamassassin_read_spamd_runtime_files" lineno="391">
35149 <summary>
35150 Read spamd runtime files.
35151 </summary>
35152 @@ -108247,7 +110364,7 @@ Domain allowed access.
35153 </summary>
35154 </param>
35155 </interface>
35156 -<interface name="spamassassin_read_spamd_tmp_files" lineno="394">
35157 +<interface name="spamassassin_read_spamd_tmp_files" lineno="410">
35158 <summary>
35159 Read temporary spamd files.
35160 </summary>
35161 @@ -108257,7 +110374,7 @@ Domain allowed access.
35162 </summary>
35163 </param>
35164 </interface>
35165 -<interface name="spamassassin_dontaudit_getattr_spamd_tmp_sockets" lineno="413">
35166 +<interface name="spamassassin_dontaudit_getattr_spamd_tmp_sockets" lineno="429">
35167 <summary>
35168 Do not audit attempts to get
35169 attributes of temporary spamd sockets.
35170 @@ -108268,7 +110385,7 @@ Domain to not audit.
35171 </summary>
35172 </param>
35173 </interface>
35174 -<interface name="spamassassin_stream_connect_spamd" lineno="432">
35175 +<interface name="spamassassin_stream_connect_spamd" lineno="448">
35176 <summary>
35177 Connect to spamd with a unix
35178 domain stream socket.
35179 @@ -108279,7 +110396,7 @@ Domain allowed access.
35180 </summary>
35181 </param>
35182 </interface>
35183 -<interface name="spamassassin_admin" lineno="458">
35184 +<interface name="spamassassin_admin" lineno="474">
35185 <summary>
35186 All of the rules required to
35187 administrate an spamassassin environment.
35188 @@ -108516,7 +110633,7 @@ The role associated with the user domain.
35189 </summary>
35190 </param>
35191 </template>
35192 -<template name="ssh_server_template" lineno="168">
35193 +<template name="ssh_server_template" lineno="172">
35194 <summary>
35195 The template to define a ssh server.
35196 </summary>
35197 @@ -108536,28 +110653,33 @@ is the prefix for sshd_t).
35198 </summary>
35199 </param>
35200 </template>
35201 -<template name="ssh_role_template" lineno="299">
35202 +<template name="ssh_role_template" lineno="309">
35203 <summary>
35204 Role access for ssh
35205 </summary>
35206 <param name="role_prefix">
35207 <summary>
35208 -The prefix of the role (e.g., user
35209 +The prefix of the user role (e.g., user
35210 is the prefix for user_r).
35211 </summary>
35212 </param>
35213 -<param name="role">
35214 +<param name="user_domain">
35215 <summary>
35216 -Role allowed access
35217 +User domain for the role.
35218 </summary>
35219 </param>
35220 -<param name="domain">
35221 +<param name="user_exec_domain">
35222 <summary>
35223 -User domain for the role
35224 +User exec domain for execute and transition access.
35225 +</summary>
35226 +</param>
35227 +<param name="role">
35228 +<summary>
35229 +Role allowed access
35230 </summary>
35231 </param>
35232 </template>
35233 -<interface name="ssh_sigchld" lineno="456">
35234 +<interface name="ssh_sigchld" lineno="474">
35235 <summary>
35236 Send a SIGCHLD signal to the ssh server.
35237 </summary>
35238 @@ -108567,7 +110689,7 @@ Domain allowed access.
35239 </summary>
35240 </param>
35241 </interface>
35242 -<interface name="ssh_signal" lineno="474">
35243 +<interface name="ssh_signal" lineno="492">
35244 <summary>
35245 Send a generic signal to the ssh server.
35246 </summary>
35247 @@ -108577,7 +110699,7 @@ Domain allowed access.
35248 </summary>
35249 </param>
35250 </interface>
35251 -<interface name="ssh_signull" lineno="492">
35252 +<interface name="ssh_signull" lineno="510">
35253 <summary>
35254 Send a null signal to sshd processes.
35255 </summary>
35256 @@ -108587,7 +110709,7 @@ Domain allowed access.
35257 </summary>
35258 </param>
35259 </interface>
35260 -<interface name="ssh_read_pipes" lineno="510">
35261 +<interface name="ssh_read_pipes" lineno="528">
35262 <summary>
35263 Read a ssh server unnamed pipe.
35264 </summary>
35265 @@ -108597,7 +110719,7 @@ Domain allowed access.
35266 </summary>
35267 </param>
35268 </interface>
35269 -<interface name="ssh_rw_pipes" lineno="527">
35270 +<interface name="ssh_rw_pipes" lineno="545">
35271 <summary>
35272 Read and write a ssh server unnamed pipe.
35273 </summary>
35274 @@ -108607,7 +110729,7 @@ Domain allowed access.
35275 </summary>
35276 </param>
35277 </interface>
35278 -<interface name="ssh_rw_stream_sockets" lineno="545">
35279 +<interface name="ssh_rw_stream_sockets" lineno="563">
35280 <summary>
35281 Read and write ssh server unix domain stream sockets.
35282 </summary>
35283 @@ -108617,7 +110739,7 @@ Domain allowed access.
35284 </summary>
35285 </param>
35286 </interface>
35287 -<interface name="ssh_rw_tcp_sockets" lineno="563">
35288 +<interface name="ssh_rw_tcp_sockets" lineno="581">
35289 <summary>
35290 Read and write ssh server TCP sockets.
35291 </summary>
35292 @@ -108627,7 +110749,7 @@ Domain allowed access.
35293 </summary>
35294 </param>
35295 </interface>
35296 -<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="582">
35297 +<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="600">
35298 <summary>
35299 Do not audit attempts to read and write
35300 ssh server TCP sockets.
35301 @@ -108638,7 +110760,7 @@ Domain to not audit.
35302 </summary>
35303 </param>
35304 </interface>
35305 -<interface name="ssh_exec_sshd" lineno="600">
35306 +<interface name="ssh_exec_sshd" lineno="618">
35307 <summary>
35308 Execute the ssh daemon in the caller domain.
35309 </summary>
35310 @@ -108648,7 +110770,7 @@ Domain allowed access.
35311 </summary>
35312 </param>
35313 </interface>
35314 -<interface name="ssh_domtrans" lineno="619">
35315 +<interface name="ssh_domtrans" lineno="637">
35316 <summary>
35317 Execute the ssh daemon sshd domain.
35318 </summary>
35319 @@ -108658,7 +110780,7 @@ Domain allowed to transition.
35320 </summary>
35321 </param>
35322 </interface>
35323 -<interface name="ssh_client_domtrans" lineno="637">
35324 +<interface name="ssh_client_domtrans" lineno="655">
35325 <summary>
35326 Execute the ssh client in the ssh client domain.
35327 </summary>
35328 @@ -108668,7 +110790,7 @@ Domain allowed to transition.
35329 </summary>
35330 </param>
35331 </interface>
35332 -<interface name="ssh_exec" lineno="655">
35333 +<interface name="ssh_exec" lineno="673">
35334 <summary>
35335 Execute the ssh client in the caller domain.
35336 </summary>
35337 @@ -108678,7 +110800,7 @@ Domain allowed access.
35338 </summary>
35339 </param>
35340 </interface>
35341 -<interface name="ssh_setattr_key_files" lineno="674">
35342 +<interface name="ssh_setattr_key_files" lineno="692">
35343 <summary>
35344 Set the attributes of sshd key files.
35345 </summary>
35346 @@ -108688,7 +110810,7 @@ Domain allowed access.
35347 </summary>
35348 </param>
35349 </interface>
35350 -<interface name="ssh_agent_exec" lineno="693">
35351 +<interface name="ssh_agent_exec" lineno="711">
35352 <summary>
35353 Execute the ssh agent client in the caller domain.
35354 </summary>
35355 @@ -108698,7 +110820,7 @@ Domain allowed access.
35356 </summary>
35357 </param>
35358 </interface>
35359 -<interface name="ssh_read_user_home_files" lineno="712">
35360 +<interface name="ssh_read_user_home_files" lineno="730">
35361 <summary>
35362 Read ssh home directory content
35363 </summary>
35364 @@ -108708,7 +110830,7 @@ Domain allowed access.
35365 </summary>
35366 </param>
35367 </interface>
35368 -<interface name="ssh_domtrans_keygen" lineno="733">
35369 +<interface name="ssh_domtrans_keygen" lineno="751">
35370 <summary>
35371 Execute the ssh key generator in the ssh keygen domain.
35372 </summary>
35373 @@ -108718,7 +110840,7 @@ Domain allowed to transition.
35374 </summary>
35375 </param>
35376 </interface>
35377 -<interface name="ssh_dontaudit_read_server_keys" lineno="751">
35378 +<interface name="ssh_dontaudit_read_server_keys" lineno="769">
35379 <summary>
35380 Read ssh server keys
35381 </summary>
35382 @@ -108728,7 +110850,7 @@ Domain to not audit.
35383 </summary>
35384 </param>
35385 </interface>
35386 -<interface name="ssh_manage_home_files" lineno="769">
35387 +<interface name="ssh_manage_home_files" lineno="787">
35388 <summary>
35389 Manage ssh home directory content
35390 </summary>
35391 @@ -108738,7 +110860,7 @@ Domain allowed access.
35392 </summary>
35393 </param>
35394 </interface>
35395 -<interface name="ssh_delete_tmp" lineno="788">
35396 +<interface name="ssh_delete_tmp" lineno="806">
35397 <summary>
35398 Delete from the ssh temp files.
35399 </summary>
35400 @@ -108748,7 +110870,7 @@ Domain allowed access.
35401 </summary>
35402 </param>
35403 </interface>
35404 -<interface name="ssh_dontaudit_agent_tmp" lineno="807">
35405 +<interface name="ssh_dontaudit_agent_tmp" lineno="825">
35406 <summary>
35407 dontaudit access to ssh agent tmp dirs
35408 </summary>
35409 @@ -109417,6 +111539,16 @@ Role allowed access.
35410 </param>
35411 <rolecap/>
35412 </interface>
35413 +<interface name="tor_rw_pt_state_var_files" lineno="73">
35414 +<summary>
35415 +Read and write Tor pluggable transport state var files.
35416 +</summary>
35417 +<param name="domain">
35418 +<summary>
35419 +Domain allowed access.
35420 +</summary>
35421 +</param>
35422 +</interface>
35423 <tunable name="tor_bind_all_unreserved_ports" dftval="false">
35424 <desc>
35425 <p>
35426 @@ -110286,17 +112418,7 @@ Domain prefix to be used.
35427 </summary>
35428 </param>
35429 </template>
35430 -<template name="virt_lxc_domain_template" lineno="102">
35431 -<summary>
35432 -The template to define a virt lxc domain.
35433 -</summary>
35434 -<param name="domain_prefix">
35435 -<summary>
35436 -Domain prefix to be used.
35437 -</summary>
35438 -</param>
35439 -</template>
35440 -<interface name="virt_image" lineno="126">
35441 +<interface name="virt_image" lineno="102">
35442 <summary>
35443 Make the specified type virt image type.
35444 </summary>
35445 @@ -110306,7 +112428,7 @@ Type to be used as a virtual image.
35446 </summary>
35447 </param>
35448 </interface>
35449 -<interface name="virt_domtrans" lineno="146">
35450 +<interface name="virt_domtrans" lineno="122">
35451 <summary>
35452 Execute a domain transition to run virtd.
35453 </summary>
35454 @@ -110316,7 +112438,7 @@ Domain allowed to transition.
35455 </summary>
35456 </param>
35457 </interface>
35458 -<interface name="virt_domtrans_qmf" lineno="165">
35459 +<interface name="virt_domtrans_qmf" lineno="141">
35460 <summary>
35461 Execute a domain transition to run virt qmf.
35462 </summary>
35463 @@ -110326,7 +112448,7 @@ Domain allowed to transition.
35464 </summary>
35465 </param>
35466 </interface>
35467 -<interface name="virt_domtrans_bridgehelper" lineno="185">
35468 +<interface name="virt_domtrans_bridgehelper" lineno="161">
35469 <summary>
35470 Execute a domain transition to
35471 run virt bridgehelper.
35472 @@ -110337,7 +112459,7 @@ Domain allowed to transition.
35473 </summary>
35474 </param>
35475 </interface>
35476 -<interface name="virt_domtrans_leaseshelper" lineno="205">
35477 +<interface name="virt_domtrans_leaseshelper" lineno="181">
35478 <summary>
35479 Execute a domain transition to
35480 run virt leaseshelper.
35481 @@ -110348,7 +112470,7 @@ Domain allowed to transition.
35482 </summary>
35483 </param>
35484 </interface>
35485 -<interface name="virt_run_bridgehelper" lineno="231">
35486 +<interface name="virt_run_bridgehelper" lineno="207">
35487 <summary>
35488 Execute bridgehelper in the bridgehelper
35489 domain, and allow the specified role
35490 @@ -110365,7 +112487,7 @@ Role allowed access.
35491 </summary>
35492 </param>
35493 </interface>
35494 -<interface name="virt_run_virt_domain" lineno="257">
35495 +<interface name="virt_run_virt_domain" lineno="233">
35496 <summary>
35497 Execute virt domain in the their
35498 domain, and allow the specified
35499 @@ -110382,7 +112504,7 @@ Role allowed access.
35500 </summary>
35501 </param>
35502 </interface>
35503 -<interface name="virt_signal_all_virt_domains" lineno="281">
35504 +<interface name="virt_signal_all_virt_domains" lineno="257">
35505 <summary>
35506 Send generic signals to all virt domains.
35507 </summary>
35508 @@ -110392,7 +112514,7 @@ Domain allowed access.
35509 </summary>
35510 </param>
35511 </interface>
35512 -<interface name="virt_kill_all_virt_domains" lineno="299">
35513 +<interface name="virt_kill_all_virt_domains" lineno="275">
35514 <summary>
35515 Send kill signals to all virt domains.
35516 </summary>
35517 @@ -110402,24 +112524,7 @@ Domain allowed access.
35518 </summary>
35519 </param>
35520 </interface>
35521 -<interface name="virt_run_svirt_lxc_domain" lineno="324">
35522 -<summary>
35523 -Execute svirt lxc domains in their
35524 -domain, and allow the specified
35525 -role that svirt lxc domain.
35526 -</summary>
35527 -<param name="domain">
35528 -<summary>
35529 -Domain allowed to transition.
35530 -</summary>
35531 -</param>
35532 -<param name="role">
35533 -<summary>
35534 -Role allowed access.
35535 -</summary>
35536 -</param>
35537 -</interface>
35538 -<interface name="virt_getattr_virtd_exec_files" lineno="348">
35539 +<interface name="virt_getattr_virtd_exec_files" lineno="293">
35540 <summary>
35541 Get attributes of virtd executable files.
35542 </summary>
35543 @@ -110429,7 +112534,7 @@ Domain allowed access.
35544 </summary>
35545 </param>
35546 </interface>
35547 -<interface name="virt_stream_connect" lineno="367">
35548 +<interface name="virt_stream_connect" lineno="312">
35549 <summary>
35550 Connect to virt with a unix
35551 domain stream socket.
35552 @@ -110440,7 +112545,7 @@ Domain allowed access.
35553 </summary>
35554 </param>
35555 </interface>
35556 -<interface name="virt_attach_tun_iface" lineno="386">
35557 +<interface name="virt_attach_tun_iface" lineno="331">
35558 <summary>
35559 Attach to virt tun devices.
35560 </summary>
35561 @@ -110450,7 +112555,7 @@ Domain allowed access.
35562 </summary>
35563 </param>
35564 </interface>
35565 -<interface name="virt_read_config" lineno="405">
35566 +<interface name="virt_read_config" lineno="350">
35567 <summary>
35568 Read virt configuration content.
35569 </summary>
35570 @@ -110460,7 +112565,7 @@ Domain allowed access.
35571 </summary>
35572 </param>
35573 </interface>
35574 -<interface name="virt_manage_config" lineno="428">
35575 +<interface name="virt_manage_config" lineno="373">
35576 <summary>
35577 Create, read, write, and delete
35578 virt configuration content.
35579 @@ -110471,7 +112576,7 @@ Domain allowed access.
35580 </summary>
35581 </param>
35582 </interface>
35583 -<interface name="virt_read_content" lineno="450">
35584 +<interface name="virt_read_content" lineno="395">
35585 <summary>
35586 Read virt content.
35587 </summary>
35588 @@ -110481,7 +112586,7 @@ Domain allowed access.
35589 </summary>
35590 </param>
35591 </interface>
35592 -<interface name="virt_manage_virt_content" lineno="486">
35593 +<interface name="virt_manage_virt_content" lineno="431">
35594 <summary>
35595 Create, read, write, and delete
35596 virt content.
35597 @@ -110492,7 +112597,7 @@ Domain allowed access.
35598 </summary>
35599 </param>
35600 </interface>
35601 -<interface name="virt_relabel_virt_content" lineno="522">
35602 +<interface name="virt_relabel_virt_content" lineno="467">
35603 <summary>
35604 Relabel virt content.
35605 </summary>
35606 @@ -110502,7 +112607,7 @@ Domain allowed access.
35607 </summary>
35608 </param>
35609 </interface>
35610 -<interface name="virt_home_filetrans_virt_content" lineno="557">
35611 +<interface name="virt_home_filetrans_virt_content" lineno="502">
35612 <summary>
35613 Create specified objects in user home
35614 directories with the virt content type.
35615 @@ -110523,7 +112628,7 @@ The name of the object being created.
35616 </summary>
35617 </param>
35618 </interface>
35619 -<interface name="virt_manage_svirt_home_content" lineno="576">
35620 +<interface name="virt_manage_svirt_home_content" lineno="521">
35621 <summary>
35622 Create, read, write, and delete
35623 svirt home content.
35624 @@ -110534,7 +112639,7 @@ Domain allowed access.
35625 </summary>
35626 </param>
35627 </interface>
35628 -<interface name="virt_relabel_svirt_home_content" lineno="611">
35629 +<interface name="virt_relabel_svirt_home_content" lineno="556">
35630 <summary>
35631 Relabel svirt home content.
35632 </summary>
35633 @@ -110544,7 +112649,7 @@ Domain allowed access.
35634 </summary>
35635 </param>
35636 </interface>
35637 -<interface name="virt_home_filetrans_svirt_home" lineno="645">
35638 +<interface name="virt_home_filetrans_svirt_home" lineno="590">
35639 <summary>
35640 Create specified objects in user home
35641 directories with the svirt home type.
35642 @@ -110565,7 +112670,7 @@ The name of the object being created.
35643 </summary>
35644 </param>
35645 </interface>
35646 -<interface name="virt_home_filetrans" lineno="680">
35647 +<interface name="virt_home_filetrans" lineno="625">
35648 <summary>
35649 Create specified objects in generic
35650 virt home directories with private
35651 @@ -110592,7 +112697,7 @@ The name of the object being created.
35652 </summary>
35653 </param>
35654 </interface>
35655 -<interface name="virt_manage_home_files" lineno="700">
35656 +<interface name="virt_manage_home_files" lineno="645">
35657 <summary>
35658 Create, read, write, and delete
35659 virt home files.
35660 @@ -110603,7 +112708,7 @@ Domain allowed access.
35661 </summary>
35662 </param>
35663 </interface>
35664 -<interface name="virt_manage_generic_virt_home_content" lineno="720">
35665 +<interface name="virt_manage_generic_virt_home_content" lineno="665">
35666 <summary>
35667 Create, read, write, and delete
35668 virt home content.
35669 @@ -110614,7 +112719,7 @@ Domain allowed access.
35670 </summary>
35671 </param>
35672 </interface>
35673 -<interface name="virt_relabel_generic_virt_home_content" lineno="755">
35674 +<interface name="virt_relabel_generic_virt_home_content" lineno="700">
35675 <summary>
35676 Relabel virt home content.
35677 </summary>
35678 @@ -110624,7 +112729,7 @@ Domain allowed access.
35679 </summary>
35680 </param>
35681 </interface>
35682 -<interface name="virt_home_filetrans_virt_home" lineno="790">
35683 +<interface name="virt_home_filetrans_virt_home" lineno="735">
35684 <summary>
35685 Create specified objects in user home
35686 directories with the generic virt
35687 @@ -110646,7 +112751,7 @@ The name of the object being created.
35688 </summary>
35689 </param>
35690 </interface>
35691 -<interface name="virt_read_pid_files" lineno="808">
35692 +<interface name="virt_read_pid_files" lineno="753">
35693 <summary>
35694 Read virt pid files. (Depprecated)
35695 </summary>
35696 @@ -110656,7 +112761,7 @@ Domain allowed access.
35697 </summary>
35698 </param>
35699 </interface>
35700 -<interface name="virt_manage_pid_files" lineno="824">
35701 +<interface name="virt_manage_pid_files" lineno="769">
35702 <summary>
35703 Create, read, write, and delete
35704 virt pid files. (Deprecated)
35705 @@ -110667,7 +112772,7 @@ Domain allowed access.
35706 </summary>
35707 </param>
35708 </interface>
35709 -<interface name="virt_read_runtime_files" lineno="838">
35710 +<interface name="virt_read_runtime_files" lineno="783">
35711 <summary>
35712 Read virt runtime files.
35713 </summary>
35714 @@ -110677,7 +112782,7 @@ Domain allowed access.
35715 </summary>
35716 </param>
35717 </interface>
35718 -<interface name="virt_runtime_filetrans" lineno="873">
35719 +<interface name="virt_runtime_filetrans" lineno="818">
35720 <summary>
35721 Create an object in the libvirt runtime directory, with a private type.
35722 </summary>
35723 @@ -110703,7 +112808,7 @@ The name of the object being created.
35724 </param>
35725 <infoflow type="write" weight="10"/>
35726 </interface>
35727 -<interface name="virt_search_lib" lineno="891">
35728 +<interface name="virt_search_lib" lineno="836">
35729 <summary>
35730 Search virt lib directories.
35731 </summary>
35732 @@ -110713,7 +112818,7 @@ Domain allowed access.
35733 </summary>
35734 </param>
35735 </interface>
35736 -<interface name="virt_read_lib_files" lineno="910">
35737 +<interface name="virt_read_lib_files" lineno="855">
35738 <summary>
35739 Read virt lib files.
35740 </summary>
35741 @@ -110723,7 +112828,7 @@ Domain allowed access.
35742 </summary>
35743 </param>
35744 </interface>
35745 -<interface name="virt_manage_lib_files" lineno="931">
35746 +<interface name="virt_manage_lib_files" lineno="876">
35747 <summary>
35748 Create, read, write, and delete
35749 virt lib files.
35750 @@ -110734,7 +112839,7 @@ Domain allowed access.
35751 </summary>
35752 </param>
35753 </interface>
35754 -<interface name="virt_pid_filetrans" lineno="967">
35755 +<interface name="virt_pid_filetrans" lineno="912">
35756 <summary>
35757 Create objects in virt pid
35758 directories with a private type. (Deprecated)
35759 @@ -110761,7 +112866,7 @@ The name of the object being created.
35760 </param>
35761 <infoflow type="write" weight="10"/>
35762 </interface>
35763 -<interface name="virt_read_log" lineno="983">
35764 +<interface name="virt_read_log" lineno="928">
35765 <summary>
35766 Read virt log files.
35767 </summary>
35768 @@ -110772,7 +112877,7 @@ Domain allowed access.
35769 </param>
35770 <rolecap/>
35771 </interface>
35772 -<interface name="virt_append_log" lineno="1002">
35773 +<interface name="virt_append_log" lineno="947">
35774 <summary>
35775 Append virt log files.
35776 </summary>
35777 @@ -110782,7 +112887,7 @@ Domain allowed access.
35778 </summary>
35779 </param>
35780 </interface>
35781 -<interface name="virt_manage_log" lineno="1022">
35782 +<interface name="virt_manage_log" lineno="967">
35783 <summary>
35784 Create, read, write, and delete
35785 virt log files.
35786 @@ -110793,7 +112898,7 @@ Domain allowed access.
35787 </summary>
35788 </param>
35789 </interface>
35790 -<interface name="virt_search_images" lineno="1043">
35791 +<interface name="virt_search_images" lineno="988">
35792 <summary>
35793 Search virt image directories.
35794 </summary>
35795 @@ -110803,7 +112908,7 @@ Domain allowed access.
35796 </summary>
35797 </param>
35798 </interface>
35799 -<interface name="virt_read_images" lineno="1062">
35800 +<interface name="virt_read_images" lineno="1007">
35801 <summary>
35802 Read virt image files.
35803 </summary>
35804 @@ -110813,7 +112918,7 @@ Domain allowed access.
35805 </summary>
35806 </param>
35807 </interface>
35808 -<interface name="virt_rw_all_image_chr_files" lineno="1098">
35809 +<interface name="virt_rw_all_image_chr_files" lineno="1043">
35810 <summary>
35811 Read and write all virt image
35812 character files.
35813 @@ -110824,7 +112929,7 @@ Domain allowed access.
35814 </summary>
35815 </param>
35816 </interface>
35817 -<interface name="virt_manage_virt_cache" lineno="1119">
35818 +<interface name="virt_manage_virt_cache" lineno="1064">
35819 <summary>
35820 Create, read, write, and delete
35821 virt cache content.
35822 @@ -110835,7 +112940,7 @@ Domain allowed access.
35823 </summary>
35824 </param>
35825 </interface>
35826 -<interface name="virt_manage_images" lineno="1141">
35827 +<interface name="virt_manage_images" lineno="1086">
35828 <summary>
35829 Create, read, write, and delete
35830 virt image files.
35831 @@ -110846,7 +112951,101 @@ Domain allowed access.
35832 </summary>
35833 </param>
35834 </interface>
35835 -<interface name="virt_admin" lineno="1183">
35836 +<interface name="virt_lxc_use_fds" lineno="1122">
35837 +<summary>
35838 +Inherit and use virtd lxc
35839 +file descriptors.
35840 +</summary>
35841 +<param name="domain">
35842 +<summary>
35843 +Domain allowed access.
35844 +</summary>
35845 +</param>
35846 +</interface>
35847 +<interface name="virt_lxc_sigchld" lineno="1140">
35848 +<summary>
35849 +Send a SIGCHLD to virtd lxc.
35850 +</summary>
35851 +<param name="domain">
35852 +<summary>
35853 +Domain allowed access.
35854 +</summary>
35855 +</param>
35856 +</interface>
35857 +<interface name="virt_lxc_rw_pipes" lineno="1158">
35858 +<summary>
35859 +Read and write virtd lxc unamed pipes.
35860 +</summary>
35861 +<param name="domain">
35862 +<summary>
35863 +Domain allowed access.
35864 +</summary>
35865 +</param>
35866 +</interface>
35867 +<interface name="virt_lxc_stream_connect" lineno="1177">
35868 +<summary>
35869 +Connect to virtd lxc over
35870 +a unix stream socket.
35871 +</summary>
35872 +<param name="domain">
35873 +<summary>
35874 +Domain allowed access.
35875 +</summary>
35876 +</param>
35877 +</interface>
35878 +<interface name="virt_lxc_list_runtime" lineno="1197">
35879 +<summary>
35880 +List the contents of virtd lxc
35881 +directories.
35882 +</summary>
35883 +<param name="domain">
35884 +<summary>
35885 +Domain allowed access.
35886 +</summary>
35887 +</param>
35888 +</interface>
35889 +<interface name="virt_lxc_read_runtime" lineno="1215">
35890 +<summary>
35891 +Read virtd lxc runtime files.
35892 +</summary>
35893 +<param name="domain">
35894 +<summary>
35895 +Domain allowed access.
35896 +</summary>
35897 +</param>
35898 +</interface>
35899 +<interface name="virt_virsh_use_fds" lineno="1234">
35900 +<summary>
35901 +Inherit and use virsh file
35902 +descriptors.
35903 +</summary>
35904 +<param name="domain">
35905 +<summary>
35906 +Domain allowed access.
35907 +</summary>
35908 +</param>
35909 +</interface>
35910 +<interface name="virt_virsh_sigchld" lineno="1252">
35911 +<summary>
35912 +Send a SIGCHLD to virsh.
35913 +</summary>
35914 +<param name="domain">
35915 +<summary>
35916 +Domain allowed access.
35917 +</summary>
35918 +</param>
35919 +</interface>
35920 +<interface name="virt_virsh_rw_pipes" lineno="1270">
35921 +<summary>
35922 +Read and write virsh unamed pipes.
35923 +</summary>
35924 +<param name="domain">
35925 +<summary>
35926 +Domain allowed access.
35927 +</summary>
35928 +</param>
35929 +</interface>
35930 +<interface name="virt_admin" lineno="1295">
35931 <summary>
35932 All of the rules required to
35933 administrate an virt environment.
35934 @@ -111154,39 +113353,61 @@ Role allowed access.
35935 </module>
35936 <module name="xserver" filename="policy/modules/services/xserver.if">
35937 <summary>X Windows Server</summary>
35938 -<interface name="xserver_restricted_role" lineno="19">
35939 +<template name="xserver_restricted_role" lineno="30">
35940 <summary>
35941 Rules required for using the X Windows server
35942 and environment, for restricted users.
35943 </summary>
35944 -<param name="role">
35945 +<param name="role_prefix">
35946 <summary>
35947 -Role allowed access.
35948 +The prefix of the user role (e.g., user
35949 +is the prefix for user_r).
35950 </summary>
35951 </param>
35952 -<param name="domain">
35953 +<param name="user_domain">
35954 <summary>
35955 -Domain allowed access.
35956 +User domain for the role.
35957 </summary>
35958 </param>
35959 -</interface>
35960 -<interface name="xserver_role" lineno="140">
35961 +<param name="user_exec_domain">
35962 +<summary>
35963 +User exec domain for execute and transition access.
35964 +</summary>
35965 +</param>
35966 +<param name="role">
35967 +<summary>
35968 +Role allowed access
35969 +</summary>
35970 +</param>
35971 +</template>
35972 +<template name="xserver_role" lineno="168">
35973 <summary>
35974 Rules required for using the X Windows server
35975 and environment.
35976 </summary>
35977 -<param name="role">
35978 +<param name="role_prefix">
35979 <summary>
35980 -Role allowed access.
35981 +The prefix of the user role (e.g., user
35982 +is the prefix for user_r).
35983 </summary>
35984 </param>
35985 -<param name="domain">
35986 +<param name="user_domain">
35987 <summary>
35988 -Domain allowed access.
35989 +User domain for the role.
35990 </summary>
35991 </param>
35992 -</interface>
35993 -<interface name="xserver_ro_session" lineno="209">
35994 +<param name="user_exec_domain">
35995 +<summary>
35996 +User exec domain for execute and transition access.
35997 +</summary>
35998 +</param>
35999 +<param name="role">
36000 +<summary>
36001 +Role allowed access
36002 +</summary>
36003 +</param>
36004 +</template>
36005 +<interface name="xserver_ro_session" lineno="241">
36006 <summary>
36007 Create sessions on the X server, with read-only
36008 access to the X server shared
36009 @@ -111203,7 +113424,7 @@ The type of the domain SYSV tmpfs files.
36010 </summary>
36011 </param>
36012 </interface>
36013 -<interface name="xserver_rw_session" lineno="251">
36014 +<interface name="xserver_rw_session" lineno="283">
36015 <summary>
36016 Create sessions on the X server, with read and write
36017 access to the X server shared
36018 @@ -111220,7 +113441,7 @@ The type of the domain SYSV tmpfs files.
36019 </summary>
36020 </param>
36021 </interface>
36022 -<interface name="xserver_non_drawing_client" lineno="271">
36023 +<interface name="xserver_non_drawing_client" lineno="303">
36024 <summary>
36025 Create non-drawing client sessions on an X server.
36026 </summary>
36027 @@ -111230,7 +113451,7 @@ Domain allowed access.
36028 </summary>
36029 </param>
36030 </interface>
36031 -<template name="xserver_common_x_domain_template" lineno="310">
36032 +<template name="xserver_common_x_domain_template" lineno="342">
36033 <summary>
36034 Interface to provide X object permissions on a given X server to
36035 an X client domain. Provides the minimal set required by a basic
36036 @@ -111248,7 +113469,7 @@ Client domain allowed access.
36037 </summary>
36038 </param>
36039 </template>
36040 -<template name="xserver_object_types_template" lineno="369">
36041 +<template name="xserver_object_types_template" lineno="401">
36042 <summary>
36043 Template for creating the set of types used
36044 in an X windows domain.
36045 @@ -111260,7 +113481,7 @@ is the prefix for user_t).
36046 </summary>
36047 </param>
36048 </template>
36049 -<template name="xserver_user_x_domain_template" lineno="411">
36050 +<template name="xserver_user_x_domain_template" lineno="443">
36051 <summary>
36052 Interface to provide X object permissions on a given X server to
36053 an X client domain. Provides the minimal set required by a basic
36054 @@ -111283,7 +113504,7 @@ The type of the domain SYSV tmpfs files.
36055 </summary>
36056 </param>
36057 </template>
36058 -<interface name="xserver_use_user_fonts" lineno="478">
36059 +<interface name="xserver_use_user_fonts" lineno="510">
36060 <summary>
36061 Read user fonts, user font configuration,
36062 and manage the user font cache.
36063 @@ -111304,7 +113525,7 @@ Domain allowed access.
36064 </summary>
36065 </param>
36066 </interface>
36067 -<interface name="xserver_domtrans_xauth" lineno="510">
36068 +<interface name="xserver_domtrans_xauth" lineno="542">
36069 <summary>
36070 Transition to the Xauthority domain.
36071 </summary>
36072 @@ -111314,7 +113535,7 @@ Domain allowed to transition.
36073 </summary>
36074 </param>
36075 </interface>
36076 -<interface name="xserver_user_home_dir_filetrans_user_xauth" lineno="533">
36077 +<interface name="xserver_user_home_dir_filetrans_user_xauth" lineno="565">
36078 <summary>
36079 Create a Xauthority file in the user home directory.
36080 </summary>
36081 @@ -111329,7 +113550,7 @@ The name of the object being created.
36082 </summary>
36083 </param>
36084 </interface>
36085 -<interface name="xserver_user_home_dir_filetrans_user_iceauth" lineno="557">
36086 +<interface name="xserver_user_home_dir_filetrans_user_iceauth" lineno="589">
36087 <summary>
36088 Create a ICEauthority file in
36089 the user home directory.
36090 @@ -111345,7 +113566,7 @@ The name of the object being created.
36091 </summary>
36092 </param>
36093 </interface>
36094 -<interface name="xserver_user_home_dir_filetrans_user_xsession_log" lineno="576">
36095 +<interface name="xserver_user_home_dir_filetrans_user_xsession_log" lineno="608">
36096 <summary>
36097 Create a .xsession-errors log
36098 file in the user home directory.
36099 @@ -111356,7 +113577,7 @@ Domain allowed access.
36100 </summary>
36101 </param>
36102 </interface>
36103 -<interface name="xserver_read_user_xauth" lineno="594">
36104 +<interface name="xserver_read_user_xauth" lineno="626">
36105 <summary>
36106 Read all users .Xauthority.
36107 </summary>
36108 @@ -111366,7 +113587,7 @@ Domain allowed access.
36109 </summary>
36110 </param>
36111 </interface>
36112 -<interface name="xserver_read_user_dmrc" lineno="613">
36113 +<interface name="xserver_read_user_dmrc" lineno="645">
36114 <summary>
36115 Read all users .dmrc.
36116 </summary>
36117 @@ -111376,7 +113597,7 @@ Domain allowed access.
36118 </summary>
36119 </param>
36120 </interface>
36121 -<interface name="xserver_read_user_iceauth" lineno="632">
36122 +<interface name="xserver_read_user_iceauth" lineno="664">
36123 <summary>
36124 Read all users .ICEauthority.
36125 </summary>
36126 @@ -111386,7 +113607,7 @@ Domain allowed access.
36127 </summary>
36128 </param>
36129 </interface>
36130 -<interface name="xserver_setattr_console_pipes" lineno="651">
36131 +<interface name="xserver_setattr_console_pipes" lineno="683">
36132 <summary>
36133 Set the attributes of the X windows console named pipes.
36134 </summary>
36135 @@ -111396,7 +113617,7 @@ Domain allowed access.
36136 </summary>
36137 </param>
36138 </interface>
36139 -<interface name="xserver_rw_console" lineno="669">
36140 +<interface name="xserver_rw_console" lineno="701">
36141 <summary>
36142 Read and write the X windows console named pipe.
36143 </summary>
36144 @@ -111406,7 +113627,7 @@ Domain allowed access.
36145 </summary>
36146 </param>
36147 </interface>
36148 -<interface name="xserver_create_console_pipes" lineno="687">
36149 +<interface name="xserver_create_console_pipes" lineno="719">
36150 <summary>
36151 Create the X windows console named pipes.
36152 </summary>
36153 @@ -111416,7 +113637,7 @@ Domain allowed access.
36154 </summary>
36155 </param>
36156 </interface>
36157 -<interface name="xserver_relabel_console_pipes" lineno="705">
36158 +<interface name="xserver_relabel_console_pipes" lineno="737">
36159 <summary>
36160 relabel the X windows console named pipes.
36161 </summary>
36162 @@ -111426,7 +113647,7 @@ Domain allowed access.
36163 </summary>
36164 </param>
36165 </interface>
36166 -<interface name="xserver_use_xdm_fds" lineno="723">
36167 +<interface name="xserver_use_xdm_fds" lineno="755">
36168 <summary>
36169 Use file descriptors for xdm.
36170 </summary>
36171 @@ -111436,7 +113657,7 @@ Domain allowed access.
36172 </summary>
36173 </param>
36174 </interface>
36175 -<interface name="xserver_dontaudit_use_xdm_fds" lineno="742">
36176 +<interface name="xserver_dontaudit_use_xdm_fds" lineno="774">
36177 <summary>
36178 Do not audit attempts to inherit
36179 XDM file descriptors.
36180 @@ -111447,7 +113668,7 @@ Domain to not audit.
36181 </summary>
36182 </param>
36183 </interface>
36184 -<interface name="xserver_sigchld_xdm" lineno="760">
36185 +<interface name="xserver_sigchld_xdm" lineno="792">
36186 <summary>
36187 Allow domain to send sigchld to xdm_t
36188 </summary>
36189 @@ -111457,7 +113678,7 @@ Domain allowed access.
36190 </summary>
36191 </param>
36192 </interface>
36193 -<interface name="xserver_rw_xdm_pipes" lineno="778">
36194 +<interface name="xserver_rw_xdm_pipes" lineno="810">
36195 <summary>
36196 Read and write XDM unnamed pipes.
36197 </summary>
36198 @@ -111467,7 +113688,7 @@ Domain allowed access.
36199 </summary>
36200 </param>
36201 </interface>
36202 -<interface name="xserver_dontaudit_rw_xdm_pipes" lineno="797">
36203 +<interface name="xserver_dontaudit_rw_xdm_pipes" lineno="829">
36204 <summary>
36205 Do not audit attempts to read and write
36206 XDM unnamed pipes.
36207 @@ -111478,7 +113699,7 @@ Domain to not audit.
36208 </summary>
36209 </param>
36210 </interface>
36211 -<interface name="xserver_dbus_chat_xdm" lineno="817">
36212 +<interface name="xserver_dbus_chat_xdm" lineno="849">
36213 <summary>
36214 Send and receive messages from
36215 xdm over dbus.
36216 @@ -111489,7 +113710,7 @@ Domain allowed access.
36217 </summary>
36218 </param>
36219 </interface>
36220 -<interface name="xserver_read_xdm_state" lineno="837">
36221 +<interface name="xserver_read_xdm_state" lineno="869">
36222 <summary>
36223 Read xdm process state files.
36224 </summary>
36225 @@ -111499,7 +113720,7 @@ Domain allowed access.
36226 </summary>
36227 </param>
36228 </interface>
36229 -<interface name="xserver_setsched_xdm" lineno="859">
36230 +<interface name="xserver_setsched_xdm" lineno="891">
36231 <summary>
36232 Set the priority of the X Display
36233 Manager (XDM).
36234 @@ -111510,7 +113731,7 @@ Domain allowed access.
36235 </summary>
36236 </param>
36237 </interface>
36238 -<interface name="xserver_stream_connect_xdm" lineno="878">
36239 +<interface name="xserver_stream_connect_xdm" lineno="910">
36240 <summary>
36241 Connect to XDM over a unix domain
36242 stream socket.
36243 @@ -111521,7 +113742,7 @@ Domain allowed access.
36244 </summary>
36245 </param>
36246 </interface>
36247 -<interface name="xserver_read_xdm_rw_config" lineno="897">
36248 +<interface name="xserver_read_xdm_rw_config" lineno="929">
36249 <summary>
36250 Read xdm-writable configuration files.
36251 </summary>
36252 @@ -111531,7 +113752,7 @@ Domain allowed access.
36253 </summary>
36254 </param>
36255 </interface>
36256 -<interface name="xserver_setattr_xdm_tmp_dirs" lineno="916">
36257 +<interface name="xserver_setattr_xdm_tmp_dirs" lineno="948">
36258 <summary>
36259 Set the attributes of XDM temporary directories.
36260 </summary>
36261 @@ -111541,7 +113762,7 @@ Domain allowed access.
36262 </summary>
36263 </param>
36264 </interface>
36265 -<interface name="xserver_create_xdm_tmp_sockets" lineno="935">
36266 +<interface name="xserver_create_xdm_tmp_sockets" lineno="967">
36267 <summary>
36268 Create a named socket in a XDM
36269 temporary directory.
36270 @@ -111552,7 +113773,7 @@ Domain allowed access.
36271 </summary>
36272 </param>
36273 </interface>
36274 -<interface name="xserver_delete_xdm_tmp_sockets" lineno="956">
36275 +<interface name="xserver_delete_xdm_tmp_sockets" lineno="988">
36276 <summary>
36277 Delete a named socket in a XDM
36278 temporary directory.
36279 @@ -111563,7 +113784,7 @@ Domain allowed access.
36280 </summary>
36281 </param>
36282 </interface>
36283 -<interface name="xserver_read_xdm_pid" lineno="975">
36284 +<interface name="xserver_read_xdm_pid" lineno="1007">
36285 <summary>
36286 Read XDM pid files. (Deprecated)
36287 </summary>
36288 @@ -111573,7 +113794,7 @@ Domain allowed access.
36289 </summary>
36290 </param>
36291 </interface>
36292 -<interface name="xserver_read_xdm_runtime_files" lineno="990">
36293 +<interface name="xserver_read_xdm_runtime_files" lineno="1022">
36294 <summary>
36295 Read XDM runtime files.
36296 </summary>
36297 @@ -111583,7 +113804,7 @@ Domain allowed access.
36298 </summary>
36299 </param>
36300 </interface>
36301 -<interface name="xserver_read_xdm_lib_files" lineno="1009">
36302 +<interface name="xserver_read_xdm_lib_files" lineno="1041">
36303 <summary>
36304 Read XDM var lib files.
36305 </summary>
36306 @@ -111593,7 +113814,7 @@ Domain allowed access.
36307 </summary>
36308 </param>
36309 </interface>
36310 -<interface name="xserver_xsession_entry_type" lineno="1027">
36311 +<interface name="xserver_xsession_entry_type" lineno="1059">
36312 <summary>
36313 Make an X session script an entrypoint for the specified domain.
36314 </summary>
36315 @@ -111603,7 +113824,7 @@ The domain for which the shell is an entrypoint.
36316 </summary>
36317 </param>
36318 </interface>
36319 -<interface name="xserver_xsession_spec_domtrans" lineno="1064">
36320 +<interface name="xserver_xsession_spec_domtrans" lineno="1096">
36321 <summary>
36322 Execute an X session in the target domain. This
36323 is an explicit transition, requiring the
36324 @@ -111632,7 +113853,7 @@ The type of the shell process.
36325 </summary>
36326 </param>
36327 </interface>
36328 -<interface name="xserver_write_inherited_xsession_log" lineno="1083">
36329 +<interface name="xserver_write_inherited_xsession_log" lineno="1115">
36330 <summary>
36331 Write to inherited xsession log
36332 files such as .xsession-errors.
36333 @@ -111643,7 +113864,7 @@ Domain allowed access.
36334 </summary>
36335 </param>
36336 </interface>
36337 -<interface name="xserver_rw_xsession_log" lineno="1103">
36338 +<interface name="xserver_rw_xsession_log" lineno="1135">
36339 <summary>
36340 Read and write xsession log
36341 files such as .xsession-errors.
36342 @@ -111654,7 +113875,7 @@ Domain allowed access.
36343 </summary>
36344 </param>
36345 </interface>
36346 -<interface name="xserver_manage_xsession_log" lineno="1122">
36347 +<interface name="xserver_manage_xsession_log" lineno="1154">
36348 <summary>
36349 Manage xsession log files such
36350 as .xsession-errors.
36351 @@ -111665,7 +113886,7 @@ Domain allowed access.
36352 </summary>
36353 </param>
36354 </interface>
36355 -<interface name="xserver_write_inherited_log" lineno="1141">
36356 +<interface name="xserver_write_inherited_log" lineno="1173">
36357 <summary>
36358 Write to inherited X server log
36359 files like /var/log/lightdm/lightdm.log
36360 @@ -111676,7 +113897,7 @@ Domain allowed access.
36361 </summary>
36362 </param>
36363 </interface>
36364 -<interface name="xserver_getattr_log" lineno="1159">
36365 +<interface name="xserver_getattr_log" lineno="1191">
36366 <summary>
36367 Get the attributes of X server logs.
36368 </summary>
36369 @@ -111686,7 +113907,7 @@ Domain allowed access.
36370 </summary>
36371 </param>
36372 </interface>
36373 -<interface name="xserver_dontaudit_write_log" lineno="1179">
36374 +<interface name="xserver_dontaudit_write_log" lineno="1211">
36375 <summary>
36376 Do not audit attempts to write the X server
36377 log files.
36378 @@ -111697,7 +113918,7 @@ Domain to not audit.
36379 </summary>
36380 </param>
36381 </interface>
36382 -<interface name="xserver_delete_log" lineno="1197">
36383 +<interface name="xserver_delete_log" lineno="1229">
36384 <summary>
36385 Delete X server log files.
36386 </summary>
36387 @@ -111707,7 +113928,7 @@ Domain allowed access.
36388 </summary>
36389 </param>
36390 </interface>
36391 -<interface name="xserver_read_xkb_libs" lineno="1218">
36392 +<interface name="xserver_read_xkb_libs" lineno="1250">
36393 <summary>
36394 Read X keyboard extension libraries.
36395 </summary>
36396 @@ -111717,7 +113938,7 @@ Domain allowed access.
36397 </summary>
36398 </param>
36399 </interface>
36400 -<interface name="xserver_create_xdm_tmp_dirs" lineno="1239">
36401 +<interface name="xserver_create_xdm_tmp_dirs" lineno="1271">
36402 <summary>
36403 Create xdm temporary directories.
36404 </summary>
36405 @@ -111727,7 +113948,7 @@ Domain to allow access.
36406 </summary>
36407 </param>
36408 </interface>
36409 -<interface name="xserver_read_xdm_tmp_files" lineno="1257">
36410 +<interface name="xserver_read_xdm_tmp_files" lineno="1289">
36411 <summary>
36412 Read xdm temporary files.
36413 </summary>
36414 @@ -111737,7 +113958,7 @@ Domain allowed access.
36415 </summary>
36416 </param>
36417 </interface>
36418 -<interface name="xserver_dontaudit_read_xdm_tmp_files" lineno="1276">
36419 +<interface name="xserver_dontaudit_read_xdm_tmp_files" lineno="1308">
36420 <summary>
36421 Do not audit attempts to read xdm temporary files.
36422 </summary>
36423 @@ -111747,7 +113968,7 @@ Domain to not audit.
36424 </summary>
36425 </param>
36426 </interface>
36427 -<interface name="xserver_rw_xdm_tmp_files" lineno="1295">
36428 +<interface name="xserver_rw_xdm_tmp_files" lineno="1327">
36429 <summary>
36430 Read write xdm temporary files.
36431 </summary>
36432 @@ -111757,7 +113978,7 @@ Domain allowed access.
36433 </summary>
36434 </param>
36435 </interface>
36436 -<interface name="xserver_manage_xdm_tmp_files" lineno="1314">
36437 +<interface name="xserver_manage_xdm_tmp_files" lineno="1346">
36438 <summary>
36439 Create, read, write, and delete xdm temporary files.
36440 </summary>
36441 @@ -111767,7 +113988,7 @@ Domain allowed access.
36442 </summary>
36443 </param>
36444 </interface>
36445 -<interface name="xserver_dontaudit_getattr_xdm_tmp_sockets" lineno="1333">
36446 +<interface name="xserver_dontaudit_getattr_xdm_tmp_sockets" lineno="1365">
36447 <summary>
36448 Do not audit attempts to get the attributes of
36449 xdm temporary named sockets.
36450 @@ -111778,7 +113999,7 @@ Domain to not audit.
36451 </summary>
36452 </param>
36453 </interface>
36454 -<interface name="xserver_list_xdm_tmp" lineno="1351">
36455 +<interface name="xserver_list_xdm_tmp" lineno="1383">
36456 <summary>
36457 list xdm_tmp_t directories
36458 </summary>
36459 @@ -111788,7 +114009,7 @@ Domain to allow
36460 </summary>
36461 </param>
36462 </interface>
36463 -<interface name="xserver_domtrans" lineno="1369">
36464 +<interface name="xserver_domtrans" lineno="1401">
36465 <summary>
36466 Execute the X server in the X server domain.
36467 </summary>
36468 @@ -111798,7 +114019,7 @@ Domain allowed to transition.
36469 </summary>
36470 </param>
36471 </interface>
36472 -<interface name="xserver_signal" lineno="1388">
36473 +<interface name="xserver_signal" lineno="1420">
36474 <summary>
36475 Signal X servers
36476 </summary>
36477 @@ -111808,7 +114029,7 @@ Domain allowed access.
36478 </summary>
36479 </param>
36480 </interface>
36481 -<interface name="xserver_kill" lineno="1406">
36482 +<interface name="xserver_kill" lineno="1438">
36483 <summary>
36484 Kill X servers
36485 </summary>
36486 @@ -111818,7 +114039,7 @@ Domain allowed access.
36487 </summary>
36488 </param>
36489 </interface>
36490 -<interface name="xserver_read_state" lineno="1424">
36491 +<interface name="xserver_read_state" lineno="1456">
36492 <summary>
36493 Allow reading xserver_t files to get cgroup and sessionid
36494 </summary>
36495 @@ -111828,7 +114049,7 @@ Domain allowed access.
36496 </summary>
36497 </param>
36498 </interface>
36499 -<interface name="xserver_rw_shm" lineno="1444">
36500 +<interface name="xserver_rw_shm" lineno="1476">
36501 <summary>
36502 Read and write X server Sys V Shared
36503 memory segments.
36504 @@ -111839,7 +114060,7 @@ Domain allowed access.
36505 </summary>
36506 </param>
36507 </interface>
36508 -<interface name="xserver_dontaudit_rw_tcp_sockets" lineno="1463">
36509 +<interface name="xserver_dontaudit_rw_tcp_sockets" lineno="1495">
36510 <summary>
36511 Do not audit attempts to read and write to
36512 X server sockets.
36513 @@ -111850,7 +114071,7 @@ Domain to not audit.
36514 </summary>
36515 </param>
36516 </interface>
36517 -<interface name="xserver_dontaudit_rw_stream_sockets" lineno="1482">
36518 +<interface name="xserver_dontaudit_rw_stream_sockets" lineno="1514">
36519 <summary>
36520 Do not audit attempts to read and write X server
36521 unix domain stream sockets.
36522 @@ -111861,7 +114082,7 @@ Domain to not audit.
36523 </summary>
36524 </param>
36525 </interface>
36526 -<interface name="xserver_stream_connect" lineno="1501">
36527 +<interface name="xserver_stream_connect" lineno="1533">
36528 <summary>
36529 Connect to the X server over a unix domain
36530 stream socket.
36531 @@ -111872,7 +114093,7 @@ Domain allowed access.
36532 </summary>
36533 </param>
36534 </interface>
36535 -<interface name="xserver_read_tmp_files" lineno="1520">
36536 +<interface name="xserver_read_tmp_files" lineno="1552">
36537 <summary>
36538 Read X server temporary files.
36539 </summary>
36540 @@ -111882,7 +114103,7 @@ Domain allowed access.
36541 </summary>
36542 </param>
36543 </interface>
36544 -<interface name="xserver_dbus_chat" lineno="1539">
36545 +<interface name="xserver_dbus_chat" lineno="1571">
36546 <summary>
36547 talk to xserver_t by dbus
36548 </summary>
36549 @@ -111892,7 +114113,7 @@ Domain allowed access.
36550 </summary>
36551 </param>
36552 </interface>
36553 -<interface name="xserver_manage_core_devices" lineno="1561">
36554 +<interface name="xserver_manage_core_devices" lineno="1593">
36555 <summary>
36556 Interface to provide X object permissions on a given X server to
36557 an X client domain. Gives the domain permission to read the
36558 @@ -111904,7 +114125,7 @@ Domain allowed access.
36559 </summary>
36560 </param>
36561 </interface>
36562 -<interface name="xserver_unconfined" lineno="1584">
36563 +<interface name="xserver_unconfined" lineno="1616">
36564 <summary>
36565 Interface to provide X object permissions on a given X server to
36566 an X client domain. Gives the domain complete control over the
36567 @@ -111916,7 +114137,7 @@ Domain allowed access.
36568 </summary>
36569 </param>
36570 </interface>
36571 -<interface name="xserver_rw_xdm_keys" lineno="1604">
36572 +<interface name="xserver_rw_xdm_keys" lineno="1636">
36573 <summary>
36574 Manage keys for xdm.
36575 </summary>
36576 @@ -111926,7 +114147,7 @@ Domain allowed access.
36577 </summary>
36578 </param>
36579 </interface>
36580 -<interface name="xserver_link_xdm_keys" lineno="1622">
36581 +<interface name="xserver_link_xdm_keys" lineno="1654">
36582 <summary>
36583 Manage keys for xdm.
36584 </summary>
36585 @@ -111936,7 +114157,7 @@ Domain allowed access.
36586 </summary>
36587 </param>
36588 </interface>
36589 -<interface name="xserver_rw_mesa_shader_cache" lineno="1640">
36590 +<interface name="xserver_rw_mesa_shader_cache" lineno="1672">
36591 <summary>
36592 Read and write the mesa shader cache.
36593 </summary>
36594 @@ -111946,7 +114167,7 @@ Domain allowed access.
36595 </summary>
36596 </param>
36597 </interface>
36598 -<interface name="xserver_manage_mesa_shader_cache" lineno="1661">
36599 +<interface name="xserver_manage_mesa_shader_cache" lineno="1693">
36600 <summary>
36601 Manage the mesa shader cache.
36602 </summary>
36603 @@ -112366,22 +114587,33 @@ Domain to not audit.
36604 </module>
36605 <module name="authlogin" filename="policy/modules/system/authlogin.if">
36606 <summary>Common policy for authentication and user login.</summary>
36607 -<interface name="auth_role" lineno="18">
36608 +<template name="auth_role" lineno="29">
36609 <summary>
36610 Role access for password authentication.
36611 </summary>
36612 -<param name="role">
36613 +<param name="role_prefix">
36614 <summary>
36615 -Role allowed access.
36616 +The prefix of the user role (e.g., user
36617 +is the prefix for user_r).
36618 </summary>
36619 </param>
36620 -<param name="domain">
36621 +<param name="user_domain">
36622 <summary>
36623 -Domain allowed access.
36624 +User domain for the role.
36625 </summary>
36626 </param>
36627 -</interface>
36628 -<interface name="auth_use_pam" lineno="43">
36629 +<param name="user_exec_domain">
36630 +<summary>
36631 +User exec domain for execute and transition access.
36632 +</summary>
36633 +</param>
36634 +<param name="role">
36635 +<summary>
36636 +Role allowed access
36637 +</summary>
36638 +</param>
36639 +</template>
36640 +<interface name="auth_use_pam" lineno="54">
36641 <summary>
36642 Use PAM for authentication.
36643 </summary>
36644 @@ -112391,7 +114623,7 @@ Domain allowed access.
36645 </summary>
36646 </param>
36647 </interface>
36648 -<interface name="auth_use_pam_systemd" lineno="92">
36649 +<interface name="auth_use_pam_systemd" lineno="103">
36650 <summary>
36651 Use the pam module systemd during authentication.
36652 </summary>
36653 @@ -112401,7 +114633,7 @@ Domain allowed access.
36654 </summary>
36655 </param>
36656 </interface>
36657 -<interface name="auth_use_pam_motd_dynamic" lineno="110">
36658 +<interface name="auth_use_pam_motd_dynamic" lineno="121">
36659 <summary>
36660 Use the pam module motd with dynamic support during authentication.
36661 This module comes from Ubuntu (https://bugs.launchpad.net/ubuntu/+source/pam/+bug/399071)
36662 @@ -112413,7 +114645,7 @@ Domain allowed access.
36663 </summary>
36664 </param>
36665 </interface>
36666 -<interface name="auth_login_pgm_domain" lineno="134">
36667 +<interface name="auth_login_pgm_domain" lineno="145">
36668 <summary>
36669 Make the specified domain used for a login program.
36670 </summary>
36671 @@ -112423,7 +114655,7 @@ Domain type used for a login program domain.
36672 </summary>
36673 </param>
36674 </interface>
36675 -<interface name="auth_login_entry_type" lineno="221">
36676 +<interface name="auth_login_entry_type" lineno="232">
36677 <summary>
36678 Use the login program as an entry point program.
36679 </summary>
36680 @@ -112433,7 +114665,7 @@ Domain allowed access.
36681 </summary>
36682 </param>
36683 </interface>
36684 -<interface name="auth_domtrans_login_program" lineno="244">
36685 +<interface name="auth_domtrans_login_program" lineno="255">
36686 <summary>
36687 Execute a login_program in the target domain.
36688 </summary>
36689 @@ -112448,7 +114680,7 @@ The type of the login_program process.
36690 </summary>
36691 </param>
36692 </interface>
36693 -<interface name="auth_ranged_domtrans_login_program" lineno="274">
36694 +<interface name="auth_ranged_domtrans_login_program" lineno="285">
36695 <summary>
36696 Execute a login_program in the target domain,
36697 with a range transition.
36698 @@ -112469,7 +114701,7 @@ Range of the login program.
36699 </summary>
36700 </param>
36701 </interface>
36702 -<interface name="auth_search_cache" lineno="300">
36703 +<interface name="auth_search_cache" lineno="311">
36704 <summary>
36705 Search authentication cache
36706 </summary>
36707 @@ -112479,7 +114711,7 @@ Domain allowed access.
36708 </summary>
36709 </param>
36710 </interface>
36711 -<interface name="auth_read_cache" lineno="318">
36712 +<interface name="auth_read_cache" lineno="329">
36713 <summary>
36714 Read authentication cache
36715 </summary>
36716 @@ -112489,7 +114721,7 @@ Domain allowed access.
36717 </summary>
36718 </param>
36719 </interface>
36720 -<interface name="auth_rw_cache" lineno="336">
36721 +<interface name="auth_rw_cache" lineno="347">
36722 <summary>
36723 Read/Write authentication cache
36724 </summary>
36725 @@ -112499,7 +114731,7 @@ Domain allowed access.
36726 </summary>
36727 </param>
36728 </interface>
36729 -<interface name="auth_manage_cache" lineno="354">
36730 +<interface name="auth_manage_cache" lineno="365">
36731 <summary>
36732 Manage authentication cache
36733 </summary>
36734 @@ -112509,7 +114741,7 @@ Domain allowed access.
36735 </summary>
36736 </param>
36737 </interface>
36738 -<interface name="auth_var_filetrans_cache" lineno="373">
36739 +<interface name="auth_var_filetrans_cache" lineno="384">
36740 <summary>
36741 Automatic transition from cache_t to cache.
36742 </summary>
36743 @@ -112519,7 +114751,7 @@ Domain allowed access.
36744 </summary>
36745 </param>
36746 </interface>
36747 -<interface name="auth_domtrans_chk_passwd" lineno="391">
36748 +<interface name="auth_domtrans_chk_passwd" lineno="402">
36749 <summary>
36750 Run unix_chkpwd to check a password.
36751 </summary>
36752 @@ -112529,7 +114761,7 @@ Domain allowed to transition.
36753 </summary>
36754 </param>
36755 </interface>
36756 -<interface name="auth_domtrans_chkpwd" lineno="435">
36757 +<interface name="auth_domtrans_chkpwd" lineno="446">
36758 <summary>
36759 Run unix_chkpwd to check a password.
36760 Stripped down version to be called within boolean
36761 @@ -112540,7 +114772,7 @@ Domain allowed to transition.
36762 </summary>
36763 </param>
36764 </interface>
36765 -<interface name="auth_run_chk_passwd" lineno="457">
36766 +<interface name="auth_run_chk_passwd" lineno="468">
36767 <summary>
36768 Execute chkpwd programs in the chkpwd domain.
36769 </summary>
36770 @@ -112555,7 +114787,7 @@ The role to allow the chkpwd domain.
36771 </summary>
36772 </param>
36773 </interface>
36774 -<interface name="auth_domtrans_upd_passwd" lineno="476">
36775 +<interface name="auth_domtrans_upd_passwd" lineno="487">
36776 <summary>
36777 Execute a domain transition to run unix_update.
36778 </summary>
36779 @@ -112565,7 +114797,7 @@ Domain allowed to transition.
36780 </summary>
36781 </param>
36782 </interface>
36783 -<interface name="auth_run_upd_passwd" lineno="501">
36784 +<interface name="auth_run_upd_passwd" lineno="512">
36785 <summary>
36786 Execute updpwd programs in the updpwd domain.
36787 </summary>
36788 @@ -112580,7 +114812,7 @@ The role to allow the updpwd domain.
36789 </summary>
36790 </param>
36791 </interface>
36792 -<interface name="auth_getattr_shadow" lineno="520">
36793 +<interface name="auth_getattr_shadow" lineno="531">
36794 <summary>
36795 Get the attributes of the shadow passwords file.
36796 </summary>
36797 @@ -112590,7 +114822,7 @@ Domain allowed access.
36798 </summary>
36799 </param>
36800 </interface>
36801 -<interface name="auth_dontaudit_getattr_shadow" lineno="540">
36802 +<interface name="auth_dontaudit_getattr_shadow" lineno="551">
36803 <summary>
36804 Do not audit attempts to get the attributes
36805 of the shadow passwords file.
36806 @@ -112601,7 +114833,7 @@ Domain to not audit.
36807 </summary>
36808 </param>
36809 </interface>
36810 -<interface name="auth_read_shadow" lineno="562">
36811 +<interface name="auth_read_shadow" lineno="573">
36812 <summary>
36813 Read the shadow passwords file (/etc/shadow)
36814 </summary>
36815 @@ -112611,7 +114843,7 @@ Domain allowed access.
36816 </summary>
36817 </param>
36818 </interface>
36819 -<interface name="auth_map_shadow" lineno="577">
36820 +<interface name="auth_map_shadow" lineno="588">
36821 <summary>
36822 Map the shadow passwords file (/etc/shadow)
36823 </summary>
36824 @@ -112621,7 +114853,7 @@ Domain allowed access.
36825 </summary>
36826 </param>
36827 </interface>
36828 -<interface name="auth_can_read_shadow_passwords" lineno="603">
36829 +<interface name="auth_can_read_shadow_passwords" lineno="614">
36830 <summary>
36831 Pass shadow assertion for reading.
36832 </summary>
36833 @@ -112640,7 +114872,7 @@ Domain allowed access.
36834 </summary>
36835 </param>
36836 </interface>
36837 -<interface name="auth_tunable_read_shadow" lineno="629">
36838 +<interface name="auth_tunable_read_shadow" lineno="640">
36839 <summary>
36840 Read the shadow password file.
36841 </summary>
36842 @@ -112658,7 +114890,7 @@ Domain allowed access.
36843 </summary>
36844 </param>
36845 </interface>
36846 -<interface name="auth_dontaudit_read_shadow" lineno="649">
36847 +<interface name="auth_dontaudit_read_shadow" lineno="660">
36848 <summary>
36849 Do not audit attempts to read the shadow
36850 password file (/etc/shadow).
36851 @@ -112669,7 +114901,7 @@ Domain to not audit.
36852 </summary>
36853 </param>
36854 </interface>
36855 -<interface name="auth_rw_shadow" lineno="667">
36856 +<interface name="auth_rw_shadow" lineno="678">
36857 <summary>
36858 Read and write the shadow password file (/etc/shadow).
36859 </summary>
36860 @@ -112679,7 +114911,7 @@ Domain allowed access.
36861 </summary>
36862 </param>
36863 </interface>
36864 -<interface name="auth_manage_shadow" lineno="690">
36865 +<interface name="auth_manage_shadow" lineno="701">
36866 <summary>
36867 Create, read, write, and delete the shadow
36868 password file.
36869 @@ -112690,7 +114922,7 @@ Domain allowed access.
36870 </summary>
36871 </param>
36872 </interface>
36873 -<interface name="auth_etc_filetrans_shadow" lineno="716">
36874 +<interface name="auth_etc_filetrans_shadow" lineno="727">
36875 <summary>
36876 Automatic transition from etc to shadow.
36877 </summary>
36878 @@ -112705,7 +114937,7 @@ The name of the object being created.
36879 </summary>
36880 </param>
36881 </interface>
36882 -<interface name="auth_relabelto_shadow" lineno="735">
36883 +<interface name="auth_relabelto_shadow" lineno="746">
36884 <summary>
36885 Relabel to the shadow
36886 password file type.
36887 @@ -112716,7 +114948,7 @@ Domain allowed access.
36888 </summary>
36889 </param>
36890 </interface>
36891 -<interface name="auth_relabel_shadow" lineno="757">
36892 +<interface name="auth_relabel_shadow" lineno="768">
36893 <summary>
36894 Relabel from and to the shadow
36895 password file type.
36896 @@ -112727,7 +114959,7 @@ Domain allowed access.
36897 </summary>
36898 </param>
36899 </interface>
36900 -<interface name="auth_rw_shadow_lock" lineno="778">
36901 +<interface name="auth_rw_shadow_lock" lineno="789">
36902 <summary>
36903 Read/Write shadow lock files.
36904 </summary>
36905 @@ -112737,7 +114969,7 @@ Domain allowed access.
36906 </summary>
36907 </param>
36908 </interface>
36909 -<interface name="auth_append_faillog" lineno="796">
36910 +<interface name="auth_append_faillog" lineno="807">
36911 <summary>
36912 Append to the login failure log.
36913 </summary>
36914 @@ -112747,7 +114979,7 @@ Domain allowed access.
36915 </summary>
36916 </param>
36917 </interface>
36918 -<interface name="auth_create_faillog_files" lineno="815">
36919 +<interface name="auth_create_faillog_files" lineno="826">
36920 <summary>
36921 Create fail log lock (in /run/faillock).
36922 </summary>
36923 @@ -112757,7 +114989,7 @@ Domain allowed access.
36924 </summary>
36925 </param>
36926 </interface>
36927 -<interface name="auth_rw_faillog" lineno="833">
36928 +<interface name="auth_rw_faillog" lineno="844">
36929 <summary>
36930 Read and write the login failure log.
36931 </summary>
36932 @@ -112767,7 +114999,7 @@ Domain allowed access.
36933 </summary>
36934 </param>
36935 </interface>
36936 -<interface name="auth_manage_faillog" lineno="852">
36937 +<interface name="auth_manage_faillog" lineno="863">
36938 <summary>
36939 Manage the login failure logs.
36940 </summary>
36941 @@ -112777,7 +115009,7 @@ Domain allowed access.
36942 </summary>
36943 </param>
36944 </interface>
36945 -<interface name="auth_setattr_faillog_files" lineno="871">
36946 +<interface name="auth_setattr_faillog_files" lineno="882">
36947 <summary>
36948 Setattr the login failure logs.
36949 </summary>
36950 @@ -112787,7 +115019,7 @@ Domain allowed access.
36951 </summary>
36952 </param>
36953 </interface>
36954 -<interface name="auth_read_lastlog" lineno="890">
36955 +<interface name="auth_read_lastlog" lineno="901">
36956 <summary>
36957 Read the last logins log.
36958 </summary>
36959 @@ -112798,7 +115030,7 @@ Domain allowed access.
36960 </param>
36961 <rolecap/>
36962 </interface>
36963 -<interface name="auth_append_lastlog" lineno="909">
36964 +<interface name="auth_append_lastlog" lineno="920">
36965 <summary>
36966 Append only to the last logins log.
36967 </summary>
36968 @@ -112808,7 +115040,7 @@ Domain allowed access.
36969 </summary>
36970 </param>
36971 </interface>
36972 -<interface name="auth_relabel_lastlog" lineno="928">
36973 +<interface name="auth_relabel_lastlog" lineno="939">
36974 <summary>
36975 relabel the last logins log.
36976 </summary>
36977 @@ -112818,7 +115050,7 @@ Domain allowed access.
36978 </summary>
36979 </param>
36980 </interface>
36981 -<interface name="auth_rw_lastlog" lineno="947">
36982 +<interface name="auth_rw_lastlog" lineno="958">
36983 <summary>
36984 Read and write to the last logins log.
36985 </summary>
36986 @@ -112828,7 +115060,7 @@ Domain allowed access.
36987 </summary>
36988 </param>
36989 </interface>
36990 -<interface name="auth_manage_lastlog" lineno="966">
36991 +<interface name="auth_manage_lastlog" lineno="977">
36992 <summary>
36993 Manage the last logins log.
36994 </summary>
36995 @@ -112838,7 +115070,7 @@ Domain allowed access.
36996 </summary>
36997 </param>
36998 </interface>
36999 -<interface name="auth_domtrans_pam" lineno="985">
37000 +<interface name="auth_domtrans_pam" lineno="996">
37001 <summary>
37002 Execute pam programs in the pam domain.
37003 </summary>
37004 @@ -112848,7 +115080,7 @@ Domain allowed to transition.
37005 </summary>
37006 </param>
37007 </interface>
37008 -<interface name="auth_signal_pam" lineno="1003">
37009 +<interface name="auth_signal_pam" lineno="1014">
37010 <summary>
37011 Send generic signals to pam processes.
37012 </summary>
37013 @@ -112858,7 +115090,7 @@ Domain allowed access.
37014 </summary>
37015 </param>
37016 </interface>
37017 -<interface name="auth_run_pam" lineno="1026">
37018 +<interface name="auth_run_pam" lineno="1037">
37019 <summary>
37020 Execute pam programs in the PAM domain.
37021 </summary>
37022 @@ -112873,7 +115105,7 @@ The role to allow the PAM domain.
37023 </summary>
37024 </param>
37025 </interface>
37026 -<interface name="auth_exec_pam" lineno="1045">
37027 +<interface name="auth_exec_pam" lineno="1056">
37028 <summary>
37029 Execute the pam program.
37030 </summary>
37031 @@ -112883,7 +115115,7 @@ Domain allowed access.
37032 </summary>
37033 </param>
37034 </interface>
37035 -<interface name="auth_read_var_auth" lineno="1064">
37036 +<interface name="auth_read_var_auth" lineno="1075">
37037 <summary>
37038 Read var auth files. Used by various other applications
37039 and pam applets etc.
37040 @@ -112894,7 +115126,7 @@ Domain allowed access.
37041 </summary>
37042 </param>
37043 </interface>
37044 -<interface name="auth_rw_var_auth" lineno="1084">
37045 +<interface name="auth_rw_var_auth" lineno="1095">
37046 <summary>
37047 Read and write var auth files. Used by various other applications
37048 and pam applets etc.
37049 @@ -112905,7 +115137,7 @@ Domain allowed access.
37050 </summary>
37051 </param>
37052 </interface>
37053 -<interface name="auth_manage_var_auth" lineno="1104">
37054 +<interface name="auth_manage_var_auth" lineno="1115">
37055 <summary>
37056 Manage var auth files. Used by various other applications
37057 and pam applets etc.
37058 @@ -112916,7 +115148,7 @@ Domain allowed access.
37059 </summary>
37060 </param>
37061 </interface>
37062 -<interface name="auth_read_pam_pid" lineno="1125">
37063 +<interface name="auth_read_pam_pid" lineno="1136">
37064 <summary>
37065 Read PAM PID files. (Deprecated)
37066 </summary>
37067 @@ -112926,7 +115158,7 @@ Domain allowed access.
37068 </summary>
37069 </param>
37070 </interface>
37071 -<interface name="auth_dontaudit_read_pam_pid" lineno="1140">
37072 +<interface name="auth_dontaudit_read_pam_pid" lineno="1151">
37073 <summary>
37074 Do not audit attempts to read PAM PID files. (Deprecated)
37075 </summary>
37076 @@ -112936,7 +115168,7 @@ Domain to not audit.
37077 </summary>
37078 </param>
37079 </interface>
37080 -<interface name="auth_pid_filetrans_pam_var_run" lineno="1168">
37081 +<interface name="auth_pid_filetrans_pam_var_run" lineno="1179">
37082 <summary>
37083 Create specified objects in
37084 pid directories with the pam var
37085 @@ -112959,7 +115191,7 @@ The name of the object being created.
37086 </summary>
37087 </param>
37088 </interface>
37089 -<interface name="auth_delete_pam_pid" lineno="1183">
37090 +<interface name="auth_delete_pam_pid" lineno="1194">
37091 <summary>
37092 Delete pam PID files. (Deprecated)
37093 </summary>
37094 @@ -112969,7 +115201,7 @@ Domain allowed access.
37095 </summary>
37096 </param>
37097 </interface>
37098 -<interface name="auth_manage_pam_pid" lineno="1198">
37099 +<interface name="auth_manage_pam_pid" lineno="1209">
37100 <summary>
37101 Manage pam PID files. (Deprecated)
37102 </summary>
37103 @@ -112979,7 +115211,7 @@ Domain allowed access.
37104 </summary>
37105 </param>
37106 </interface>
37107 -<interface name="auth_manage_pam_runtime_dirs" lineno="1214">
37108 +<interface name="auth_manage_pam_runtime_dirs" lineno="1225">
37109 <summary>
37110 Manage pam runtime dirs.
37111 </summary>
37112 @@ -112989,7 +115221,7 @@ Domain allowed access.
37113 </summary>
37114 </param>
37115 </interface>
37116 -<interface name="auth_runtime_filetrans_pam_runtime" lineno="1245">
37117 +<interface name="auth_runtime_filetrans_pam_runtime" lineno="1256">
37118 <summary>
37119 Create specified objects in
37120 pid directories with the pam runtime
37121 @@ -113011,7 +115243,7 @@ The name of the object being created.
37122 </summary>
37123 </param>
37124 </interface>
37125 -<interface name="auth_read_pam_runtime_files" lineno="1263">
37126 +<interface name="auth_read_pam_runtime_files" lineno="1274">
37127 <summary>
37128 Read PAM runtime files.
37129 </summary>
37130 @@ -113021,7 +115253,7 @@ Domain allowed access.
37131 </summary>
37132 </param>
37133 </interface>
37134 -<interface name="auth_dontaudit_read_pam_runtime_files" lineno="1283">
37135 +<interface name="auth_dontaudit_read_pam_runtime_files" lineno="1294">
37136 <summary>
37137 Do not audit attempts to read PAM runtime files.
37138 </summary>
37139 @@ -113031,7 +115263,7 @@ Domain to not audit.
37140 </summary>
37141 </param>
37142 </interface>
37143 -<interface name="auth_delete_pam_runtime_files" lineno="1301">
37144 +<interface name="auth_delete_pam_runtime_files" lineno="1312">
37145 <summary>
37146 Delete pam runtime files.
37147 </summary>
37148 @@ -113041,7 +115273,7 @@ Domain allowed access.
37149 </summary>
37150 </param>
37151 </interface>
37152 -<interface name="auth_manage_pam_runtime_files" lineno="1320">
37153 +<interface name="auth_manage_pam_runtime_files" lineno="1331">
37154 <summary>
37155 Create, read, write, and delete pam runtime files.
37156 </summary>
37157 @@ -113051,7 +115283,7 @@ Domain allowed access.
37158 </summary>
37159 </param>
37160 </interface>
37161 -<interface name="auth_domtrans_pam_console" lineno="1339">
37162 +<interface name="auth_domtrans_pam_console" lineno="1350">
37163 <summary>
37164 Execute pam_console with a domain transition.
37165 </summary>
37166 @@ -113061,7 +115293,7 @@ Domain allowed to transition.
37167 </summary>
37168 </param>
37169 </interface>
37170 -<interface name="auth_search_pam_console_data" lineno="1358">
37171 +<interface name="auth_search_pam_console_data" lineno="1369">
37172 <summary>
37173 Search the contents of the
37174 pam_console data directory.
37175 @@ -113072,7 +115304,7 @@ Domain allowed access.
37176 </summary>
37177 </param>
37178 </interface>
37179 -<interface name="auth_list_pam_console_data" lineno="1378">
37180 +<interface name="auth_list_pam_console_data" lineno="1389">
37181 <summary>
37182 List the contents of the pam_console
37183 data directory.
37184 @@ -113083,7 +115315,7 @@ Domain allowed access.
37185 </summary>
37186 </param>
37187 </interface>
37188 -<interface name="auth_create_pam_console_data_dirs" lineno="1397">
37189 +<interface name="auth_create_pam_console_data_dirs" lineno="1408">
37190 <summary>
37191 Create pam var console pid directories.
37192 </summary>
37193 @@ -113093,7 +115325,7 @@ Domain allowed access.
37194 </summary>
37195 </param>
37196 </interface>
37197 -<interface name="auth_relabel_pam_console_data_dirs" lineno="1416">
37198 +<interface name="auth_relabel_pam_console_data_dirs" lineno="1427">
37199 <summary>
37200 Relabel pam_console data directories.
37201 </summary>
37202 @@ -113103,7 +115335,7 @@ Domain allowed access.
37203 </summary>
37204 </param>
37205 </interface>
37206 -<interface name="auth_read_pam_console_data" lineno="1434">
37207 +<interface name="auth_read_pam_console_data" lineno="1445">
37208 <summary>
37209 Read pam_console data files.
37210 </summary>
37211 @@ -113113,7 +115345,7 @@ Domain allowed access.
37212 </summary>
37213 </param>
37214 </interface>
37215 -<interface name="auth_manage_pam_console_data" lineno="1455">
37216 +<interface name="auth_manage_pam_console_data" lineno="1466">
37217 <summary>
37218 Create, read, write, and delete
37219 pam_console data files.
37220 @@ -113124,7 +115356,7 @@ Domain allowed access.
37221 </summary>
37222 </param>
37223 </interface>
37224 -<interface name="auth_delete_pam_console_data" lineno="1475">
37225 +<interface name="auth_delete_pam_console_data" lineno="1486">
37226 <summary>
37227 Delete pam_console data.
37228 </summary>
37229 @@ -113134,7 +115366,7 @@ Domain allowed access.
37230 </summary>
37231 </param>
37232 </interface>
37233 -<interface name="auth_pid_filetrans_pam_var_console" lineno="1508">
37234 +<interface name="auth_pid_filetrans_pam_var_console" lineno="1519">
37235 <summary>
37236 Create specified objects in
37237 pid directories with the pam var
37238 @@ -113157,7 +115389,7 @@ The name of the object being created.
37239 </summary>
37240 </param>
37241 </interface>
37242 -<interface name="auth_runtime_filetrans_pam_var_console" lineno="1536">
37243 +<interface name="auth_runtime_filetrans_pam_var_console" lineno="1547">
37244 <summary>
37245 Create specified objects in generic
37246 runtime directories with the pam var
37247 @@ -113180,7 +115412,7 @@ The name of the object being created.
37248 </summary>
37249 </param>
37250 </interface>
37251 -<interface name="auth_domtrans_utempter" lineno="1554">
37252 +<interface name="auth_domtrans_utempter" lineno="1565">
37253 <summary>
37254 Execute utempter programs in the utempter domain.
37255 </summary>
37256 @@ -113190,7 +115422,7 @@ Domain allowed to transition.
37257 </summary>
37258 </param>
37259 </interface>
37260 -<interface name="auth_run_utempter" lineno="1577">
37261 +<interface name="auth_run_utempter" lineno="1588">
37262 <summary>
37263 Execute utempter programs in the utempter domain.
37264 </summary>
37265 @@ -113205,7 +115437,7 @@ The role to allow the utempter domain.
37266 </summary>
37267 </param>
37268 </interface>
37269 -<interface name="auth_dontaudit_exec_utempter" lineno="1596">
37270 +<interface name="auth_dontaudit_exec_utempter" lineno="1607">
37271 <summary>
37272 Do not audit attempts to execute utempter executable.
37273 </summary>
37274 @@ -113215,7 +115447,7 @@ Domain to not audit.
37275 </summary>
37276 </param>
37277 </interface>
37278 -<interface name="auth_setattr_login_records" lineno="1614">
37279 +<interface name="auth_setattr_login_records" lineno="1625">
37280 <summary>
37281 Set the attributes of login record files.
37282 </summary>
37283 @@ -113225,7 +115457,7 @@ Domain allowed access.
37284 </summary>
37285 </param>
37286 </interface>
37287 -<interface name="auth_read_login_records" lineno="1634">
37288 +<interface name="auth_read_login_records" lineno="1645">
37289 <summary>
37290 Read login records files (/var/log/wtmp).
37291 </summary>
37292 @@ -113236,7 +115468,7 @@ Domain allowed access.
37293 </param>
37294 <rolecap/>
37295 </interface>
37296 -<interface name="auth_dontaudit_read_login_records" lineno="1655">
37297 +<interface name="auth_dontaudit_read_login_records" lineno="1666">
37298 <summary>
37299 Do not audit attempts to read login records
37300 files (/var/log/wtmp).
37301 @@ -113248,7 +115480,7 @@ Domain to not audit.
37302 </param>
37303 <rolecap/>
37304 </interface>
37305 -<interface name="auth_dontaudit_write_login_records" lineno="1674">
37306 +<interface name="auth_dontaudit_write_login_records" lineno="1685">
37307 <summary>
37308 Do not audit attempts to write to
37309 login records files.
37310 @@ -113259,7 +115491,7 @@ Domain to not audit.
37311 </summary>
37312 </param>
37313 </interface>
37314 -<interface name="auth_append_login_records" lineno="1692">
37315 +<interface name="auth_append_login_records" lineno="1703">
37316 <summary>
37317 Append to login records (wtmp).
37318 </summary>
37319 @@ -113269,7 +115501,7 @@ Domain allowed access.
37320 </summary>
37321 </param>
37322 </interface>
37323 -<interface name="auth_write_login_records" lineno="1711">
37324 +<interface name="auth_write_login_records" lineno="1722">
37325 <summary>
37326 Write to login records (wtmp).
37327 </summary>
37328 @@ -113279,7 +115511,7 @@ Domain allowed access.
37329 </summary>
37330 </param>
37331 </interface>
37332 -<interface name="auth_rw_login_records" lineno="1729">
37333 +<interface name="auth_rw_login_records" lineno="1740">
37334 <summary>
37335 Read and write login records.
37336 </summary>
37337 @@ -113289,7 +115521,7 @@ Domain allowed access.
37338 </summary>
37339 </param>
37340 </interface>
37341 -<interface name="auth_log_filetrans_login_records" lineno="1749">
37342 +<interface name="auth_log_filetrans_login_records" lineno="1760">
37343 <summary>
37344 Create a login records in the log directory
37345 using a type transition.
37346 @@ -113300,7 +115532,7 @@ Domain allowed access.
37347 </summary>
37348 </param>
37349 </interface>
37350 -<interface name="auth_manage_login_records" lineno="1768">
37351 +<interface name="auth_manage_login_records" lineno="1779">
37352 <summary>
37353 Create, read, write, and delete login
37354 records files.
37355 @@ -113311,7 +115543,7 @@ Domain allowed access.
37356 </summary>
37357 </param>
37358 </interface>
37359 -<interface name="auth_relabel_login_records" lineno="1787">
37360 +<interface name="auth_relabel_login_records" lineno="1798">
37361 <summary>
37362 Relabel login record files.
37363 </summary>
37364 @@ -113321,7 +115553,7 @@ Domain allowed access.
37365 </summary>
37366 </param>
37367 </interface>
37368 -<interface name="auth_use_nsswitch" lineno="1815">
37369 +<interface name="auth_use_nsswitch" lineno="1826">
37370 <summary>
37371 Use nsswitch to look up user, password, group, or
37372 host information.
37373 @@ -113341,7 +115573,7 @@ Domain allowed access.
37374 </param>
37375 <infoflow type="both" weight="10"/>
37376 </interface>
37377 -<interface name="auth_unconfined" lineno="1843">
37378 +<interface name="auth_unconfined" lineno="1854">
37379 <summary>
37380 Unconfined access to the authlogin module.
37381 </summary>
37382 @@ -114342,7 +116574,17 @@ Domain allowed access.
37383 </summary>
37384 </param>
37385 </interface>
37386 -<interface name="init_stream_connect" lineno="935">
37387 +<interface name="init_setsched" lineno="935">
37388 +<summary>
37389 +Set the nice level of init.
37390 +</summary>
37391 +<param name="domain">
37392 +<summary>
37393 +Domain allowed access.
37394 +</summary>
37395 +</param>
37396 +</interface>
37397 +<interface name="init_stream_connect" lineno="953">
37398 <summary>
37399 Connect to init with a unix socket.
37400 </summary>
37401 @@ -114352,7 +116594,7 @@ Domain allowed access.
37402 </summary>
37403 </param>
37404 </interface>
37405 -<interface name="init_unix_stream_socket_connectto" lineno="956">
37406 +<interface name="init_unix_stream_socket_connectto" lineno="974">
37407 <summary>
37408 Connect to init with a unix socket.
37409 Without any additional permissions.
37410 @@ -114363,7 +116605,7 @@ Domain allowed access.
37411 </summary>
37412 </param>
37413 </interface>
37414 -<interface name="init_use_fds" lineno="1014">
37415 +<interface name="init_use_fds" lineno="1032">
37416 <summary>
37417 Inherit and use file descriptors from init.
37418 </summary>
37419 @@ -114413,7 +116655,7 @@ Domain allowed access.
37420 </param>
37421 <infoflow type="read" weight="1"/>
37422 </interface>
37423 -<interface name="init_dontaudit_use_fds" lineno="1033">
37424 +<interface name="init_dontaudit_use_fds" lineno="1051">
37425 <summary>
37426 Do not audit attempts to inherit file
37427 descriptors from init.
37428 @@ -114424,7 +116666,7 @@ Domain to not audit.
37429 </summary>
37430 </param>
37431 </interface>
37432 -<interface name="init_dgram_send" lineno="1052">
37433 +<interface name="init_dgram_send" lineno="1070">
37434 <summary>
37435 Send messages to init unix datagram sockets.
37436 </summary>
37437 @@ -114435,7 +116677,7 @@ Domain allowed access.
37438 </param>
37439 <rolecap/>
37440 </interface>
37441 -<interface name="init_rw_inherited_stream_socket" lineno="1072">
37442 +<interface name="init_rw_inherited_stream_socket" lineno="1090">
37443 <summary>
37444 Read and write to inherited init unix streams.
37445 </summary>
37446 @@ -114445,7 +116687,7 @@ Domain allowed access.
37447 </summary>
37448 </param>
37449 </interface>
37450 -<interface name="init_rw_stream_sockets" lineno="1091">
37451 +<interface name="init_rw_stream_sockets" lineno="1109">
37452 <summary>
37453 Allow the specified domain to read/write to
37454 init with unix domain stream sockets.
37455 @@ -114456,7 +116698,7 @@ Domain allowed access.
37456 </summary>
37457 </param>
37458 </interface>
37459 -<interface name="init_start_system" lineno="1109">
37460 +<interface name="init_start_system" lineno="1127">
37461 <summary>
37462 start service (systemd).
37463 </summary>
37464 @@ -114466,7 +116708,7 @@ Domain allowed access.
37465 </summary>
37466 </param>
37467 </interface>
37468 -<interface name="init_stop_system" lineno="1127">
37469 +<interface name="init_stop_system" lineno="1145">
37470 <summary>
37471 stop service (systemd).
37472 </summary>
37473 @@ -114476,7 +116718,7 @@ Domain allowed access.
37474 </summary>
37475 </param>
37476 </interface>
37477 -<interface name="init_get_system_status" lineno="1145">
37478 +<interface name="init_get_system_status" lineno="1163">
37479 <summary>
37480 Get all service status (systemd).
37481 </summary>
37482 @@ -114486,7 +116728,7 @@ Domain allowed access.
37483 </summary>
37484 </param>
37485 </interface>
37486 -<interface name="init_enable" lineno="1163">
37487 +<interface name="init_enable" lineno="1181">
37488 <summary>
37489 Enable all systemd services (systemd).
37490 </summary>
37491 @@ -114496,7 +116738,7 @@ Domain allowed access.
37492 </summary>
37493 </param>
37494 </interface>
37495 -<interface name="init_disable" lineno="1181">
37496 +<interface name="init_disable" lineno="1199">
37497 <summary>
37498 Disable all services (systemd).
37499 </summary>
37500 @@ -114506,7 +116748,7 @@ Domain allowed access.
37501 </summary>
37502 </param>
37503 </interface>
37504 -<interface name="init_reload" lineno="1199">
37505 +<interface name="init_reload" lineno="1217">
37506 <summary>
37507 Reload all services (systemd).
37508 </summary>
37509 @@ -114516,7 +116758,7 @@ Domain allowed access.
37510 </summary>
37511 </param>
37512 </interface>
37513 -<interface name="init_reboot_system" lineno="1217">
37514 +<interface name="init_reboot_system" lineno="1235">
37515 <summary>
37516 Reboot the system (systemd).
37517 </summary>
37518 @@ -114526,7 +116768,7 @@ Domain allowed access.
37519 </summary>
37520 </param>
37521 </interface>
37522 -<interface name="init_shutdown_system" lineno="1235">
37523 +<interface name="init_shutdown_system" lineno="1253">
37524 <summary>
37525 Shutdown (halt) the system (systemd).
37526 </summary>
37527 @@ -114536,7 +116778,7 @@ Domain allowed access.
37528 </summary>
37529 </param>
37530 </interface>
37531 -<interface name="init_service_status" lineno="1253">
37532 +<interface name="init_service_status" lineno="1271">
37533 <summary>
37534 Allow specified domain to get init status
37535 </summary>
37536 @@ -114546,7 +116788,7 @@ Domain to allow access.
37537 </summary>
37538 </param>
37539 </interface>
37540 -<interface name="init_service_start" lineno="1272">
37541 +<interface name="init_service_start" lineno="1290">
37542 <summary>
37543 Allow specified domain to get init start
37544 </summary>
37545 @@ -114556,7 +116798,7 @@ Domain to allow access.
37546 </summary>
37547 </param>
37548 </interface>
37549 -<interface name="init_dbus_chat" lineno="1292">
37550 +<interface name="init_dbus_chat" lineno="1310">
37551 <summary>
37552 Send and receive messages from
37553 systemd over dbus.
37554 @@ -114567,7 +116809,17 @@ Domain allowed access.
37555 </summary>
37556 </param>
37557 </interface>
37558 -<interface name="init_read_var_lib_links" lineno="1312">
37559 +<interface name="init_run_bpf" lineno="1330">
37560 +<summary>
37561 +Run init BPF programs.
37562 +</summary>
37563 +<param name="domain">
37564 +<summary>
37565 +Domain allowed access.
37566 +</summary>
37567 +</param>
37568 +</interface>
37569 +<interface name="init_read_var_lib_links" lineno="1349">
37570 <summary>
37571 read/follow symlinks under /var/lib/systemd/
37572 </summary>
37573 @@ -114577,7 +116829,7 @@ Domain allowed access.
37574 </summary>
37575 </param>
37576 </interface>
37577 -<interface name="init_list_var_lib_dirs" lineno="1331">
37578 +<interface name="init_list_var_lib_dirs" lineno="1368">
37579 <summary>
37580 List /var/lib/systemd/ dir
37581 </summary>
37582 @@ -114587,7 +116839,7 @@ Domain allowed access.
37583 </summary>
37584 </param>
37585 </interface>
37586 -<interface name="init_relabel_var_lib_dirs" lineno="1349">
37587 +<interface name="init_relabel_var_lib_dirs" lineno="1386">
37588 <summary>
37589 Relabel dirs in /var/lib/systemd/.
37590 </summary>
37591 @@ -114597,7 +116849,7 @@ Domain allowed access.
37592 </summary>
37593 </param>
37594 </interface>
37595 -<interface name="init_manage_var_lib_files" lineno="1367">
37596 +<interface name="init_manage_var_lib_files" lineno="1404">
37597 <summary>
37598 Manage files in /var/lib/systemd/.
37599 </summary>
37600 @@ -114607,7 +116859,7 @@ Domain allowed access.
37601 </summary>
37602 </param>
37603 </interface>
37604 -<interface name="init_var_lib_filetrans" lineno="1402">
37605 +<interface name="init_var_lib_filetrans" lineno="1439">
37606 <summary>
37607 Create files in /var/lib/systemd
37608 with an automatic type transition.
37609 @@ -114633,7 +116885,7 @@ The name of the object being created.
37610 </summary>
37611 </param>
37612 </interface>
37613 -<interface name="init_search_pids" lineno="1421">
37614 +<interface name="init_search_pids" lineno="1458">
37615 <summary>
37616 Allow search directory in the /run/systemd directory. (Deprecated)
37617 </summary>
37618 @@ -114643,7 +116895,7 @@ Domain allowed access.
37619 </summary>
37620 </param>
37621 </interface>
37622 -<interface name="init_list_pids" lineno="1436">
37623 +<interface name="init_list_pids" lineno="1473">
37624 <summary>
37625 Allow listing of the /run/systemd directory. (Deprecated)
37626 </summary>
37627 @@ -114653,7 +116905,7 @@ Domain allowed access.
37628 </summary>
37629 </param>
37630 </interface>
37631 -<interface name="init_manage_pid_symlinks" lineno="1451">
37632 +<interface name="init_manage_pid_symlinks" lineno="1488">
37633 <summary>
37634 Create symbolic links in the /run/systemd directory. (Deprecated)
37635 </summary>
37636 @@ -114663,7 +116915,7 @@ Domain allowed access.
37637 </summary>
37638 </param>
37639 </interface>
37640 -<interface name="init_create_pid_files" lineno="1466">
37641 +<interface name="init_create_pid_files" lineno="1503">
37642 <summary>
37643 Create files in the /run/systemd directory. (Deprecated)
37644 </summary>
37645 @@ -114673,7 +116925,7 @@ Domain allowed access.
37646 </summary>
37647 </param>
37648 </interface>
37649 -<interface name="init_write_pid_files" lineno="1481">
37650 +<interface name="init_write_pid_files" lineno="1518">
37651 <summary>
37652 Write files in the /run/systemd directory. (Deprecated)
37653 </summary>
37654 @@ -114683,7 +116935,7 @@ Domain allowed access.
37655 </summary>
37656 </param>
37657 </interface>
37658 -<interface name="init_manage_pid_dirs" lineno="1497">
37659 +<interface name="init_manage_pid_dirs" lineno="1534">
37660 <summary>
37661 Create, read, write, and delete
37662 directories in the /run/systemd directory. (Deprecated)
37663 @@ -114694,7 +116946,7 @@ Domain allowed access.
37664 </summary>
37665 </param>
37666 </interface>
37667 -<interface name="init_pid_filetrans" lineno="1527">
37668 +<interface name="init_pid_filetrans" lineno="1564">
37669 <summary>
37670 Create files in an init PID directory. (Deprecated)
37671 </summary>
37672 @@ -114719,7 +116971,7 @@ The name of the object being created.
37673 </summary>
37674 </param>
37675 </interface>
37676 -<interface name="init_search_runtime" lineno="1542">
37677 +<interface name="init_search_runtime" lineno="1579">
37678 <summary>
37679 Search init runtime directories, e.g. /run/systemd.
37680 </summary>
37681 @@ -114729,7 +116981,7 @@ Domain allowed access.
37682 </summary>
37683 </param>
37684 </interface>
37685 -<interface name="init_list_runtime" lineno="1560">
37686 +<interface name="init_list_runtime" lineno="1597">
37687 <summary>
37688 List init runtime directories, e.g. /run/systemd.
37689 </summary>
37690 @@ -114739,7 +116991,7 @@ Domain allowed access.
37691 </summary>
37692 </param>
37693 </interface>
37694 -<interface name="init_manage_runtime_dirs" lineno="1580">
37695 +<interface name="init_manage_runtime_dirs" lineno="1617">
37696 <summary>
37697 Create, read, write, and delete
37698 directories in the /run/systemd directory.
37699 @@ -114750,7 +117002,7 @@ Domain allowed access.
37700 </summary>
37701 </param>
37702 </interface>
37703 -<interface name="init_runtime_filetrans" lineno="1613">
37704 +<interface name="init_runtime_filetrans" lineno="1650">
37705 <summary>
37706 Create files in an init runtime directory with a private type.
37707 </summary>
37708 @@ -114775,7 +117027,7 @@ The name of the object being created.
37709 </summary>
37710 </param>
37711 </interface>
37712 -<interface name="init_write_runtime_files" lineno="1632">
37713 +<interface name="init_write_runtime_files" lineno="1669">
37714 <summary>
37715 Write init runtime files, e.g. in /run/systemd.
37716 </summary>
37717 @@ -114785,7 +117037,7 @@ Domain allowed access.
37718 </summary>
37719 </param>
37720 </interface>
37721 -<interface name="init_create_runtime_files" lineno="1650">
37722 +<interface name="init_create_runtime_files" lineno="1687">
37723 <summary>
37724 Create init runtime files, e.g. in /run/systemd.
37725 </summary>
37726 @@ -114795,7 +117047,7 @@ Domain allowed access.
37727 </summary>
37728 </param>
37729 </interface>
37730 -<interface name="init_manage_runtime_symlinks" lineno="1668">
37731 +<interface name="init_manage_runtime_symlinks" lineno="1705">
37732 <summary>
37733 Create init runtime symbolic links, e.g. in /run/systemd.
37734 </summary>
37735 @@ -114805,7 +117057,7 @@ Domain allowed access.
37736 </summary>
37737 </param>
37738 </interface>
37739 -<interface name="init_getattr_initctl" lineno="1686">
37740 +<interface name="init_getattr_initctl" lineno="1723">
37741 <summary>
37742 Get the attributes of initctl.
37743 </summary>
37744 @@ -114815,7 +117067,7 @@ Domain allowed access.
37745 </summary>
37746 </param>
37747 </interface>
37748 -<interface name="init_dontaudit_getattr_initctl" lineno="1707">
37749 +<interface name="init_dontaudit_getattr_initctl" lineno="1744">
37750 <summary>
37751 Do not audit attempts to get the
37752 attributes of initctl.
37753 @@ -114826,7 +117078,7 @@ Domain to not audit.
37754 </summary>
37755 </param>
37756 </interface>
37757 -<interface name="init_write_initctl" lineno="1725">
37758 +<interface name="init_write_initctl" lineno="1762">
37759 <summary>
37760 Write to initctl.
37761 </summary>
37762 @@ -114836,7 +117088,7 @@ Domain allowed access.
37763 </summary>
37764 </param>
37765 </interface>
37766 -<interface name="init_telinit" lineno="1746">
37767 +<interface name="init_telinit" lineno="1783">
37768 <summary>
37769 Use telinit (Read and write initctl).
37770 </summary>
37771 @@ -114847,7 +117099,7 @@ Domain allowed access.
37772 </param>
37773 <rolecap/>
37774 </interface>
37775 -<interface name="init_rw_initctl" lineno="1779">
37776 +<interface name="init_rw_initctl" lineno="1816">
37777 <summary>
37778 Read and write initctl.
37779 </summary>
37780 @@ -114857,7 +117109,7 @@ Domain allowed access.
37781 </summary>
37782 </param>
37783 </interface>
37784 -<interface name="init_dontaudit_rw_initctl" lineno="1800">
37785 +<interface name="init_dontaudit_rw_initctl" lineno="1837">
37786 <summary>
37787 Do not audit attempts to read and
37788 write initctl.
37789 @@ -114868,7 +117120,7 @@ Domain to not audit.
37790 </summary>
37791 </param>
37792 </interface>
37793 -<interface name="init_script_file_entry_type" lineno="1819">
37794 +<interface name="init_script_file_entry_type" lineno="1856">
37795 <summary>
37796 Make init scripts an entry point for
37797 the specified domain.
37798 @@ -114879,7 +117131,7 @@ Domain allowed access.
37799 </summary>
37800 </param>
37801 </interface>
37802 -<interface name="init_spec_domtrans_script" lineno="1842">
37803 +<interface name="init_spec_domtrans_script" lineno="1879">
37804 <summary>
37805 Execute init scripts with a specified domain transition.
37806 </summary>
37807 @@ -114889,7 +117141,7 @@ Domain allowed to transition.
37808 </summary>
37809 </param>
37810 </interface>
37811 -<interface name="init_domtrans_script" lineno="1869">
37812 +<interface name="init_domtrans_script" lineno="1906">
37813 <summary>
37814 Execute init scripts with an automatic domain transition.
37815 </summary>
37816 @@ -114899,7 +117151,7 @@ Domain allowed to transition.
37817 </summary>
37818 </param>
37819 </interface>
37820 -<interface name="init_domtrans_labeled_script" lineno="1904">
37821 +<interface name="init_domtrans_labeled_script" lineno="1941">
37822 <summary>
37823 Execute labelled init scripts with an automatic domain transition.
37824 </summary>
37825 @@ -114909,7 +117161,7 @@ Domain allowed to transition.
37826 </summary>
37827 </param>
37828 </interface>
37829 -<interface name="init_script_file_domtrans" lineno="1950">
37830 +<interface name="init_script_file_domtrans" lineno="1987">
37831 <summary>
37832 Execute a init script in a specified domain.
37833 </summary>
37834 @@ -114934,7 +117186,7 @@ Domain to transition to.
37835 </summary>
37836 </param>
37837 </interface>
37838 -<interface name="init_kill_scripts" lineno="1969">
37839 +<interface name="init_kill_scripts" lineno="2006">
37840 <summary>
37841 Send a kill signal to init scripts.
37842 </summary>
37843 @@ -114944,7 +117196,7 @@ Domain allowed access.
37844 </summary>
37845 </param>
37846 </interface>
37847 -<interface name="init_manage_script_service" lineno="1987">
37848 +<interface name="init_manage_script_service" lineno="2024">
37849 <summary>
37850 Allow manage service for initrc_exec_t scripts
37851 </summary>
37852 @@ -114954,7 +117206,7 @@ Target domain
37853 </summary>
37854 </param>
37855 </interface>
37856 -<interface name="init_labeled_script_domtrans" lineno="2012">
37857 +<interface name="init_labeled_script_domtrans" lineno="2049">
37858 <summary>
37859 Transition to the init script domain
37860 on a specified labeled init script.
37861 @@ -114970,7 +117222,7 @@ Labeled init script file.
37862 </summary>
37863 </param>
37864 </interface>
37865 -<interface name="init_all_labeled_script_domtrans" lineno="2034">
37866 +<interface name="init_all_labeled_script_domtrans" lineno="2071">
37867 <summary>
37868 Transition to the init script domain
37869 for all labeled init script types
37870 @@ -114981,7 +117233,7 @@ Domain allowed to transition.
37871 </summary>
37872 </param>
37873 </interface>
37874 -<interface name="init_get_script_status" lineno="2052">
37875 +<interface name="init_get_script_status" lineno="2089">
37876 <summary>
37877 Allow getting service status of initrc_exec_t scripts
37878 </summary>
37879 @@ -114991,7 +117243,7 @@ Target domain
37880 </summary>
37881 </param>
37882 </interface>
37883 -<interface name="init_startstop_service" lineno="2092">
37884 +<interface name="init_startstop_service" lineno="2129">
37885 <summary>
37886 Allow the role to start and stop
37887 labeled services.
37888 @@ -115022,7 +117274,7 @@ Systemd unit file type.
37889 </summary>
37890 </param>
37891 </interface>
37892 -<interface name="init_run_daemon" lineno="2148">
37893 +<interface name="init_run_daemon" lineno="2185">
37894 <summary>
37895 Start and stop daemon programs directly.
37896 </summary>
37897 @@ -115044,7 +117296,7 @@ The role to be performing this action.
37898 </summary>
37899 </param>
37900 </interface>
37901 -<interface name="init_startstop_all_script_services" lineno="2170">
37902 +<interface name="init_startstop_all_script_services" lineno="2207">
37903 <summary>
37904 Start and stop init_script_file_type services
37905 </summary>
37906 @@ -115054,7 +117306,7 @@ domain that can start and stop the services
37907 </summary>
37908 </param>
37909 </interface>
37910 -<interface name="init_read_state" lineno="2189">
37911 +<interface name="init_read_state" lineno="2226">
37912 <summary>
37913 Read the process state (/proc/pid) of init.
37914 </summary>
37915 @@ -115064,7 +117316,7 @@ Domain allowed access.
37916 </summary>
37917 </param>
37918 </interface>
37919 -<interface name="init_dontaudit_read_state" lineno="2209">
37920 +<interface name="init_dontaudit_read_state" lineno="2246">
37921 <summary>
37922 Dontaudit read the process state (/proc/pid) of init.
37923 </summary>
37924 @@ -115074,7 +117326,7 @@ Domain to not audit.
37925 </summary>
37926 </param>
37927 </interface>
37928 -<interface name="init_ptrace" lineno="2230">
37929 +<interface name="init_ptrace" lineno="2267">
37930 <summary>
37931 Ptrace init
37932 </summary>
37933 @@ -115085,7 +117337,7 @@ Domain allowed access.
37934 </param>
37935 <rolecap/>
37936 </interface>
37937 -<interface name="init_getattr" lineno="2249">
37938 +<interface name="init_getattr" lineno="2286">
37939 <summary>
37940 get init process stats
37941 </summary>
37942 @@ -115096,7 +117348,7 @@ Domain allowed access.
37943 </param>
37944 <rolecap/>
37945 </interface>
37946 -<interface name="init_read_script_pipes" lineno="2267">
37947 +<interface name="init_read_script_pipes" lineno="2304">
37948 <summary>
37949 Read an init script unnamed pipe.
37950 </summary>
37951 @@ -115106,7 +117358,7 @@ Domain allowed access.
37952 </summary>
37953 </param>
37954 </interface>
37955 -<interface name="init_write_script_pipes" lineno="2285">
37956 +<interface name="init_write_script_pipes" lineno="2322">
37957 <summary>
37958 Write an init script unnamed pipe.
37959 </summary>
37960 @@ -115116,7 +117368,7 @@ Domain allowed access.
37961 </summary>
37962 </param>
37963 </interface>
37964 -<interface name="init_getattr_script_files" lineno="2303">
37965 +<interface name="init_getattr_script_files" lineno="2340">
37966 <summary>
37967 Get the attribute of init script entrypoint files.
37968 </summary>
37969 @@ -115126,7 +117378,7 @@ Domain allowed access.
37970 </summary>
37971 </param>
37972 </interface>
37973 -<interface name="init_read_script_files" lineno="2322">
37974 +<interface name="init_read_script_files" lineno="2359">
37975 <summary>
37976 Read init scripts.
37977 </summary>
37978 @@ -115136,7 +117388,7 @@ Domain allowed access.
37979 </summary>
37980 </param>
37981 </interface>
37982 -<interface name="init_exec_script_files" lineno="2341">
37983 +<interface name="init_exec_script_files" lineno="2378">
37984 <summary>
37985 Execute init scripts in the caller domain.
37986 </summary>
37987 @@ -115146,7 +117398,7 @@ Domain allowed access.
37988 </summary>
37989 </param>
37990 </interface>
37991 -<interface name="init_getattr_all_script_files" lineno="2360">
37992 +<interface name="init_getattr_all_script_files" lineno="2397">
37993 <summary>
37994 Get the attribute of all init script entrypoint files.
37995 </summary>
37996 @@ -115156,7 +117408,7 @@ Domain allowed access.
37997 </summary>
37998 </param>
37999 </interface>
38000 -<interface name="init_read_all_script_files" lineno="2379">
38001 +<interface name="init_read_all_script_files" lineno="2416">
38002 <summary>
38003 Read all init script files.
38004 </summary>
38005 @@ -115166,7 +117418,7 @@ Domain allowed access.
38006 </summary>
38007 </param>
38008 </interface>
38009 -<interface name="init_dontaudit_read_all_script_files" lineno="2403">
38010 +<interface name="init_dontaudit_read_all_script_files" lineno="2440">
38011 <summary>
38012 Dontaudit read all init script files.
38013 </summary>
38014 @@ -115176,7 +117428,7 @@ Domain to not audit.
38015 </summary>
38016 </param>
38017 </interface>
38018 -<interface name="init_exec_all_script_files" lineno="2421">
38019 +<interface name="init_exec_all_script_files" lineno="2458">
38020 <summary>
38021 Execute all init scripts in the caller domain.
38022 </summary>
38023 @@ -115186,7 +117438,7 @@ Domain allowed access.
38024 </summary>
38025 </param>
38026 </interface>
38027 -<interface name="init_read_script_state" lineno="2440">
38028 +<interface name="init_read_script_state" lineno="2477">
38029 <summary>
38030 Read the process state (/proc/pid) of the init scripts.
38031 </summary>
38032 @@ -115196,7 +117448,7 @@ Domain allowed access.
38033 </summary>
38034 </param>
38035 </interface>
38036 -<interface name="init_use_script_fds" lineno="2459">
38037 +<interface name="init_use_script_fds" lineno="2496">
38038 <summary>
38039 Inherit and use init script file descriptors.
38040 </summary>
38041 @@ -115206,7 +117458,7 @@ Domain allowed access.
38042 </summary>
38043 </param>
38044 </interface>
38045 -<interface name="init_dontaudit_use_script_fds" lineno="2478">
38046 +<interface name="init_dontaudit_use_script_fds" lineno="2515">
38047 <summary>
38048 Do not audit attempts to inherit
38049 init script file descriptors.
38050 @@ -115217,7 +117469,7 @@ Domain to not audit.
38051 </summary>
38052 </param>
38053 </interface>
38054 -<interface name="init_search_script_keys" lineno="2496">
38055 +<interface name="init_search_script_keys" lineno="2533">
38056 <summary>
38057 Search init script keys.
38058 </summary>
38059 @@ -115227,7 +117479,7 @@ Domain allowed access.
38060 </summary>
38061 </param>
38062 </interface>
38063 -<interface name="init_getpgid_script" lineno="2514">
38064 +<interface name="init_getpgid_script" lineno="2551">
38065 <summary>
38066 Get the process group ID of init scripts.
38067 </summary>
38068 @@ -115237,7 +117489,7 @@ Domain allowed access.
38069 </summary>
38070 </param>
38071 </interface>
38072 -<interface name="init_sigchld_script" lineno="2532">
38073 +<interface name="init_sigchld_script" lineno="2569">
38074 <summary>
38075 Send SIGCHLD signals to init scripts.
38076 </summary>
38077 @@ -115247,7 +117499,7 @@ Domain allowed access.
38078 </summary>
38079 </param>
38080 </interface>
38081 -<interface name="init_signal_script" lineno="2550">
38082 +<interface name="init_signal_script" lineno="2587">
38083 <summary>
38084 Send generic signals to init scripts.
38085 </summary>
38086 @@ -115257,7 +117509,7 @@ Domain allowed access.
38087 </summary>
38088 </param>
38089 </interface>
38090 -<interface name="init_signull_script" lineno="2568">
38091 +<interface name="init_signull_script" lineno="2605">
38092 <summary>
38093 Send null signals to init scripts.
38094 </summary>
38095 @@ -115267,7 +117519,7 @@ Domain allowed access.
38096 </summary>
38097 </param>
38098 </interface>
38099 -<interface name="init_rw_script_pipes" lineno="2586">
38100 +<interface name="init_rw_script_pipes" lineno="2623">
38101 <summary>
38102 Read and write init script unnamed pipes.
38103 </summary>
38104 @@ -115277,7 +117529,7 @@ Domain allowed access.
38105 </summary>
38106 </param>
38107 </interface>
38108 -<interface name="init_stream_connect_script" lineno="2605">
38109 +<interface name="init_stream_connect_script" lineno="2642">
38110 <summary>
38111 Allow the specified domain to connect to
38112 init scripts with a unix socket.
38113 @@ -115288,7 +117540,7 @@ Domain allowed access.
38114 </summary>
38115 </param>
38116 </interface>
38117 -<interface name="init_rw_script_stream_sockets" lineno="2624">
38118 +<interface name="init_rw_script_stream_sockets" lineno="2661">
38119 <summary>
38120 Allow the specified domain to read/write to
38121 init scripts with a unix domain stream sockets.
38122 @@ -115299,7 +117551,7 @@ Domain allowed access.
38123 </summary>
38124 </param>
38125 </interface>
38126 -<interface name="init_dontaudit_stream_connect_script" lineno="2643">
38127 +<interface name="init_dontaudit_stream_connect_script" lineno="2680">
38128 <summary>
38129 Dont audit the specified domain connecting to
38130 init scripts with a unix domain stream socket.
38131 @@ -115310,7 +117562,7 @@ Domain to not audit.
38132 </summary>
38133 </param>
38134 </interface>
38135 -<interface name="init_dbus_send_script" lineno="2660">
38136 +<interface name="init_dbus_send_script" lineno="2697">
38137 <summary>
38138 Send messages to init scripts over dbus.
38139 </summary>
38140 @@ -115320,7 +117572,7 @@ Domain allowed access.
38141 </summary>
38142 </param>
38143 </interface>
38144 -<interface name="init_dbus_chat_script" lineno="2680">
38145 +<interface name="init_dbus_chat_script" lineno="2717">
38146 <summary>
38147 Send and receive messages from
38148 init scripts over dbus.
38149 @@ -115331,7 +117583,7 @@ Domain allowed access.
38150 </summary>
38151 </param>
38152 </interface>
38153 -<interface name="init_use_script_ptys" lineno="2709">
38154 +<interface name="init_use_script_ptys" lineno="2746">
38155 <summary>
38156 Read and write the init script pty.
38157 </summary>
38158 @@ -115350,7 +117602,7 @@ Domain allowed access.
38159 </summary>
38160 </param>
38161 </interface>
38162 -<interface name="init_use_inherited_script_ptys" lineno="2728">
38163 +<interface name="init_use_inherited_script_ptys" lineno="2765">
38164 <summary>
38165 Read and write inherited init script ptys.
38166 </summary>
38167 @@ -115360,7 +117612,7 @@ Domain allowed access.
38168 </summary>
38169 </param>
38170 </interface>
38171 -<interface name="init_dontaudit_use_script_ptys" lineno="2750">
38172 +<interface name="init_dontaudit_use_script_ptys" lineno="2787">
38173 <summary>
38174 Do not audit attempts to read and
38175 write the init script pty.
38176 @@ -115371,7 +117623,7 @@ Domain to not audit.
38177 </summary>
38178 </param>
38179 </interface>
38180 -<interface name="init_getattr_script_status_files" lineno="2769">
38181 +<interface name="init_getattr_script_status_files" lineno="2806">
38182 <summary>
38183 Get the attributes of init script
38184 status files.
38185 @@ -115382,7 +117634,7 @@ Domain allowed access.
38186 </summary>
38187 </param>
38188 </interface>
38189 -<interface name="init_dontaudit_read_script_status_files" lineno="2788">
38190 +<interface name="init_dontaudit_read_script_status_files" lineno="2825">
38191 <summary>
38192 Do not audit attempts to read init script
38193 status files.
38194 @@ -115393,7 +117645,7 @@ Domain to not audit.
38195 </summary>
38196 </param>
38197 </interface>
38198 -<interface name="init_search_run" lineno="2807">
38199 +<interface name="init_search_run" lineno="2844">
38200 <summary>
38201 Search the /run/systemd directory.
38202 </summary>
38203 @@ -115403,7 +117655,7 @@ Domain allowed access.
38204 </summary>
38205 </param>
38206 </interface>
38207 -<interface name="init_read_script_tmp_files" lineno="2826">
38208 +<interface name="init_read_script_tmp_files" lineno="2863">
38209 <summary>
38210 Read init script temporary data.
38211 </summary>
38212 @@ -115413,7 +117665,7 @@ Domain allowed access.
38213 </summary>
38214 </param>
38215 </interface>
38216 -<interface name="init_rw_inherited_script_tmp_files" lineno="2845">
38217 +<interface name="init_rw_inherited_script_tmp_files" lineno="2882">
38218 <summary>
38219 Read and write init script inherited temporary data.
38220 </summary>
38221 @@ -115423,7 +117675,7 @@ Domain allowed access.
38222 </summary>
38223 </param>
38224 </interface>
38225 -<interface name="init_rw_script_tmp_files" lineno="2863">
38226 +<interface name="init_rw_script_tmp_files" lineno="2900">
38227 <summary>
38228 Read and write init script temporary data.
38229 </summary>
38230 @@ -115433,7 +117685,7 @@ Domain allowed access.
38231 </summary>
38232 </param>
38233 </interface>
38234 -<interface name="init_script_tmp_filetrans" lineno="2898">
38235 +<interface name="init_script_tmp_filetrans" lineno="2935">
38236 <summary>
38237 Create files in a init script
38238 temporary data directory.
38239 @@ -115459,7 +117711,7 @@ The name of the object being created.
38240 </summary>
38241 </param>
38242 </interface>
38243 -<interface name="init_getattr_utmp" lineno="2917">
38244 +<interface name="init_getattr_utmp" lineno="2954">
38245 <summary>
38246 Get the attributes of init script process id files.
38247 </summary>
38248 @@ -115469,7 +117721,7 @@ Domain allowed access.
38249 </summary>
38250 </param>
38251 </interface>
38252 -<interface name="init_read_utmp" lineno="2935">
38253 +<interface name="init_read_utmp" lineno="2972">
38254 <summary>
38255 Read utmp.
38256 </summary>
38257 @@ -115479,7 +117731,7 @@ Domain allowed access.
38258 </summary>
38259 </param>
38260 </interface>
38261 -<interface name="init_dontaudit_write_utmp" lineno="2954">
38262 +<interface name="init_dontaudit_write_utmp" lineno="2991">
38263 <summary>
38264 Do not audit attempts to write utmp.
38265 </summary>
38266 @@ -115489,7 +117741,7 @@ Domain to not audit.
38267 </summary>
38268 </param>
38269 </interface>
38270 -<interface name="init_write_utmp" lineno="2972">
38271 +<interface name="init_write_utmp" lineno="3009">
38272 <summary>
38273 Write to utmp.
38274 </summary>
38275 @@ -115499,7 +117751,7 @@ Domain allowed access.
38276 </summary>
38277 </param>
38278 </interface>
38279 -<interface name="init_dontaudit_lock_utmp" lineno="2992">
38280 +<interface name="init_dontaudit_lock_utmp" lineno="3029">
38281 <summary>
38282 Do not audit attempts to lock
38283 init script pid files.
38284 @@ -115510,7 +117762,7 @@ Domain to not audit.
38285 </summary>
38286 </param>
38287 </interface>
38288 -<interface name="init_rw_utmp" lineno="3010">
38289 +<interface name="init_rw_utmp" lineno="3047">
38290 <summary>
38291 Read and write utmp.
38292 </summary>
38293 @@ -115520,7 +117772,7 @@ Domain allowed access.
38294 </summary>
38295 </param>
38296 </interface>
38297 -<interface name="init_dontaudit_rw_utmp" lineno="3029">
38298 +<interface name="init_dontaudit_rw_utmp" lineno="3066">
38299 <summary>
38300 Do not audit attempts to read and write utmp.
38301 </summary>
38302 @@ -115530,7 +117782,7 @@ Domain to not audit.
38303 </summary>
38304 </param>
38305 </interface>
38306 -<interface name="init_manage_utmp" lineno="3047">
38307 +<interface name="init_manage_utmp" lineno="3084">
38308 <summary>
38309 Create, read, write, and delete utmp.
38310 </summary>
38311 @@ -115540,7 +117792,7 @@ Domain allowed access.
38312 </summary>
38313 </param>
38314 </interface>
38315 -<interface name="init_watch_utmp" lineno="3066">
38316 +<interface name="init_watch_utmp" lineno="3103">
38317 <summary>
38318 Add a watch on utmp.
38319 </summary>
38320 @@ -115550,7 +117802,7 @@ Domain allowed access.
38321 </summary>
38322 </param>
38323 </interface>
38324 -<interface name="init_relabel_utmp" lineno="3084">
38325 +<interface name="init_relabel_utmp" lineno="3121">
38326 <summary>
38327 Relabel utmp.
38328 </summary>
38329 @@ -115560,7 +117812,7 @@ Domain allowed access.
38330 </summary>
38331 </param>
38332 </interface>
38333 -<interface name="init_runtime_filetrans_utmp" lineno="3103">
38334 +<interface name="init_runtime_filetrans_utmp" lineno="3140">
38335 <summary>
38336 Create files in /var/run with the
38337 utmp file type.
38338 @@ -115571,7 +117823,7 @@ Domain allowed access.
38339 </summary>
38340 </param>
38341 </interface>
38342 -<interface name="init_create_runtime_dirs" lineno="3121">
38343 +<interface name="init_create_runtime_dirs" lineno="3158">
38344 <summary>
38345 Create a directory in the /run/systemd directory.
38346 </summary>
38347 @@ -115581,7 +117833,7 @@ Domain allowed access.
38348 </summary>
38349 </param>
38350 </interface>
38351 -<interface name="init_read_runtime_files" lineno="3140">
38352 +<interface name="init_read_runtime_files" lineno="3177">
38353 <summary>
38354 Read init_runtime_t files
38355 </summary>
38356 @@ -115591,7 +117843,7 @@ domain
38357 </summary>
38358 </param>
38359 </interface>
38360 -<interface name="init_rename_runtime_files" lineno="3158">
38361 +<interface name="init_rename_runtime_files" lineno="3195">
38362 <summary>
38363 Rename init_runtime_t files
38364 </summary>
38365 @@ -115601,7 +117853,7 @@ domain
38366 </summary>
38367 </param>
38368 </interface>
38369 -<interface name="init_setattr_runtime_files" lineno="3176">
38370 +<interface name="init_setattr_runtime_files" lineno="3213">
38371 <summary>
38372 Setattr init_runtime_t files
38373 </summary>
38374 @@ -115611,7 +117863,7 @@ domain
38375 </summary>
38376 </param>
38377 </interface>
38378 -<interface name="init_delete_runtime_files" lineno="3194">
38379 +<interface name="init_delete_runtime_files" lineno="3231">
38380 <summary>
38381 Delete init_runtime_t files
38382 </summary>
38383 @@ -115621,7 +117873,7 @@ domain
38384 </summary>
38385 </param>
38386 </interface>
38387 -<interface name="init_write_runtime_socket" lineno="3213">
38388 +<interface name="init_write_runtime_socket" lineno="3250">
38389 <summary>
38390 Allow the specified domain to write to
38391 init sock file.
38392 @@ -115632,7 +117884,7 @@ Domain allowed access.
38393 </summary>
38394 </param>
38395 </interface>
38396 -<interface name="init_read_runtime_pipes" lineno="3231">
38397 +<interface name="init_read_runtime_pipes" lineno="3268">
38398 <summary>
38399 Read init unnamed pipes.
38400 </summary>
38401 @@ -115642,7 +117894,7 @@ Domain allowed access.
38402 </summary>
38403 </param>
38404 </interface>
38405 -<interface name="init_read_runtime_symlinks" lineno="3249">
38406 +<interface name="init_read_runtime_symlinks" lineno="3286">
38407 <summary>
38408 read systemd unit symlinks (usually under /run/systemd/units/)
38409 </summary>
38410 @@ -115652,7 +117904,7 @@ Domain allowed access.
38411 </summary>
38412 </param>
38413 </interface>
38414 -<interface name="init_tcp_recvfrom_all_daemons" lineno="3267">
38415 +<interface name="init_tcp_recvfrom_all_daemons" lineno="3304">
38416 <summary>
38417 Allow the specified domain to connect to daemon with a tcp socket
38418 </summary>
38419 @@ -115662,7 +117914,7 @@ Domain allowed access.
38420 </summary>
38421 </param>
38422 </interface>
38423 -<interface name="init_udp_recvfrom_all_daemons" lineno="3285">
38424 +<interface name="init_udp_recvfrom_all_daemons" lineno="3322">
38425 <summary>
38426 Allow the specified domain to connect to daemon with a udp socket
38427 </summary>
38428 @@ -115672,7 +117924,7 @@ Domain allowed access.
38429 </summary>
38430 </param>
38431 </interface>
38432 -<interface name="init_read_script_status_files" lineno="3304">
38433 +<interface name="init_read_script_status_files" lineno="3341">
38434 <summary>
38435 Allow reading the init script state files
38436 </summary>
38437 @@ -115682,7 +117934,7 @@ Domain allowed access
38438 </summary>
38439 </param>
38440 </interface>
38441 -<interface name="init_relabelto_script_state" lineno="3322">
38442 +<interface name="init_relabelto_script_state" lineno="3359">
38443 <summary>
38444 Label to init script status files
38445 </summary>
38446 @@ -115692,7 +117944,7 @@ Domain allowed access
38447 </summary>
38448 </param>
38449 </interface>
38450 -<interface name="init_script_readable_type" lineno="3341">
38451 +<interface name="init_script_readable_type" lineno="3378">
38452 <summary>
38453 Mark as a readable type for the initrc_t domain
38454 </summary>
38455 @@ -115702,7 +117954,7 @@ Type that initrc_t needs read access to
38456 </summary>
38457 </param>
38458 </interface>
38459 -<interface name="init_search_units" lineno="3359">
38460 +<interface name="init_search_units" lineno="3396">
38461 <summary>
38462 Search systemd unit dirs.
38463 </summary>
38464 @@ -115712,7 +117964,7 @@ Domain allowed access.
38465 </summary>
38466 </param>
38467 </interface>
38468 -<interface name="init_list_unit_dirs" lineno="3384">
38469 +<interface name="init_list_unit_dirs" lineno="3421">
38470 <summary>
38471 List systemd unit dirs.
38472 </summary>
38473 @@ -115722,7 +117974,7 @@ Domain allowed access.
38474 </summary>
38475 </param>
38476 </interface>
38477 -<interface name="init_read_generic_units_files" lineno="3404">
38478 +<interface name="init_read_generic_units_files" lineno="3441">
38479 <summary>
38480 Read systemd unit files
38481 </summary>
38482 @@ -115732,7 +117984,7 @@ Domain allowed access.
38483 </summary>
38484 </param>
38485 </interface>
38486 -<interface name="init_read_generic_units_symlinks" lineno="3422">
38487 +<interface name="init_read_generic_units_symlinks" lineno="3459">
38488 <summary>
38489 Read systemd unit links
38490 </summary>
38491 @@ -115742,7 +117994,7 @@ Domain allowed access.
38492 </summary>
38493 </param>
38494 </interface>
38495 -<interface name="init_get_generic_units_status" lineno="3440">
38496 +<interface name="init_get_generic_units_status" lineno="3477">
38497 <summary>
38498 Get status of generic systemd units.
38499 </summary>
38500 @@ -115752,7 +118004,7 @@ Domain allowed access.
38501 </summary>
38502 </param>
38503 </interface>
38504 -<interface name="init_start_generic_units" lineno="3459">
38505 +<interface name="init_start_generic_units" lineno="3496">
38506 <summary>
38507 Start generic systemd units.
38508 </summary>
38509 @@ -115762,7 +118014,7 @@ Domain allowed access.
38510 </summary>
38511 </param>
38512 </interface>
38513 -<interface name="init_stop_generic_units" lineno="3478">
38514 +<interface name="init_stop_generic_units" lineno="3515">
38515 <summary>
38516 Stop generic systemd units.
38517 </summary>
38518 @@ -115772,7 +118024,7 @@ Domain to not audit.
38519 </summary>
38520 </param>
38521 </interface>
38522 -<interface name="init_reload_generic_units" lineno="3497">
38523 +<interface name="init_reload_generic_units" lineno="3534">
38524 <summary>
38525 Reload generic systemd units.
38526 </summary>
38527 @@ -115782,7 +118034,7 @@ Domain allowed access.
38528 </summary>
38529 </param>
38530 </interface>
38531 -<interface name="init_get_all_units_status" lineno="3516">
38532 +<interface name="init_get_all_units_status" lineno="3553">
38533 <summary>
38534 Get status of all systemd units.
38535 </summary>
38536 @@ -115792,7 +118044,7 @@ Domain allowed access.
38537 </summary>
38538 </param>
38539 </interface>
38540 -<interface name="init_manage_all_units" lineno="3535">
38541 +<interface name="init_manage_all_units" lineno="3572">
38542 <summary>
38543 All perms on all systemd units.
38544 </summary>
38545 @@ -115802,7 +118054,7 @@ Domain allowed access.
38546 </summary>
38547 </param>
38548 </interface>
38549 -<interface name="init_start_all_units" lineno="3555">
38550 +<interface name="init_start_all_units" lineno="3592">
38551 <summary>
38552 Start all systemd units.
38553 </summary>
38554 @@ -115812,7 +118064,7 @@ Domain allowed access.
38555 </summary>
38556 </param>
38557 </interface>
38558 -<interface name="init_stop_all_units" lineno="3574">
38559 +<interface name="init_stop_all_units" lineno="3611">
38560 <summary>
38561 Stop all systemd units.
38562 </summary>
38563 @@ -115822,7 +118074,7 @@ Domain to not audit.
38564 </summary>
38565 </param>
38566 </interface>
38567 -<interface name="init_reload_all_units" lineno="3593">
38568 +<interface name="init_reload_all_units" lineno="3630">
38569 <summary>
38570 Reload all systemd units.
38571 </summary>
38572 @@ -115832,7 +118084,7 @@ Domain allowed access.
38573 </summary>
38574 </param>
38575 </interface>
38576 -<interface name="init_manage_all_unit_files" lineno="3612">
38577 +<interface name="init_manage_all_unit_files" lineno="3649">
38578 <summary>
38579 Manage systemd unit dirs and the files in them
38580 </summary>
38581 @@ -115842,7 +118094,7 @@ Domain allowed access.
38582 </summary>
38583 </param>
38584 </interface>
38585 -<interface name="init_linkable_keyring" lineno="3633">
38586 +<interface name="init_linkable_keyring" lineno="3670">
38587 <summary>
38588 Associate the specified domain to be a domain whose
38589 keyring init should be allowed to link.
38590 @@ -115853,7 +118105,7 @@ Domain whose keyring init should be allowed to link.
38591 </summary>
38592 </param>
38593 </interface>
38594 -<interface name="init_admin" lineno="3651">
38595 +<interface name="init_admin" lineno="3688">
38596 <summary>
38597 Allow unconfined access to send instructions to init
38598 </summary>
38599 @@ -115863,7 +118115,7 @@ Target domain
38600 </summary>
38601 </param>
38602 </interface>
38603 -<interface name="init_getrlimit" lineno="3683">
38604 +<interface name="init_getrlimit" lineno="3720">
38605 <summary>
38606 Allow getting init_t rlimit
38607 </summary>
38608 @@ -116574,7 +118826,17 @@ Domain allowed access.
38609 </summary>
38610 </param>
38611 </interface>
38612 -<interface name="libs_manage_shared_libs" lineno="403">
38613 +<interface name="libs_manage_lib_symlinks" lineno="402">
38614 +<summary>
38615 +Manage generic symlinks in library directories.
38616 +</summary>
38617 +<param name="domain">
38618 +<summary>
38619 +Domain allowed access.
38620 +</summary>
38621 +</param>
38622 +</interface>
38623 +<interface name="libs_manage_shared_libs" lineno="421">
38624 <summary>
38625 Create, read, write, and delete shared libraries.
38626 </summary>
38627 @@ -116584,7 +118846,7 @@ Domain allowed access.
38628 </summary>
38629 </param>
38630 </interface>
38631 -<interface name="libs_use_shared_libs" lineno="421">
38632 +<interface name="libs_use_shared_libs" lineno="439">
38633 <summary>
38634 Load and execute functions from shared libraries.
38635 </summary>
38636 @@ -116594,7 +118856,7 @@ Domain allowed access.
38637 </summary>
38638 </param>
38639 </interface>
38640 -<interface name="libs_legacy_use_shared_libs" lineno="444">
38641 +<interface name="libs_legacy_use_shared_libs" lineno="462">
38642 <summary>
38643 Load and execute functions from shared libraries,
38644 with legacy support.
38645 @@ -116605,7 +118867,7 @@ Domain allowed access.
38646 </summary>
38647 </param>
38648 </interface>
38649 -<interface name="libs_relabel_shared_libs" lineno="465">
38650 +<interface name="libs_relabel_shared_libs" lineno="483">
38651 <summary>
38652 Relabel to and from the type used for
38653 shared libraries.
38654 @@ -116616,7 +118878,7 @@ Domain allowed access.
38655 </summary>
38656 </param>
38657 </interface>
38658 -<interface name="libs_generic_etc_filetrans_ld_so_cache" lineno="498">
38659 +<interface name="libs_generic_etc_filetrans_ld_so_cache" lineno="516">
38660 <summary>
38661 Create an object in etc with a type transition to
38662 the ld_so_cache_t type
38663 @@ -116639,7 +118901,7 @@ Name of the resource created for which a type transition occurs
38664 </summary>
38665 </param>
38666 </interface>
38667 -<interface name="libs_lib_filetrans" lineno="532">
38668 +<interface name="libs_lib_filetrans" lineno="550">
38669 <summary>
38670 Create an object in the generic lib location with a type transition
38671 to the provided type
38672 @@ -116665,7 +118927,7 @@ Name of the resource created for which a type transition should occur
38673 </summary>
38674 </param>
38675 </interface>
38676 -<interface name="libs_relabel_lib_dirs" lineno="553">
38677 +<interface name="libs_relabel_lib_dirs" lineno="571">
38678 <summary>
38679 Relabel to and from the type used
38680 for generic lib directories.
38681 @@ -116689,7 +118951,7 @@ Domain allowed to transition.
38682 </summary>
38683 </param>
38684 </interface>
38685 -<interface name="locallogin_read_state" lineno="35">
38686 +<interface name="locallogin_read_state" lineno="31">
38687 <summary>
38688 Allow calling domain to read locallogin state.
38689 </summary>
38690 @@ -116699,7 +118961,7 @@ Domain allowed permission.
38691 </summary>
38692 </param>
38693 </interface>
38694 -<interface name="locallogin_use_fds" lineno="56">
38695 +<interface name="locallogin_use_fds" lineno="52">
38696 <summary>
38697 Allow processes to inherit local login file descriptors.
38698 </summary>
38699 @@ -116709,7 +118971,7 @@ Domain allowed access.
38700 </summary>
38701 </param>
38702 </interface>
38703 -<interface name="locallogin_dontaudit_use_fds" lineno="74">
38704 +<interface name="locallogin_dontaudit_use_fds" lineno="70">
38705 <summary>
38706 Do not audit attempts to inherit local login file descriptors.
38707 </summary>
38708 @@ -116719,7 +118981,7 @@ Domain to not audit.
38709 </summary>
38710 </param>
38711 </interface>
38712 -<interface name="locallogin_signull" lineno="92">
38713 +<interface name="locallogin_signull" lineno="88">
38714 <summary>
38715 Send a null signal to local login processes.
38716 </summary>
38717 @@ -116729,7 +118991,7 @@ Domain allowed access.
38718 </summary>
38719 </param>
38720 </interface>
38721 -<interface name="locallogin_search_keys" lineno="110">
38722 +<interface name="locallogin_search_keys" lineno="106">
38723 <summary>
38724 Search for key.
38725 </summary>
38726 @@ -116739,7 +119001,7 @@ Domain allowed access.
38727 </summary>
38728 </param>
38729 </interface>
38730 -<interface name="locallogin_link_keys" lineno="128">
38731 +<interface name="locallogin_link_keys" lineno="124">
38732 <summary>
38733 Allow link to the local_login key ring.
38734 </summary>
38735 @@ -116749,7 +119011,7 @@ Domain allowed access.
38736 </summary>
38737 </param>
38738 </interface>
38739 -<interface name="locallogin_domtrans_sulogin" lineno="146">
38740 +<interface name="locallogin_domtrans_sulogin" lineno="142">
38741 <summary>
38742 Execute single-user logins in the single-user login domain.
38743 </summary>
38744 @@ -116961,7 +119223,7 @@ Type of the program to be used as an entry point to this domain.
38745 </summary>
38746 </param>
38747 </interface>
38748 -<interface name="logging_stream_connect_dispatcher" lineno="335">
38749 +<interface name="logging_stream_connect_dispatcher" lineno="337">
38750 <summary>
38751 Connect to the audit dispatcher over an unix stream socket.
38752 </summary>
38753 @@ -116971,7 +119233,7 @@ Domain allowed access.
38754 </summary>
38755 </param>
38756 </interface>
38757 -<interface name="logging_manage_audit_config" lineno="355">
38758 +<interface name="logging_manage_audit_config" lineno="357">
38759 <summary>
38760 Manage the auditd configuration files.
38761 </summary>
38762 @@ -116982,7 +119244,7 @@ Domain allowed access.
38763 </param>
38764 <rolecap/>
38765 </interface>
38766 -<interface name="logging_manage_audit_log" lineno="377">
38767 +<interface name="logging_manage_audit_log" lineno="379">
38768 <summary>
38769 Manage the audit log.
38770 </summary>
38771 @@ -116993,7 +119255,7 @@ Domain allowed access.
38772 </param>
38773 <rolecap/>
38774 </interface>
38775 -<interface name="logging_domtrans_klog" lineno="399">
38776 +<interface name="logging_domtrans_klog" lineno="401">
38777 <summary>
38778 Execute klogd in the klog domain.
38779 </summary>
38780 @@ -117003,7 +119265,7 @@ Domain allowed to transition.
38781 </summary>
38782 </param>
38783 </interface>
38784 -<interface name="logging_check_exec_syslog" lineno="418">
38785 +<interface name="logging_check_exec_syslog" lineno="420">
38786 <summary>
38787 Check if syslogd is executable.
38788 </summary>
38789 @@ -117013,7 +119275,7 @@ Domain allowed access.
38790 </summary>
38791 </param>
38792 </interface>
38793 -<interface name="logging_domtrans_syslog" lineno="437">
38794 +<interface name="logging_domtrans_syslog" lineno="439">
38795 <summary>
38796 Execute syslogd in the syslog domain.
38797 </summary>
38798 @@ -117023,7 +119285,7 @@ Domain allowed to transition.
38799 </summary>
38800 </param>
38801 </interface>
38802 -<interface name="logging_startstop_syslog" lineno="459">
38803 +<interface name="logging_startstop_syslog" lineno="461">
38804 <summary>
38805 Allow specified domain to start/stop syslog units
38806 </summary>
38807 @@ -117033,7 +119295,7 @@ Domain allowed access.
38808 </summary>
38809 </param>
38810 </interface>
38811 -<interface name="logging_status_syslog" lineno="478">
38812 +<interface name="logging_status_syslog" lineno="480">
38813 <summary>
38814 Allow specified domain to check status of syslog unit
38815 </summary>
38816 @@ -117043,7 +119305,7 @@ Domain allowed access.
38817 </summary>
38818 </param>
38819 </interface>
38820 -<interface name="logging_setattr_syslogd_tmp_files" lineno="498">
38821 +<interface name="logging_setattr_syslogd_tmp_files" lineno="500">
38822 <summary>
38823 Set the attributes of syslog temporary files.
38824 </summary>
38825 @@ -117054,7 +119316,7 @@ Domain allowed access.
38826 </param>
38827 <rolecap/>
38828 </interface>
38829 -<interface name="logging_audit_socket_activation" lineno="517">
38830 +<interface name="logging_audit_socket_activation" lineno="519">
38831 <summary>
38832 Allow the domain to create the audit socket
38833 for syslogd.
38834 @@ -117065,7 +119327,7 @@ Domain allowed access.
38835 </summary>
38836 </param>
38837 </interface>
38838 -<interface name="logging_relabel_syslogd_tmp_files" lineno="536">
38839 +<interface name="logging_relabel_syslogd_tmp_files" lineno="538">
38840 <summary>
38841 Relabel to and from syslog temporary file type.
38842 </summary>
38843 @@ -117076,7 +119338,7 @@ Domain allowed access.
38844 </param>
38845 <rolecap/>
38846 </interface>
38847 -<interface name="logging_setattr_syslogd_tmp_dirs" lineno="555">
38848 +<interface name="logging_setattr_syslogd_tmp_dirs" lineno="557">
38849 <summary>
38850 Set the attributes of syslog temporary directories.
38851 </summary>
38852 @@ -117087,7 +119349,7 @@ Domain allowed access.
38853 </param>
38854 <rolecap/>
38855 </interface>
38856 -<interface name="logging_relabel_syslogd_tmp_dirs" lineno="574">
38857 +<interface name="logging_relabel_syslogd_tmp_dirs" lineno="576">
38858 <summary>
38859 Relabel to and from syslog temporary directory type.
38860 </summary>
38861 @@ -117098,7 +119360,7 @@ Domain allowed access.
38862 </param>
38863 <rolecap/>
38864 </interface>
38865 -<interface name="logging_log_filetrans" lineno="635">
38866 +<interface name="logging_log_filetrans" lineno="637">
38867 <summary>
38868 Create an object in the log directory, with a private type.
38869 </summary>
38870 @@ -117151,7 +119413,7 @@ The name of the object being created.
38871 </param>
38872 <infoflow type="write" weight="10"/>
38873 </interface>
38874 -<interface name="logging_send_syslog_msg" lineno="677">
38875 +<interface name="logging_send_syslog_msg" lineno="679">
38876 <summary>
38877 Send system log messages.
38878 </summary>
38879 @@ -117183,7 +119445,7 @@ Domain allowed access.
38880 </summary>
38881 </param>
38882 </interface>
38883 -<interface name="logging_use_syslogd_fd" lineno="719">
38884 +<interface name="logging_use_syslogd_fd" lineno="721">
38885 <summary>
38886 Allow domain to use a file descriptor
38887 from syslogd.
38888 @@ -117194,7 +119456,7 @@ Domain allowed access.
38889 </summary>
38890 </param>
38891 </interface>
38892 -<interface name="logging_relabelto_devlog_sock_files" lineno="738">
38893 +<interface name="logging_relabelto_devlog_sock_files" lineno="740">
38894 <summary>
38895 Allow domain to relabelto devlog sock_files
38896 </summary>
38897 @@ -117205,7 +119467,7 @@ Domain allowed access.
38898 </param>
38899 <rolecap/>
38900 </interface>
38901 -<interface name="logging_create_devlog" lineno="756">
38902 +<interface name="logging_create_devlog" lineno="758">
38903 <summary>
38904 Connect to the syslog control unix stream socket.
38905 </summary>
38906 @@ -117215,7 +119477,7 @@ Domain allowed access.
38907 </summary>
38908 </param>
38909 </interface>
38910 -<interface name="logging_read_audit_config" lineno="777">
38911 +<interface name="logging_read_audit_config" lineno="779">
38912 <summary>
38913 Read the auditd configuration files.
38914 </summary>
38915 @@ -117226,7 +119488,7 @@ Domain allowed access.
38916 </param>
38917 <rolecap/>
38918 </interface>
38919 -<interface name="logging_dontaudit_search_audit_config" lineno="800">
38920 +<interface name="logging_dontaudit_search_audit_config" lineno="802">
38921 <summary>
38922 dontaudit search of auditd configuration files.
38923 </summary>
38924 @@ -117237,7 +119499,7 @@ Domain to not audit.
38925 </param>
38926 <rolecap/>
38927 </interface>
38928 -<interface name="logging_read_syslog_config" lineno="819">
38929 +<interface name="logging_read_syslog_config" lineno="821">
38930 <summary>
38931 Read syslog configuration files.
38932 </summary>
38933 @@ -117248,7 +119510,7 @@ Domain allowed access.
38934 </param>
38935 <rolecap/>
38936 </interface>
38937 -<interface name="logging_watch_runtime_dirs" lineno="837">
38938 +<interface name="logging_watch_runtime_dirs" lineno="839">
38939 <summary>
38940 Watch syslog runtime dirs.
38941 </summary>
38942 @@ -117258,7 +119520,7 @@ Domain allowed access.
38943 </summary>
38944 </param>
38945 </interface>
38946 -<interface name="logging_delete_devlog_socket" lineno="856">
38947 +<interface name="logging_delete_devlog_socket" lineno="858">
38948 <summary>
38949 Delete the syslog socket files
38950 </summary>
38951 @@ -117269,7 +119531,7 @@ Domain allowed access
38952 </param>
38953 <rolecap/>
38954 </interface>
38955 -<interface name="logging_manage_pid_sockets" lineno="874">
38956 +<interface name="logging_manage_pid_sockets" lineno="876">
38957 <summary>
38958 Create, read, write, and delete syslog PID sockets. (Deprecated)
38959 </summary>
38960 @@ -117279,7 +119541,7 @@ Domain allowed access.
38961 </summary>
38962 </param>
38963 </interface>
38964 -<interface name="logging_manage_runtime_sockets" lineno="889">
38965 +<interface name="logging_manage_runtime_sockets" lineno="891">
38966 <summary>
38967 Create, read, write, and delete syslog PID sockets.
38968 </summary>
38969 @@ -117289,7 +119551,7 @@ Domain allowed access.
38970 </summary>
38971 </param>
38972 </interface>
38973 -<interface name="logging_search_logs" lineno="910">
38974 +<interface name="logging_search_logs" lineno="912">
38975 <summary>
38976 Allows the domain to open a file in the
38977 log directory, but does not allow the listing
38978 @@ -117301,7 +119563,7 @@ Domain allowed access.
38979 </summary>
38980 </param>
38981 </interface>
38982 -<interface name="logging_dontaudit_search_logs" lineno="930">
38983 +<interface name="logging_dontaudit_search_logs" lineno="932">
38984 <summary>
38985 Do not audit attempts to search the var log directory.
38986 </summary>
38987 @@ -117311,7 +119573,7 @@ Domain not to audit.
38988 </summary>
38989 </param>
38990 </interface>
38991 -<interface name="logging_list_logs" lineno="948">
38992 +<interface name="logging_list_logs" lineno="950">
38993 <summary>
38994 List the contents of the generic log directory (/var/log).
38995 </summary>
38996 @@ -117321,7 +119583,7 @@ Domain allowed access.
38997 </summary>
38998 </param>
38999 </interface>
39000 -<interface name="logging_rw_generic_log_dirs" lineno="968">
39001 +<interface name="logging_rw_generic_log_dirs" lineno="970">
39002 <summary>
39003 Read and write the generic log directory (/var/log).
39004 </summary>
39005 @@ -117331,7 +119593,7 @@ Domain allowed access.
39006 </summary>
39007 </param>
39008 </interface>
39009 -<interface name="logging_search_all_logs" lineno="989">
39010 +<interface name="logging_search_all_logs" lineno="991">
39011 <summary>
39012 Search through all log dirs.
39013 </summary>
39014 @@ -117342,7 +119604,7 @@ Domain allowed access.
39015 </param>
39016 <rolecap/>
39017 </interface>
39018 -<interface name="logging_setattr_all_log_dirs" lineno="1008">
39019 +<interface name="logging_setattr_all_log_dirs" lineno="1010">
39020 <summary>
39021 Set attributes on all log dirs.
39022 </summary>
39023 @@ -117353,7 +119615,7 @@ Domain allowed access.
39024 </param>
39025 <rolecap/>
39026 </interface>
39027 -<interface name="logging_dontaudit_getattr_all_logs" lineno="1027">
39028 +<interface name="logging_dontaudit_getattr_all_logs" lineno="1029">
39029 <summary>
39030 Do not audit attempts to get the attributes
39031 of any log files.
39032 @@ -117364,7 +119626,7 @@ Domain to not audit.
39033 </summary>
39034 </param>
39035 </interface>
39036 -<interface name="logging_getattr_all_logs" lineno="1045">
39037 +<interface name="logging_getattr_all_logs" lineno="1047">
39038 <summary>
39039 Read the attributes of any log file
39040 </summary>
39041 @@ -117374,7 +119636,7 @@ Domain allowed access
39042 </summary>
39043 </param>
39044 </interface>
39045 -<interface name="logging_append_all_logs" lineno="1063">
39046 +<interface name="logging_append_all_logs" lineno="1065">
39047 <summary>
39048 Append to all log files.
39049 </summary>
39050 @@ -117384,7 +119646,7 @@ Domain allowed access.
39051 </summary>
39052 </param>
39053 </interface>
39054 -<interface name="logging_append_all_inherited_logs" lineno="1084">
39055 +<interface name="logging_append_all_inherited_logs" lineno="1086">
39056 <summary>
39057 Append to all log files.
39058 </summary>
39059 @@ -117394,7 +119656,7 @@ Domain allowed access.
39060 </summary>
39061 </param>
39062 </interface>
39063 -<interface name="logging_read_all_logs" lineno="1103">
39064 +<interface name="logging_read_all_logs" lineno="1105">
39065 <summary>
39066 Read all log files.
39067 </summary>
39068 @@ -117405,7 +119667,7 @@ Domain allowed access.
39069 </param>
39070 <rolecap/>
39071 </interface>
39072 -<interface name="logging_watch_all_logs" lineno="1124">
39073 +<interface name="logging_watch_all_logs" lineno="1126">
39074 <summary>
39075 Watch all log files.
39076 </summary>
39077 @@ -117416,7 +119678,7 @@ Domain allowed access.
39078 </param>
39079 <rolecap/>
39080 </interface>
39081 -<interface name="logging_exec_all_logs" lineno="1144">
39082 +<interface name="logging_exec_all_logs" lineno="1146">
39083 <summary>
39084 Execute all log files in the caller domain.
39085 </summary>
39086 @@ -117426,7 +119688,7 @@ Domain allowed access.
39087 </summary>
39088 </param>
39089 </interface>
39090 -<interface name="logging_rw_all_logs" lineno="1164">
39091 +<interface name="logging_rw_all_logs" lineno="1166">
39092 <summary>
39093 read/write to all log files.
39094 </summary>
39095 @@ -117436,7 +119698,7 @@ Domain allowed access.
39096 </summary>
39097 </param>
39098 </interface>
39099 -<interface name="logging_manage_all_logs" lineno="1184">
39100 +<interface name="logging_manage_all_logs" lineno="1186">
39101 <summary>
39102 Create, read, write, and delete all log files.
39103 </summary>
39104 @@ -117447,7 +119709,7 @@ Domain allowed access.
39105 </param>
39106 <rolecap/>
39107 </interface>
39108 -<interface name="logging_manage_generic_log_dirs" lineno="1205">
39109 +<interface name="logging_manage_generic_log_dirs" lineno="1207">
39110 <summary>
39111 Create, read, write, and delete generic log directories.
39112 </summary>
39113 @@ -117458,7 +119720,7 @@ Domain allowed access.
39114 </param>
39115 <rolecap/>
39116 </interface>
39117 -<interface name="logging_relabel_generic_log_dirs" lineno="1225">
39118 +<interface name="logging_relabel_generic_log_dirs" lineno="1227">
39119 <summary>
39120 Relabel from and to generic log directory type.
39121 </summary>
39122 @@ -117469,7 +119731,7 @@ Domain allowed access.
39123 </param>
39124 <rolecap/>
39125 </interface>
39126 -<interface name="logging_read_generic_logs" lineno="1245">
39127 +<interface name="logging_read_generic_logs" lineno="1247">
39128 <summary>
39129 Read generic log files.
39130 </summary>
39131 @@ -117480,7 +119742,7 @@ Domain allowed access.
39132 </param>
39133 <rolecap/>
39134 </interface>
39135 -<interface name="logging_mmap_generic_logs" lineno="1266">
39136 +<interface name="logging_mmap_generic_logs" lineno="1268">
39137 <summary>
39138 Map generic log files.
39139 </summary>
39140 @@ -117491,7 +119753,7 @@ Domain allowed access.
39141 </param>
39142 <rolecap/>
39143 </interface>
39144 -<interface name="logging_write_generic_logs" lineno="1284">
39145 +<interface name="logging_write_generic_logs" lineno="1286">
39146 <summary>
39147 Write generic log files.
39148 </summary>
39149 @@ -117501,7 +119763,7 @@ Domain allowed access.
39150 </summary>
39151 </param>
39152 </interface>
39153 -<interface name="logging_dontaudit_write_generic_logs" lineno="1305">
39154 +<interface name="logging_dontaudit_write_generic_logs" lineno="1307">
39155 <summary>
39156 Dontaudit Write generic log files.
39157 </summary>
39158 @@ -117511,7 +119773,7 @@ Domain to not audit.
39159 </summary>
39160 </param>
39161 </interface>
39162 -<interface name="logging_rw_generic_logs" lineno="1323">
39163 +<interface name="logging_rw_generic_logs" lineno="1325">
39164 <summary>
39165 Read and write generic log files.
39166 </summary>
39167 @@ -117521,7 +119783,7 @@ Domain allowed access.
39168 </summary>
39169 </param>
39170 </interface>
39171 -<interface name="logging_manage_generic_logs" lineno="1346">
39172 +<interface name="logging_manage_generic_logs" lineno="1348">
39173 <summary>
39174 Create, read, write, and delete
39175 generic log files.
39176 @@ -117533,7 +119795,7 @@ Domain allowed access.
39177 </param>
39178 <rolecap/>
39179 </interface>
39180 -<interface name="logging_watch_generic_logs_dir" lineno="1365">
39181 +<interface name="logging_watch_generic_logs_dir" lineno="1367">
39182 <summary>
39183 Watch generic log dirs.
39184 </summary>
39185 @@ -117543,7 +119805,7 @@ Domain allowed access.
39186 </summary>
39187 </param>
39188 </interface>
39189 -<interface name="logging_admin_audit" lineno="1390">
39190 +<interface name="logging_admin_audit" lineno="1392">
39191 <summary>
39192 All of the rules required to administrate
39193 the audit environment
39194 @@ -117560,7 +119822,7 @@ User role allowed access.
39195 </param>
39196 <rolecap/>
39197 </interface>
39198 -<interface name="logging_admin_syslog" lineno="1434">
39199 +<interface name="logging_admin_syslog" lineno="1436">
39200 <summary>
39201 All of the rules required to administrate
39202 the syslog environment
39203 @@ -117577,7 +119839,7 @@ User role allowed access.
39204 </param>
39205 <rolecap/>
39206 </interface>
39207 -<interface name="logging_admin" lineno="1490">
39208 +<interface name="logging_admin" lineno="1492">
39209 <summary>
39210 All of the rules required to administrate
39211 the logging environment
39212 @@ -117594,7 +119856,7 @@ User role allowed access.
39213 </param>
39214 <rolecap/>
39215 </interface>
39216 -<interface name="logging_syslog_managed_log_file" lineno="1513">
39217 +<interface name="logging_syslog_managed_log_file" lineno="1515">
39218 <summary>
39219 Mark the type as a syslog managed log file
39220 and introduce the proper file transition when
39221 @@ -117612,7 +119874,7 @@ Name to use for the file
39222 </summary>
39223 </param>
39224 </interface>
39225 -<interface name="logging_syslog_managed_log_dir" lineno="1552">
39226 +<interface name="logging_syslog_managed_log_dir" lineno="1554">
39227 <summary>
39228 Mark the type as a syslog managed log dir
39229 and introduce the proper file transition when
39230 @@ -117639,7 +119901,7 @@ Name to use for the directory
39231 </summary>
39232 </param>
39233 </interface>
39234 -<interface name="logging_mmap_journal" lineno="1574">
39235 +<interface name="logging_mmap_journal" lineno="1576">
39236 <summary>
39237 Map files in /run/log/journal/ directory.
39238 </summary>
39239 @@ -118082,7 +120344,17 @@ Domain allowed access.
39240 </summary>
39241 </param>
39242 </interface>
39243 -<interface name="miscfiles_setattr_localization" lineno="529">
39244 +<interface name="miscfiles_getattr_localization" lineno="529">
39245 +<summary>
39246 +Allow process to get the attributes of localization info
39247 +</summary>
39248 +<param name="domain">
39249 +<summary>
39250 +Domain allowed access.
39251 +</summary>
39252 +</param>
39253 +</interface>
39254 +<interface name="miscfiles_setattr_localization" lineno="549">
39255 <summary>
39256 Allow process to setattr localization info
39257 </summary>
39258 @@ -118092,7 +120364,7 @@ Domain allowed access.
39259 </summary>
39260 </param>
39261 </interface>
39262 -<interface name="miscfiles_read_localization" lineno="561">
39263 +<interface name="miscfiles_read_localization" lineno="581">
39264 <summary>
39265 Allow process to read localization information.
39266 </summary>
39267 @@ -118114,7 +120386,7 @@ Domain allowed access.
39268 </param>
39269 <infoflow type="read" weight="10"/>
39270 </interface>
39271 -<interface name="miscfiles_rw_localization" lineno="584">
39272 +<interface name="miscfiles_rw_localization" lineno="604">
39273 <summary>
39274 Allow process to write localization info
39275 </summary>
39276 @@ -118124,7 +120396,7 @@ Domain allowed access.
39277 </summary>
39278 </param>
39279 </interface>
39280 -<interface name="miscfiles_relabel_localization" lineno="604">
39281 +<interface name="miscfiles_relabel_localization" lineno="624">
39282 <summary>
39283 Allow process to relabel localization info
39284 </summary>
39285 @@ -118134,7 +120406,7 @@ Domain allowed access.
39286 </summary>
39287 </param>
39288 </interface>
39289 -<interface name="miscfiles_legacy_read_localization" lineno="623">
39290 +<interface name="miscfiles_legacy_read_localization" lineno="643">
39291 <summary>
39292 Allow process to read legacy time localization info
39293 </summary>
39294 @@ -118144,7 +120416,7 @@ Domain allowed access.
39295 </summary>
39296 </param>
39297 </interface>
39298 -<interface name="miscfiles_watch_localization" lineno="642">
39299 +<interface name="miscfiles_watch_localization" lineno="662">
39300 <summary>
39301 Watch time localization info
39302 </summary>
39303 @@ -118154,7 +120426,7 @@ Domain allowed access.
39304 </summary>
39305 </param>
39306 </interface>
39307 -<interface name="miscfiles_search_man_pages" lineno="660">
39308 +<interface name="miscfiles_search_man_pages" lineno="680">
39309 <summary>
39310 Search man pages.
39311 </summary>
39312 @@ -118164,7 +120436,7 @@ Domain allowed access.
39313 </summary>
39314 </param>
39315 </interface>
39316 -<interface name="miscfiles_dontaudit_search_man_pages" lineno="679">
39317 +<interface name="miscfiles_dontaudit_search_man_pages" lineno="699">
39318 <summary>
39319 Do not audit attempts to search man pages.
39320 </summary>
39321 @@ -118174,7 +120446,7 @@ Domain to not audit.
39322 </summary>
39323 </param>
39324 </interface>
39325 -<interface name="miscfiles_read_man_pages" lineno="698">
39326 +<interface name="miscfiles_read_man_pages" lineno="718">
39327 <summary>
39328 Read man pages
39329 </summary>
39330 @@ -118185,7 +120457,7 @@ Domain allowed access.
39331 </param>
39332 <rolecap/>
39333 </interface>
39334 -<interface name="miscfiles_delete_man_pages" lineno="720">
39335 +<interface name="miscfiles_delete_man_pages" lineno="740">
39336 <summary>
39337 Delete man pages
39338 </summary>
39339 @@ -118195,7 +120467,7 @@ Domain allowed access.
39340 </summary>
39341 </param>
39342 </interface>
39343 -<interface name="miscfiles_manage_man_pages" lineno="742">
39344 +<interface name="miscfiles_manage_man_pages" lineno="762">
39345 <summary>
39346 Create, read, write, and delete man pages
39347 </summary>
39348 @@ -118205,7 +120477,7 @@ Domain allowed access.
39349 </summary>
39350 </param>
39351 </interface>
39352 -<interface name="miscfiles_read_man_cache" lineno="763">
39353 +<interface name="miscfiles_read_man_cache" lineno="783">
39354 <summary>
39355 Read man cache content.
39356 </summary>
39357 @@ -118215,7 +120487,7 @@ Domain allowed access.
39358 </summary>
39359 </param>
39360 </interface>
39361 -<interface name="miscfiles_map_man_cache" lineno="784">
39362 +<interface name="miscfiles_map_man_cache" lineno="804">
39363 <summary>
39364 Map man cache content.
39365 </summary>
39366 @@ -118225,7 +120497,7 @@ Domain allowed access.
39367 </summary>
39368 </param>
39369 </interface>
39370 -<interface name="miscfiles_manage_man_cache" lineno="803">
39371 +<interface name="miscfiles_manage_man_cache" lineno="823">
39372 <summary>
39373 Create, read, write, and delete
39374 man cache content.
39375 @@ -118236,7 +120508,7 @@ Domain allowed access.
39376 </summary>
39377 </param>
39378 </interface>
39379 -<interface name="miscfiles_relabel_man_cache" lineno="824">
39380 +<interface name="miscfiles_relabel_man_cache" lineno="844">
39381 <summary>
39382 Relabel from and to man cache.
39383 </summary>
39384 @@ -118246,7 +120518,7 @@ Domain allowed access.
39385 </summary>
39386 </param>
39387 </interface>
39388 -<interface name="miscfiles_read_public_files" lineno="845">
39389 +<interface name="miscfiles_read_public_files" lineno="865">
39390 <summary>
39391 Read public files used for file
39392 transfer services.
39393 @@ -118258,7 +120530,7 @@ Domain allowed access.
39394 </param>
39395 <rolecap/>
39396 </interface>
39397 -<interface name="miscfiles_manage_public_files" lineno="867">
39398 +<interface name="miscfiles_manage_public_files" lineno="887">
39399 <summary>
39400 Create, read, write, and delete public files
39401 and directories used for file transfer services.
39402 @@ -118270,7 +120542,7 @@ Domain allowed access.
39403 </param>
39404 <rolecap/>
39405 </interface>
39406 -<interface name="miscfiles_watch_public_dirs" lineno="887">
39407 +<interface name="miscfiles_watch_public_dirs" lineno="907">
39408 <summary>
39409 Watch public files
39410 </summary>
39411 @@ -118280,7 +120552,7 @@ Domain allowed access.
39412 </summary>
39413 </param>
39414 </interface>
39415 -<interface name="miscfiles_read_tetex_data" lineno="905">
39416 +<interface name="miscfiles_read_tetex_data" lineno="925">
39417 <summary>
39418 Read TeX data
39419 </summary>
39420 @@ -118290,7 +120562,7 @@ Domain allowed access.
39421 </summary>
39422 </param>
39423 </interface>
39424 -<interface name="miscfiles_exec_tetex_data" lineno="929">
39425 +<interface name="miscfiles_exec_tetex_data" lineno="949">
39426 <summary>
39427 Execute TeX data programs in the caller domain.
39428 </summary>
39429 @@ -118300,7 +120572,7 @@ Domain allowed access.
39430 </summary>
39431 </param>
39432 </interface>
39433 -<interface name="miscfiles_domain_entry_test_files" lineno="953">
39434 +<interface name="miscfiles_domain_entry_test_files" lineno="973">
39435 <summary>
39436 Let test files be an entry point for
39437 a specified domain.
39438 @@ -118311,7 +120583,7 @@ Domain allowed access.
39439 </summary>
39440 </param>
39441 </interface>
39442 -<interface name="miscfiles_read_test_files" lineno="971">
39443 +<interface name="miscfiles_read_test_files" lineno="991">
39444 <summary>
39445 Read test files and directories.
39446 </summary>
39447 @@ -118321,7 +120593,7 @@ Domain allowed access.
39448 </summary>
39449 </param>
39450 </interface>
39451 -<interface name="miscfiles_exec_test_files" lineno="990">
39452 +<interface name="miscfiles_exec_test_files" lineno="1010">
39453 <summary>
39454 Execute test files.
39455 </summary>
39456 @@ -118331,7 +120603,7 @@ Domain allowed access.
39457 </summary>
39458 </param>
39459 </interface>
39460 -<interface name="miscfiles_etc_filetrans_localization" lineno="1010">
39461 +<interface name="miscfiles_etc_filetrans_localization" lineno="1030">
39462 <summary>
39463 Create files in etc directories
39464 with localization file type.
39465 @@ -118342,7 +120614,7 @@ Domain allowed access.
39466 </summary>
39467 </param>
39468 </interface>
39469 -<interface name="miscfiles_manage_localization" lineno="1030">
39470 +<interface name="miscfiles_manage_localization" lineno="1050">
39471 <summary>
39472 Create, read, write, and delete localization
39473 </summary>
39474 @@ -119906,7 +122178,44 @@ Domain allowed access.
39475 </param>
39476 <rolecap/>
39477 </interface>
39478 -<interface name="sysnet_read_dhcp_config" lineno="731">
39479 +<interface name="sysnet_create_netns_dirs" lineno="732">
39480 +<summary>
39481 +Create the /run/netns directory with
39482 +an automatic type transition.
39483 +</summary>
39484 +<param name="domain">
39485 +<summary>
39486 +Domain allowed access.
39487 +</summary>
39488 +</param>
39489 +</interface>
39490 +<interface name="sysnet_netns_filetrans" lineno="766">
39491 +<summary>
39492 +Create an object in the /run/netns
39493 +directory with a private type.
39494 +</summary>
39495 +<param name="domain">
39496 +<summary>
39497 +Domain allowed access.
39498 +</summary>
39499 +</param>
39500 +<param name="private type">
39501 +<summary>
39502 +The type of the object to be created.
39503 +</summary>
39504 +</param>
39505 +<param name="object">
39506 +<summary>
39507 +The object class of the object being created.
39508 +</summary>
39509 +</param>
39510 +<param name="name" optional="true">
39511 +<summary>
39512 +The name of the object being created.
39513 +</summary>
39514 +</param>
39515 +</interface>
39516 +<interface name="sysnet_read_dhcp_config" lineno="787">
39517 <summary>
39518 Read the DHCP configuration files.
39519 </summary>
39520 @@ -119916,7 +122225,7 @@ Domain allowed access.
39521 </summary>
39522 </param>
39523 </interface>
39524 -<interface name="sysnet_search_dhcp_state" lineno="751">
39525 +<interface name="sysnet_search_dhcp_state" lineno="807">
39526 <summary>
39527 Search the DHCP state data directory.
39528 </summary>
39529 @@ -119926,7 +122235,7 @@ Domain allowed access.
39530 </summary>
39531 </param>
39532 </interface>
39533 -<interface name="sysnet_dhcp_state_filetrans" lineno="795">
39534 +<interface name="sysnet_dhcp_state_filetrans" lineno="851">
39535 <summary>
39536 Create DHCP state data.
39537 </summary>
39538 @@ -119961,7 +122270,7 @@ The name of the object being created.
39539 </summary>
39540 </param>
39541 </interface>
39542 -<interface name="sysnet_dns_name_resolve" lineno="815">
39543 +<interface name="sysnet_dns_name_resolve" lineno="871">
39544 <summary>
39545 Perform a DNS name resolution.
39546 </summary>
39547 @@ -119972,7 +122281,7 @@ Domain allowed access.
39548 </param>
39549 <rolecap/>
39550 </interface>
39551 -<interface name="sysnet_use_ldap" lineno="865">
39552 +<interface name="sysnet_use_ldap" lineno="921">
39553 <summary>
39554 Connect and use a LDAP server.
39555 </summary>
39556 @@ -119982,7 +122291,7 @@ Domain allowed access.
39557 </summary>
39558 </param>
39559 </interface>
39560 -<interface name="sysnet_use_portmap" lineno="892">
39561 +<interface name="sysnet_use_portmap" lineno="948">
39562 <summary>
39563 Connect and use remote port mappers.
39564 </summary>
39565 @@ -119992,7 +122301,7 @@ Domain allowed access.
39566 </summary>
39567 </param>
39568 </interface>
39569 -<interface name="sysnet_dhcpc_script_entry" lineno="926">
39570 +<interface name="sysnet_dhcpc_script_entry" lineno="982">
39571 <summary>
39572 Make the specified program domain
39573 accessable from the DHCP hooks/scripts.
39574 @@ -120044,7 +122353,7 @@ The type for the user pty
39575 </summary>
39576 </param>
39577 </template>
39578 -<template name="systemd_user_daemon_domain" lineno="194">
39579 +<template name="systemd_user_daemon_domain" lineno="205">
39580 <summary>
39581 Allow the specified domain to be started as a daemon by the
39582 specified systemd user instance.
39583 @@ -120065,7 +122374,7 @@ Domain to allow the systemd user domain to run.
39584 </summary>
39585 </param>
39586 </template>
39587 -<interface name="systemd_user_activated_sock_file" lineno="215">
39588 +<interface name="systemd_user_activated_sock_file" lineno="226">
39589 <summary>
39590 Associate the specified file type to be a type whose sock files
39591 can be managed by systemd user instances for socket activation.
39592 @@ -120076,7 +122385,7 @@ File type to be associated.
39593 </summary>
39594 </param>
39595 </interface>
39596 -<interface name="systemd_user_unix_stream_activated_socket" lineno="240">
39597 +<interface name="systemd_user_unix_stream_activated_socket" lineno="251">
39598 <summary>
39599 Associate the specified domain to be a domain whose unix stream
39600 sockets and sock files can be managed by systemd user instances
39601 @@ -120093,7 +122402,24 @@ File type of the domain's sock files to be associated.
39602 </summary>
39603 </param>
39604 </interface>
39605 -<template name="systemd_user_app_status" lineno="265">
39606 +<template name="systemd_user_send_systemd_notify" lineno="277">
39607 +<summary>
39608 +Allow the target domain the permissions necessary
39609 +to use systemd notify when started by the specified
39610 +systemd user instance.
39611 +</summary>
39612 +<param name="prefix">
39613 +<summary>
39614 +Prefix for the user domain.
39615 +</summary>
39616 +</param>
39617 +<param name="domain">
39618 +<summary>
39619 +Domain to be allowed systemd notify permissions.
39620 +</summary>
39621 +</param>
39622 +</template>
39623 +<template name="systemd_user_app_status" lineno="305">
39624 <summary>
39625 Allow the target domain to be monitored and have its output
39626 captured by the specified systemd user instance domain.
39627 @@ -120109,7 +122435,87 @@ Domain to allow the systemd user instance to monitor.
39628 </summary>
39629 </param>
39630 </template>
39631 -<interface name="systemd_search_conf_home_content" lineno="300">
39632 +<template name="systemd_read_user_manager_state" lineno="345">
39633 +<summary>
39634 +Read the process state (/proc/pid) of
39635 +the specified systemd user instance.
39636 +</summary>
39637 +<param name="prefix">
39638 +<summary>
39639 +Prefix for the user domain.
39640 +</summary>
39641 +</param>
39642 +<param name="domain">
39643 +<summary>
39644 +Domain allowed access.
39645 +</summary>
39646 +</param>
39647 +</template>
39648 +<template name="systemd_user_manager_system_start" lineno="369">
39649 +<summary>
39650 +Send a start request to the specified
39651 +systemd user instance system object.
39652 +</summary>
39653 +<param name="prefix">
39654 +<summary>
39655 +Prefix for the user domain.
39656 +</summary>
39657 +</param>
39658 +<param name="domain">
39659 +<summary>
39660 +Domain allowed access.
39661 +</summary>
39662 +</param>
39663 +</template>
39664 +<template name="systemd_user_manager_system_stop" lineno="393">
39665 +<summary>
39666 +Send a stop request to the specified
39667 +systemd user instance system object.
39668 +</summary>
39669 +<param name="prefix">
39670 +<summary>
39671 +Prefix for the user domain.
39672 +</summary>
39673 +</param>
39674 +<param name="domain">
39675 +<summary>
39676 +Domain allowed access.
39677 +</summary>
39678 +</param>
39679 +</template>
39680 +<template name="systemd_user_manager_system_status" lineno="417">
39681 +<summary>
39682 +Get the status of the specified
39683 +systemd user instance system object.
39684 +</summary>
39685 +<param name="prefix">
39686 +<summary>
39687 +Prefix for the user domain.
39688 +</summary>
39689 +</param>
39690 +<param name="domain">
39691 +<summary>
39692 +Domain allowed access.
39693 +</summary>
39694 +</param>
39695 +</template>
39696 +<template name="systemd_user_manager_dbus_chat" lineno="441">
39697 +<summary>
39698 +Send and receive messages from the
39699 +specified systemd user instance over dbus.
39700 +</summary>
39701 +<param name="prefix">
39702 +<summary>
39703 +Prefix for the user domain.
39704 +</summary>
39705 +</param>
39706 +<param name="domain">
39707 +<summary>
39708 +Domain allowed access.
39709 +</summary>
39710 +</param>
39711 +</template>
39712 +<interface name="systemd_search_conf_home_content" lineno="462">
39713 <summary>
39714 Allow the specified domain to search systemd config home
39715 content.
39716 @@ -120120,7 +122526,7 @@ Domain allowed access.
39717 </summary>
39718 </param>
39719 </interface>
39720 -<interface name="systemd_manage_conf_home_content" lineno="319">
39721 +<interface name="systemd_manage_conf_home_content" lineno="481">
39722 <summary>
39723 Allow the specified domain to manage systemd config home
39724 content.
39725 @@ -120131,7 +122537,7 @@ Domain allowed access.
39726 </summary>
39727 </param>
39728 </interface>
39729 -<interface name="systemd_relabel_conf_home_content" lineno="340">
39730 +<interface name="systemd_relabel_conf_home_content" lineno="502">
39731 <summary>
39732 Allow the specified domain to relabel systemd config home
39733 content.
39734 @@ -120142,7 +122548,7 @@ Domain allowed access.
39735 </summary>
39736 </param>
39737 </interface>
39738 -<interface name="systemd_search_data_home_content" lineno="361">
39739 +<interface name="systemd_search_data_home_content" lineno="523">
39740 <summary>
39741 Allow the specified domain to search systemd data home
39742 content.
39743 @@ -120153,7 +122559,7 @@ Domain allowed access.
39744 </summary>
39745 </param>
39746 </interface>
39747 -<interface name="systemd_manage_data_home_content" lineno="380">
39748 +<interface name="systemd_manage_data_home_content" lineno="542">
39749 <summary>
39750 Allow the specified domain to manage systemd data home
39751 content.
39752 @@ -120164,7 +122570,7 @@ Domain allowed access.
39753 </summary>
39754 </param>
39755 </interface>
39756 -<interface name="systemd_relabel_data_home_content" lineno="401">
39757 +<interface name="systemd_relabel_data_home_content" lineno="563">
39758 <summary>
39759 Allow the specified domain to relabel systemd data home
39760 content.
39761 @@ -120175,7 +122581,7 @@ Domain allowed access.
39762 </summary>
39763 </param>
39764 </interface>
39765 -<interface name="systemd_search_user_runtime" lineno="422">
39766 +<interface name="systemd_search_user_runtime" lineno="584">
39767 <summary>
39768 Allow the specified domain to search systemd user runtime
39769 content.
39770 @@ -120186,7 +122592,7 @@ Domain allowed access.
39771 </summary>
39772 </param>
39773 </interface>
39774 -<interface name="systemd_read_user_runtime_files" lineno="440">
39775 +<interface name="systemd_read_user_runtime_files" lineno="602">
39776 <summary>
39777 Allow the specified domain to read systemd user runtime files.
39778 </summary>
39779 @@ -120196,7 +122602,7 @@ Domain allowed access.
39780 </summary>
39781 </param>
39782 </interface>
39783 -<interface name="systemd_read_user_runtime_lnk_files" lineno="458">
39784 +<interface name="systemd_read_user_runtime_lnk_files" lineno="620">
39785 <summary>
39786 Allow the specified domain to read systemd user runtime lnk files.
39787 </summary>
39788 @@ -120206,7 +122612,18 @@ Domain allowed access.
39789 </summary>
39790 </param>
39791 </interface>
39792 -<interface name="systemd_read_user_unit_files" lineno="477">
39793 +<interface name="systemd_write_user_runtime_socket" lineno="639">
39794 +<summary>
39795 +Allow the specified domain to write to
39796 +the systemd user runtime named socket.
39797 +</summary>
39798 +<param name="domain">
39799 +<summary>
39800 +Domain allowed access.
39801 +</summary>
39802 +</param>
39803 +</interface>
39804 +<interface name="systemd_read_user_unit_files" lineno="658">
39805 <summary>
39806 Allow the specified domain to read system-wide systemd
39807 user unit files.
39808 @@ -120217,7 +122634,7 @@ Domain allowed access.
39809 </summary>
39810 </param>
39811 </interface>
39812 -<interface name="systemd_read_user_runtime_units" lineno="497">
39813 +<interface name="systemd_read_user_runtime_units" lineno="678">
39814 <summary>
39815 Allow the specified domain to read systemd user runtime unit files.
39816 </summary>
39817 @@ -120227,7 +122644,7 @@ Domain allowed access.
39818 </summary>
39819 </param>
39820 </interface>
39821 -<interface name="systemd_search_user_runtime_unit_dirs" lineno="517">
39822 +<interface name="systemd_search_user_runtime_unit_dirs" lineno="698">
39823 <summary>
39824 Allow the specified domain to search systemd user runtime unit
39825 directories.
39826 @@ -120238,7 +122655,7 @@ Domain allowed access.
39827 </summary>
39828 </param>
39829 </interface>
39830 -<interface name="systemd_list_user_runtime_unit_dirs" lineno="536">
39831 +<interface name="systemd_list_user_runtime_unit_dirs" lineno="717">
39832 <summary>
39833 Allow the specified domain to list the contents of systemd
39834 user runtime unit directories.
39835 @@ -120249,7 +122666,7 @@ Domain allowed access.
39836 </summary>
39837 </param>
39838 </interface>
39839 -<interface name="systemd_status_user_runtime_units" lineno="554">
39840 +<interface name="systemd_status_user_runtime_units" lineno="735">
39841 <summary>
39842 Allow the specified domain to get the status of systemd user runtime units.
39843 </summary>
39844 @@ -120259,7 +122676,7 @@ Domain allowed access.
39845 </summary>
39846 </param>
39847 </interface>
39848 -<interface name="systemd_start_user_runtime_units" lineno="573">
39849 +<interface name="systemd_start_user_runtime_units" lineno="754">
39850 <summary>
39851 Allow the specified domain to start systemd user runtime units.
39852 </summary>
39853 @@ -120269,7 +122686,7 @@ Domain allowed access.
39854 </summary>
39855 </param>
39856 </interface>
39857 -<interface name="systemd_stop_user_runtime_units" lineno="592">
39858 +<interface name="systemd_stop_user_runtime_units" lineno="773">
39859 <summary>
39860 Allow the specified domain to stop systemd user runtime units.
39861 </summary>
39862 @@ -120279,7 +122696,7 @@ Domain allowed access.
39863 </summary>
39864 </param>
39865 </interface>
39866 -<interface name="systemd_reload_user_runtime_units" lineno="611">
39867 +<interface name="systemd_reload_user_runtime_units" lineno="792">
39868 <summary>
39869 Allow the specified domain to reload systemd user runtime units.
39870 </summary>
39871 @@ -120289,7 +122706,7 @@ Domain allowed access.
39872 </summary>
39873 </param>
39874 </interface>
39875 -<interface name="systemd_log_parse_environment" lineno="631">
39876 +<interface name="systemd_log_parse_environment" lineno="812">
39877 <summary>
39878 Make the specified type usable as an
39879 log parse environment type.
39880 @@ -120300,7 +122717,7 @@ Type to be used as a log parse environment type.
39881 </summary>
39882 </param>
39883 </interface>
39884 -<interface name="systemd_use_nss" lineno="651">
39885 +<interface name="systemd_use_nss" lineno="832">
39886 <summary>
39887 Allow domain to use systemd's Name Service Switch (NSS) module.
39888 This module provides UNIX user and group name resolution for dynamic users
39889 @@ -120312,7 +122729,7 @@ Domain allowed access
39890 </summary>
39891 </param>
39892 </interface>
39893 -<interface name="systemd_PrivateDevices" lineno="678">
39894 +<interface name="systemd_PrivateDevices" lineno="859">
39895 <summary>
39896 Allow domain to be used as a systemd service with a unit
39897 that uses PrivateDevices=yes in section [Service].
39898 @@ -120323,7 +122740,7 @@ Domain allowed access
39899 </summary>
39900 </param>
39901 </interface>
39902 -<interface name="systemd_read_hwdb" lineno="695">
39903 +<interface name="systemd_read_hwdb" lineno="876">
39904 <summary>
39905 Allow domain to read udev hwdb file
39906 </summary>
39907 @@ -120333,7 +122750,7 @@ domain allowed access
39908 </summary>
39909 </param>
39910 </interface>
39911 -<interface name="systemd_map_hwdb" lineno="713">
39912 +<interface name="systemd_map_hwdb" lineno="894">
39913 <summary>
39914 Allow domain to map udev hwdb file
39915 </summary>
39916 @@ -120343,7 +122760,7 @@ domain allowed access
39917 </summary>
39918 </param>
39919 </interface>
39920 -<interface name="systemd_read_logind_pids" lineno="731">
39921 +<interface name="systemd_read_logind_pids" lineno="912">
39922 <summary>
39923 Read systemd_login PID files. (Deprecated)
39924 </summary>
39925 @@ -120353,7 +122770,7 @@ Domain allowed access.
39926 </summary>
39927 </param>
39928 </interface>
39929 -<interface name="systemd_manage_logind_pid_pipes" lineno="746">
39930 +<interface name="systemd_manage_logind_pid_pipes" lineno="927">
39931 <summary>
39932 Manage systemd_login PID pipes. (Deprecated)
39933 </summary>
39934 @@ -120363,7 +122780,7 @@ Domain allowed access.
39935 </summary>
39936 </param>
39937 </interface>
39938 -<interface name="systemd_write_logind_pid_pipes" lineno="761">
39939 +<interface name="systemd_write_logind_pid_pipes" lineno="942">
39940 <summary>
39941 Write systemd_login named pipe. (Deprecated)
39942 </summary>
39943 @@ -120373,7 +122790,7 @@ Domain allowed access.
39944 </summary>
39945 </param>
39946 </interface>
39947 -<interface name="systemd_watch_logind_runtime_dirs" lineno="776">
39948 +<interface name="systemd_watch_logind_runtime_dirs" lineno="957">
39949 <summary>
39950 Watch systemd-logind runtime dirs.
39951 </summary>
39952 @@ -120383,7 +122800,7 @@ Domain allowed access.
39953 </summary>
39954 </param>
39955 </interface>
39956 -<interface name="systemd_read_logind_runtime_files" lineno="795">
39957 +<interface name="systemd_read_logind_runtime_files" lineno="976">
39958 <summary>
39959 Read systemd-logind runtime files.
39960 </summary>
39961 @@ -120393,7 +122810,7 @@ Domain allowed access.
39962 </summary>
39963 </param>
39964 </interface>
39965 -<interface name="systemd_manage_logind_runtime_pipes" lineno="815">
39966 +<interface name="systemd_manage_logind_runtime_pipes" lineno="996">
39967 <summary>
39968 Manage systemd-logind runtime pipes.
39969 </summary>
39970 @@ -120403,7 +122820,7 @@ Domain allowed access.
39971 </summary>
39972 </param>
39973 </interface>
39974 -<interface name="systemd_write_logind_runtime_pipes" lineno="834">
39975 +<interface name="systemd_write_logind_runtime_pipes" lineno="1015">
39976 <summary>
39977 Write systemd-logind runtime named pipe.
39978 </summary>
39979 @@ -120413,7 +122830,7 @@ Domain allowed access.
39980 </summary>
39981 </param>
39982 </interface>
39983 -<interface name="systemd_use_logind_fds" lineno="855">
39984 +<interface name="systemd_use_logind_fds" lineno="1036">
39985 <summary>
39986 Use inherited systemd
39987 logind file descriptors.
39988 @@ -120424,7 +122841,7 @@ Domain allowed access.
39989 </summary>
39990 </param>
39991 </interface>
39992 -<interface name="systemd_watch_logind_sessions_dirs" lineno="873">
39993 +<interface name="systemd_watch_logind_sessions_dirs" lineno="1054">
39994 <summary>
39995 Watch logind sessions dirs.
39996 </summary>
39997 @@ -120434,7 +122851,7 @@ Domain allowed access.
39998 </summary>
39999 </param>
40000 </interface>
40001 -<interface name="systemd_read_logind_sessions_files" lineno="892">
40002 +<interface name="systemd_read_logind_sessions_files" lineno="1073">
40003 <summary>
40004 Read logind sessions files.
40005 </summary>
40006 @@ -120444,7 +122861,7 @@ Domain allowed access.
40007 </summary>
40008 </param>
40009 </interface>
40010 -<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="913">
40011 +<interface name="systemd_write_inherited_logind_sessions_pipes" lineno="1094">
40012 <summary>
40013 Write inherited logind sessions pipes.
40014 </summary>
40015 @@ -120454,7 +122871,7 @@ Domain allowed access.
40016 </summary>
40017 </param>
40018 </interface>
40019 -<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="933">
40020 +<interface name="systemd_write_inherited_logind_inhibit_pipes" lineno="1114">
40021 <summary>
40022 Write inherited logind inhibit pipes.
40023 </summary>
40024 @@ -120464,7 +122881,7 @@ Domain allowed access.
40025 </summary>
40026 </param>
40027 </interface>
40028 -<interface name="systemd_dbus_chat_logind" lineno="954">
40029 +<interface name="systemd_dbus_chat_logind" lineno="1135">
40030 <summary>
40031 Send and receive messages from
40032 systemd logind over dbus.
40033 @@ -120475,7 +122892,7 @@ Domain allowed access.
40034 </summary>
40035 </param>
40036 </interface>
40037 -<interface name="systemd_status_logind" lineno="974">
40038 +<interface name="systemd_status_logind" lineno="1155">
40039 <summary>
40040 Get the system status information from systemd_login
40041 </summary>
40042 @@ -120485,7 +122902,7 @@ Domain allowed access.
40043 </summary>
40044 </param>
40045 </interface>
40046 -<interface name="systemd_signull_logind" lineno="993">
40047 +<interface name="systemd_signull_logind" lineno="1174">
40048 <summary>
40049 Send systemd_login a null signal.
40050 </summary>
40051 @@ -120495,7 +122912,7 @@ Domain allowed access.
40052 </summary>
40053 </param>
40054 </interface>
40055 -<interface name="systemd_manage_userdb_runtime_dirs" lineno="1011">
40056 +<interface name="systemd_manage_userdb_runtime_dirs" lineno="1192">
40057 <summary>
40058 Manage systemd userdb runtime directories.
40059 </summary>
40060 @@ -120505,7 +122922,7 @@ Domain allowed access.
40061 </summary>
40062 </param>
40063 </interface>
40064 -<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1029">
40065 +<interface name="systemd_manage_userdb_runtime_sock_files" lineno="1210">
40066 <summary>
40067 Manage socket files under /run/systemd/userdb .
40068 </summary>
40069 @@ -120515,7 +122932,7 @@ Domain allowed access.
40070 </summary>
40071 </param>
40072 </interface>
40073 -<interface name="systemd_stream_connect_userdb" lineno="1047">
40074 +<interface name="systemd_stream_connect_userdb" lineno="1228">
40075 <summary>
40076 Connect to /run/systemd/userdb/io.systemd.DynamicUser .
40077 </summary>
40078 @@ -120525,7 +122942,7 @@ Domain allowed access.
40079 </summary>
40080 </param>
40081 </interface>
40082 -<interface name="systemd_read_machines" lineno="1068">
40083 +<interface name="systemd_read_machines" lineno="1249">
40084 <summary>
40085 Allow reading /run/systemd/machines
40086 </summary>
40087 @@ -120535,7 +122952,7 @@ Domain that can access the machines files
40088 </summary>
40089 </param>
40090 </interface>
40091 -<interface name="systemd_connect_machined" lineno="1087">
40092 +<interface name="systemd_connect_machined" lineno="1268">
40093 <summary>
40094 Allow connecting to /run/systemd/userdb/io.systemd.Machine socket
40095 </summary>
40096 @@ -120545,7 +122962,18 @@ Domain that can access the socket
40097 </summary>
40098 </param>
40099 </interface>
40100 -<interface name="systemd_dbus_chat_hostnamed" lineno="1106">
40101 +<interface name="systemd_dbus_chat_machined" lineno="1287">
40102 +<summary>
40103 +Send and receive messages from
40104 +systemd machined over dbus.
40105 +</summary>
40106 +<param name="domain">
40107 +<summary>
40108 +Domain allowed access.
40109 +</summary>
40110 +</param>
40111 +</interface>
40112 +<interface name="systemd_dbus_chat_hostnamed" lineno="1308">
40113 <summary>
40114 Send and receive messages from
40115 systemd hostnamed over dbus.
40116 @@ -120556,7 +122984,7 @@ Domain allowed access.
40117 </summary>
40118 </param>
40119 </interface>
40120 -<interface name="systemd_use_passwd_agent_fds" lineno="1126">
40121 +<interface name="systemd_use_passwd_agent_fds" lineno="1328">
40122 <summary>
40123 allow systemd_passwd_agent to inherit fds
40124 </summary>
40125 @@ -120566,7 +122994,7 @@ Domain that owns the fds
40126 </summary>
40127 </param>
40128 </interface>
40129 -<interface name="systemd_run_passwd_agent" lineno="1149">
40130 +<interface name="systemd_run_passwd_agent" lineno="1351">
40131 <summary>
40132 allow systemd_passwd_agent to be run by admin
40133 </summary>
40134 @@ -120581,7 +123009,7 @@ role that it runs in
40135 </summary>
40136 </param>
40137 </interface>
40138 -<interface name="systemd_use_passwd_agent" lineno="1170">
40139 +<interface name="systemd_use_passwd_agent" lineno="1372">
40140 <summary>
40141 Allow a systemd_passwd_agent_t process to interact with a daemon
40142 that needs a password from the sysadmin.
40143 @@ -120592,7 +123020,7 @@ Domain allowed access.
40144 </summary>
40145 </param>
40146 </interface>
40147 -<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1194">
40148 +<interface name="systemd_filetrans_passwd_runtime_dirs" lineno="1396">
40149 <summary>
40150 Transition to systemd_passwd_runtime_t when creating dirs
40151 </summary>
40152 @@ -120602,7 +123030,7 @@ Domain allowed access.
40153 </summary>
40154 </param>
40155 </interface>
40156 -<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1215">
40157 +<interface name="systemd_filetrans_userdb_runtime_dirs" lineno="1417">
40158 <summary>
40159 Transition to systemd_userdb_runtime_t when
40160 creating the userdb directory inside an init runtime
40161 @@ -120614,7 +123042,7 @@ Domain allowed access.
40162 </summary>
40163 </param>
40164 </interface>
40165 -<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1233">
40166 +<interface name="systemd_manage_passwd_runtime_symlinks" lineno="1435">
40167 <summary>
40168 Allow to domain to create systemd-passwd symlink
40169 </summary>
40170 @@ -120624,7 +123052,7 @@ Domain allowed access.
40171 </summary>
40172 </param>
40173 </interface>
40174 -<interface name="systemd_watch_passwd_runtime_dirs" lineno="1251">
40175 +<interface name="systemd_watch_passwd_runtime_dirs" lineno="1453">
40176 <summary>
40177 Allow a domain to watch systemd-passwd runtime dirs.
40178 </summary>
40179 @@ -120634,7 +123062,7 @@ Domain allowed access.
40180 </summary>
40181 </param>
40182 </interface>
40183 -<interface name="systemd_manage_all_units" lineno="1269">
40184 +<interface name="systemd_manage_all_units" lineno="1471">
40185 <summary>
40186 manage systemd unit dirs and the files in them (Deprecated)
40187 </summary>
40188 @@ -120644,7 +123072,7 @@ Domain allowed access.
40189 </summary>
40190 </param>
40191 </interface>
40192 -<interface name="systemd_list_journal_dirs" lineno="1284">
40193 +<interface name="systemd_list_journal_dirs" lineno="1486">
40194 <summary>
40195 Allow domain to list the contents of systemd_journal_t dirs
40196 </summary>
40197 @@ -120654,7 +123082,7 @@ Domain allowed access.
40198 </summary>
40199 </param>
40200 </interface>
40201 -<interface name="systemd_read_journal_files" lineno="1302">
40202 +<interface name="systemd_read_journal_files" lineno="1504">
40203 <summary>
40204 Allow domain to read systemd_journal_t files
40205 </summary>
40206 @@ -120664,7 +123092,7 @@ Domain allowed access.
40207 </summary>
40208 </param>
40209 </interface>
40210 -<interface name="systemd_manage_journal_files" lineno="1321">
40211 +<interface name="systemd_manage_journal_files" lineno="1523">
40212 <summary>
40213 Allow domain to create/manage systemd_journal_t files
40214 </summary>
40215 @@ -120674,7 +123102,7 @@ Domain allowed access.
40216 </summary>
40217 </param>
40218 </interface>
40219 -<interface name="systemd_watch_journal_dirs" lineno="1341">
40220 +<interface name="systemd_watch_journal_dirs" lineno="1543">
40221 <summary>
40222 Allow domain to add a watch on systemd_journal_t directories
40223 </summary>
40224 @@ -120684,7 +123112,7 @@ Domain allowed access.
40225 </summary>
40226 </param>
40227 </interface>
40228 -<interface name="systemd_relabelto_journal_dirs" lineno="1359">
40229 +<interface name="systemd_relabelto_journal_dirs" lineno="1561">
40230 <summary>
40231 Relabel to systemd-journald directory type.
40232 </summary>
40233 @@ -120694,7 +123122,7 @@ Domain allowed access.
40234 </summary>
40235 </param>
40236 </interface>
40237 -<interface name="systemd_relabelto_journal_files" lineno="1378">
40238 +<interface name="systemd_relabelto_journal_files" lineno="1580">
40239 <summary>
40240 Relabel to systemd-journald file type.
40241 </summary>
40242 @@ -120704,7 +123132,7 @@ Domain allowed access.
40243 </summary>
40244 </param>
40245 </interface>
40246 -<interface name="systemd_read_networkd_units" lineno="1398">
40247 +<interface name="systemd_read_networkd_units" lineno="1600">
40248 <summary>
40249 Allow domain to read systemd_networkd_t unit files
40250 </summary>
40251 @@ -120714,7 +123142,7 @@ Domain allowed access.
40252 </summary>
40253 </param>
40254 </interface>
40255 -<interface name="systemd_manage_networkd_units" lineno="1418">
40256 +<interface name="systemd_manage_networkd_units" lineno="1620">
40257 <summary>
40258 Allow domain to create/manage systemd_networkd_t unit files
40259 </summary>
40260 @@ -120724,7 +123152,7 @@ Domain allowed access.
40261 </summary>
40262 </param>
40263 </interface>
40264 -<interface name="systemd_enabledisable_networkd" lineno="1438">
40265 +<interface name="systemd_enabledisable_networkd" lineno="1640">
40266 <summary>
40267 Allow specified domain to enable systemd-networkd units
40268 </summary>
40269 @@ -120734,7 +123162,7 @@ Domain allowed access.
40270 </summary>
40271 </param>
40272 </interface>
40273 -<interface name="systemd_startstop_networkd" lineno="1457">
40274 +<interface name="systemd_startstop_networkd" lineno="1659">
40275 <summary>
40276 Allow specified domain to start systemd-networkd units
40277 </summary>
40278 @@ -120744,7 +123172,7 @@ Domain allowed access.
40279 </summary>
40280 </param>
40281 </interface>
40282 -<interface name="systemd_dbus_chat_networkd" lineno="1477">
40283 +<interface name="systemd_dbus_chat_networkd" lineno="1679">
40284 <summary>
40285 Send and receive messages from
40286 systemd networkd over dbus.
40287 @@ -120755,7 +123183,7 @@ Domain allowed access.
40288 </summary>
40289 </param>
40290 </interface>
40291 -<interface name="systemd_status_networkd" lineno="1497">
40292 +<interface name="systemd_status_networkd" lineno="1699">
40293 <summary>
40294 Allow specified domain to get status of systemd-networkd
40295 </summary>
40296 @@ -120765,7 +123193,7 @@ Domain allowed access.
40297 </summary>
40298 </param>
40299 </interface>
40300 -<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="1516">
40301 +<interface name="systemd_relabelfrom_networkd_tun_sockets" lineno="1718">
40302 <summary>
40303 Relabel systemd_networkd tun socket.
40304 </summary>
40305 @@ -120775,7 +123203,7 @@ Domain allowed access.
40306 </summary>
40307 </param>
40308 </interface>
40309 -<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="1534">
40310 +<interface name="systemd_rw_networkd_netlink_route_sockets" lineno="1736">
40311 <summary>
40312 Read/Write from systemd_networkd netlink route socket.
40313 </summary>
40314 @@ -120785,7 +123213,7 @@ Domain allowed access.
40315 </summary>
40316 </param>
40317 </interface>
40318 -<interface name="systemd_list_networkd_runtime" lineno="1552">
40319 +<interface name="systemd_list_networkd_runtime" lineno="1754">
40320 <summary>
40321 Allow domain to list dirs under /run/systemd/netif
40322 </summary>
40323 @@ -120795,7 +123223,7 @@ domain permitted the access
40324 </summary>
40325 </param>
40326 </interface>
40327 -<interface name="systemd_watch_networkd_runtime_dirs" lineno="1571">
40328 +<interface name="systemd_watch_networkd_runtime_dirs" lineno="1773">
40329 <summary>
40330 Watch directories under /run/systemd/netif
40331 </summary>
40332 @@ -120805,7 +123233,7 @@ Domain permitted the access
40333 </summary>
40334 </param>
40335 </interface>
40336 -<interface name="systemd_read_networkd_runtime" lineno="1590">
40337 +<interface name="systemd_read_networkd_runtime" lineno="1792">
40338 <summary>
40339 Allow domain to read files generated by systemd_networkd
40340 </summary>
40341 @@ -120815,7 +123243,7 @@ domain allowed access
40342 </summary>
40343 </param>
40344 </interface>
40345 -<interface name="systemd_read_logind_state" lineno="1609">
40346 +<interface name="systemd_read_logind_state" lineno="1811">
40347 <summary>
40348 Allow systemd_logind_t to read process state for cgroup file
40349 </summary>
40350 @@ -120825,7 +123253,51 @@ Domain systemd_logind_t may access.
40351 </summary>
40352 </param>
40353 </interface>
40354 -<interface name="systemd_start_power_units" lineno="1628">
40355 +<interface name="systemd_start_user_manager_units" lineno="1831">
40356 +<summary>
40357 +Allow the specified domain to start systemd
40358 +user manager units (systemd --user).
40359 +</summary>
40360 +<param name="domain">
40361 +<summary>
40362 +Domain allowed access.
40363 +</summary>
40364 +</param>
40365 +</interface>
40366 +<interface name="systemd_stop_user_manager_units" lineno="1851">
40367 +<summary>
40368 +Allow the specified domain to stop systemd
40369 +user manager units (systemd --user).
40370 +</summary>
40371 +<param name="domain">
40372 +<summary>
40373 +Domain allowed access.
40374 +</summary>
40375 +</param>
40376 +</interface>
40377 +<interface name="systemd_reload_user_manager_units" lineno="1871">
40378 +<summary>
40379 +Allow the specified domain to reload systemd
40380 +user manager units (systemd --user).
40381 +</summary>
40382 +<param name="domain">
40383 +<summary>
40384 +Domain allowed access.
40385 +</summary>
40386 +</param>
40387 +</interface>
40388 +<interface name="systemd_status_user_manager_units" lineno="1891">
40389 +<summary>
40390 +Get the status of systemd user manager
40391 +units (systemd --user).
40392 +</summary>
40393 +<param name="domain">
40394 +<summary>
40395 +Domain allowed access.
40396 +</summary>
40397 +</param>
40398 +</interface>
40399 +<interface name="systemd_start_power_units" lineno="1910">
40400 <summary>
40401 Allow specified domain to start power units
40402 </summary>
40403 @@ -120835,7 +123307,7 @@ Domain to not audit.
40404 </summary>
40405 </param>
40406 </interface>
40407 -<interface name="systemd_status_power_units" lineno="1647">
40408 +<interface name="systemd_status_power_units" lineno="1929">
40409 <summary>
40410 Get the system status information about power units
40411 </summary>
40412 @@ -120845,7 +123317,7 @@ Domain allowed access.
40413 </summary>
40414 </param>
40415 </interface>
40416 -<interface name="systemd_stream_connect_socket_proxyd" lineno="1666">
40417 +<interface name="systemd_stream_connect_socket_proxyd" lineno="1948">
40418 <summary>
40419 Allows connections to the systemd-socket-proxyd's socket.
40420 </summary>
40421 @@ -120855,7 +123327,7 @@ Domain allowed access.
40422 </summary>
40423 </param>
40424 </interface>
40425 -<interface name="systemd_tmpfiles_conf_file" lineno="1685">
40426 +<interface name="systemd_tmpfiles_conf_file" lineno="1967">
40427 <summary>
40428 Make the specified type usable for
40429 systemd tmpfiles config files.
40430 @@ -120866,7 +123338,7 @@ Type to be used for systemd tmpfiles config files.
40431 </summary>
40432 </param>
40433 </interface>
40434 -<interface name="systemd_tmpfiles_creator" lineno="1706">
40435 +<interface name="systemd_tmpfiles_creator" lineno="1988">
40436 <summary>
40437 Allow the specified domain to create
40438 the tmpfiles config directory with
40439 @@ -120878,7 +123350,7 @@ Domain allowed access.
40440 </summary>
40441 </param>
40442 </interface>
40443 -<interface name="systemd_tmpfiles_conf_filetrans" lineno="1742">
40444 +<interface name="systemd_tmpfiles_conf_filetrans" lineno="2024">
40445 <summary>
40446 Create an object in the systemd tmpfiles config
40447 directory, with a private type
40448 @@ -120905,7 +123377,7 @@ The name of the object being created.
40449 </summary>
40450 </param>
40451 </interface>
40452 -<interface name="systemd_list_tmpfiles_conf" lineno="1761">
40453 +<interface name="systemd_list_tmpfiles_conf" lineno="2043">
40454 <summary>
40455 Allow domain to list systemd tmpfiles config directory
40456 </summary>
40457 @@ -120915,7 +123387,7 @@ Domain allowed access.
40458 </summary>
40459 </param>
40460 </interface>
40461 -<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="1779">
40462 +<interface name="systemd_relabelto_tmpfiles_conf_dirs" lineno="2061">
40463 <summary>
40464 Allow domain to relabel to systemd tmpfiles config directory
40465 </summary>
40466 @@ -120925,7 +123397,7 @@ Domain allowed access.
40467 </summary>
40468 </param>
40469 </interface>
40470 -<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="1797">
40471 +<interface name="systemd_relabelto_tmpfiles_conf_files" lineno="2079">
40472 <summary>
40473 Allow domain to relabel to systemd tmpfiles config files
40474 </summary>
40475 @@ -120935,7 +123407,7 @@ Domain allowed access.
40476 </summary>
40477 </param>
40478 </interface>
40479 -<interface name="systemd_tmpfilesd_managed" lineno="1815">
40480 +<interface name="systemd_tmpfilesd_managed" lineno="2097">
40481 <summary>
40482 Allow systemd_tmpfiles_t to manage filesystem objects
40483 </summary>
40484 @@ -120945,7 +123417,7 @@ Type of object to manage
40485 </summary>
40486 </param>
40487 </interface>
40488 -<interface name="systemd_dbus_chat_resolved" lineno="1842">
40489 +<interface name="systemd_dbus_chat_resolved" lineno="2124">
40490 <summary>
40491 Send and receive messages from
40492 systemd resolved over dbus.
40493 @@ -120956,7 +123428,7 @@ Domain allowed access.
40494 </summary>
40495 </param>
40496 </interface>
40497 -<interface name="systemd_read_resolved_runtime" lineno="1862">
40498 +<interface name="systemd_read_resolved_runtime" lineno="2144">
40499 <summary>
40500 Allow domain to read resolv.conf file generated by systemd_resolved
40501 </summary>
40502 @@ -120966,7 +123438,7 @@ domain allowed access
40503 </summary>
40504 </param>
40505 </interface>
40506 -<interface name="systemd_getattr_updated_runtime" lineno="1880">
40507 +<interface name="systemd_getattr_updated_runtime" lineno="2162">
40508 <summary>
40509 Allow domain to getattr on .updated file (generated by systemd-update-done
40510 </summary>
40511 @@ -120976,7 +123448,7 @@ domain allowed access
40512 </summary>
40513 </param>
40514 </interface>
40515 -<interface name="systemd_search_all_user_keys" lineno="1898">
40516 +<interface name="systemd_search_all_user_keys" lineno="2180">
40517 <summary>
40518 Search keys for the all systemd --user domains.
40519 </summary>
40520 @@ -120986,7 +123458,7 @@ Domain allowed access.
40521 </summary>
40522 </param>
40523 </interface>
40524 -<interface name="systemd_create_all_user_keys" lineno="1916">
40525 +<interface name="systemd_create_all_user_keys" lineno="2198">
40526 <summary>
40527 Create keys for the all systemd --user domains.
40528 </summary>
40529 @@ -120996,7 +123468,7 @@ Domain allowed access.
40530 </summary>
40531 </param>
40532 </interface>
40533 -<interface name="systemd_write_all_user_keys" lineno="1934">
40534 +<interface name="systemd_write_all_user_keys" lineno="2216">
40535 <summary>
40536 Write keys for the all systemd --user domains.
40537 </summary>
40538 @@ -121006,7 +123478,7 @@ Domain allowed access.
40539 </summary>
40540 </param>
40541 </interface>
40542 -<interface name="systemd_domtrans_sysusers" lineno="1953">
40543 +<interface name="systemd_domtrans_sysusers" lineno="2235">
40544 <summary>
40545 Execute systemd-sysusers in the
40546 systemd sysusers domain.
40547 @@ -121017,7 +123489,7 @@ Domain allowed access.
40548 </summary>
40549 </param>
40550 </interface>
40551 -<interface name="systemd_run_sysusers" lineno="1978">
40552 +<interface name="systemd_run_sysusers" lineno="2260">
40553 <summary>
40554 Run systemd-sysusers with a domain transition.
40555 </summary>
40556 @@ -121033,7 +123505,7 @@ Role allowed access.
40557 </param>
40558 <rolecap/>
40559 </interface>
40560 -<interface name="systemd_use_inherited_machined_ptys" lineno="1998">
40561 +<interface name="systemd_use_inherited_machined_ptys" lineno="2280">
40562 <summary>
40563 receive and use a systemd_machined_devpts_t file handle
40564 </summary>
40565 @@ -121084,14 +123556,6 @@ labelled ones.
40566 </p>
40567 </desc>
40568 </tunable>
40569 -<tunable name="systemd_tmpfilesd_factory" dftval="false">
40570 -<desc>
40571 -<p>
40572 -Allow systemd-tmpfilesd to populate missing configuration files from factory
40573 -template directory.
40574 -</p>
40575 -</desc>
40576 -</tunable>
40577 </module>
40578 <module name="tmpfiles" filename="policy/modules/system/tmpfiles.if">
40579 <summary>Policy for tmpfiles, a boot-time temporary file handler</summary>
40580 @@ -121685,7 +124149,7 @@ Domain to make unconfined.
40581 </summary>
40582 </param>
40583 </interface>
40584 -<interface name="unconfined_domain" lineno="150">
40585 +<interface name="unconfined_domain" lineno="154">
40586 <summary>
40587 Make the specified domain unconfined and
40588 audit executable heap usage.
40589 @@ -121713,7 +124177,7 @@ Domain to make unconfined.
40590 </summary>
40591 </param>
40592 </interface>
40593 -<interface name="unconfined_domtrans" lineno="168">
40594 +<interface name="unconfined_domtrans" lineno="172">
40595 <summary>
40596 Transition to the unconfined domain.
40597 </summary>
40598 @@ -121723,7 +124187,7 @@ Domain allowed to transition.
40599 </summary>
40600 </param>
40601 </interface>
40602 -<interface name="unconfined_run" lineno="191">
40603 +<interface name="unconfined_run" lineno="195">
40604 <summary>
40605 Execute specified programs in the unconfined domain.
40606 </summary>
40607 @@ -121738,7 +124202,7 @@ The role to allow the unconfined domain.
40608 </summary>
40609 </param>
40610 </interface>
40611 -<interface name="unconfined_shell_domtrans" lineno="210">
40612 +<interface name="unconfined_shell_domtrans" lineno="214">
40613 <summary>
40614 Transition to the unconfined domain by executing a shell.
40615 </summary>
40616 @@ -121748,7 +124212,7 @@ Domain allowed to transition.
40617 </summary>
40618 </param>
40619 </interface>
40620 -<interface name="unconfined_domtrans_to" lineno="248">
40621 +<interface name="unconfined_domtrans_to" lineno="252">
40622 <summary>
40623 Allow unconfined to execute the specified program in
40624 the specified domain.
40625 @@ -121775,7 +124239,7 @@ Domain entry point file.
40626 </summary>
40627 </param>
40628 </interface>
40629 -<interface name="unconfined_run_to" lineno="285">
40630 +<interface name="unconfined_run_to" lineno="289">
40631 <summary>
40632 Allow unconfined to execute the specified program in
40633 the specified domain. Allow the specified domain the
40634 @@ -121804,7 +124268,7 @@ Domain entry point file.
40635 </summary>
40636 </param>
40637 </interface>
40638 -<interface name="unconfined_use_fds" lineno="306">
40639 +<interface name="unconfined_use_fds" lineno="310">
40640 <summary>
40641 Inherit file descriptors from the unconfined domain.
40642 </summary>
40643 @@ -121814,7 +124278,7 @@ Domain allowed access.
40644 </summary>
40645 </param>
40646 </interface>
40647 -<interface name="unconfined_sigchld" lineno="324">
40648 +<interface name="unconfined_sigchld" lineno="328">
40649 <summary>
40650 Send a SIGCHLD signal to the unconfined domain.
40651 </summary>
40652 @@ -121824,7 +124288,7 @@ Domain allowed access.
40653 </summary>
40654 </param>
40655 </interface>
40656 -<interface name="unconfined_signull" lineno="342">
40657 +<interface name="unconfined_signull" lineno="346">
40658 <summary>
40659 Send a SIGNULL signal to the unconfined domain.
40660 </summary>
40661 @@ -121834,7 +124298,7 @@ Domain allowed access.
40662 </summary>
40663 </param>
40664 </interface>
40665 -<interface name="unconfined_signal" lineno="360">
40666 +<interface name="unconfined_signal" lineno="364">
40667 <summary>
40668 Send generic signals to the unconfined domain.
40669 </summary>
40670 @@ -121844,7 +124308,7 @@ Domain allowed access.
40671 </summary>
40672 </param>
40673 </interface>
40674 -<interface name="unconfined_read_pipes" lineno="378">
40675 +<interface name="unconfined_read_pipes" lineno="382">
40676 <summary>
40677 Read unconfined domain unnamed pipes.
40678 </summary>
40679 @@ -121854,7 +124318,7 @@ Domain allowed access.
40680 </summary>
40681 </param>
40682 </interface>
40683 -<interface name="unconfined_dontaudit_read_pipes" lineno="396">
40684 +<interface name="unconfined_dontaudit_read_pipes" lineno="400">
40685 <summary>
40686 Do not audit attempts to read unconfined domain unnamed pipes.
40687 </summary>
40688 @@ -121864,7 +124328,7 @@ Domain to not audit.
40689 </summary>
40690 </param>
40691 </interface>
40692 -<interface name="unconfined_rw_pipes" lineno="414">
40693 +<interface name="unconfined_rw_pipes" lineno="418">
40694 <summary>
40695 Read and write unconfined domain unnamed pipes.
40696 </summary>
40697 @@ -121874,7 +124338,7 @@ Domain allowed access.
40698 </summary>
40699 </param>
40700 </interface>
40701 -<interface name="unconfined_dontaudit_rw_pipes" lineno="433">
40702 +<interface name="unconfined_dontaudit_rw_pipes" lineno="437">
40703 <summary>
40704 Do not audit attempts to read and write
40705 unconfined domain unnamed pipes.
40706 @@ -121885,7 +124349,7 @@ Domain to not audit.
40707 </summary>
40708 </param>
40709 </interface>
40710 -<interface name="unconfined_stream_connect" lineno="452">
40711 +<interface name="unconfined_stream_connect" lineno="456">
40712 <summary>
40713 Connect to the unconfined domain using
40714 a unix domain stream socket.
40715 @@ -121896,7 +124360,7 @@ Domain allowed access.
40716 </summary>
40717 </param>
40718 </interface>
40719 -<interface name="unconfined_dontaudit_rw_stream_sockets" lineno="471">
40720 +<interface name="unconfined_dontaudit_rw_stream_sockets" lineno="475">
40721 <summary>
40722 Do not audit attempts to read and write
40723 unconfined domain stream.
40724 @@ -121907,7 +124371,7 @@ Domain to not audit.
40725 </summary>
40726 </param>
40727 </interface>
40728 -<interface name="unconfined_dontaudit_rw_tcp_sockets" lineno="500">
40729 +<interface name="unconfined_dontaudit_rw_tcp_sockets" lineno="504">
40730 <summary>
40731 Do not audit attempts to read or write
40732 unconfined domain tcp sockets.
40733 @@ -121928,7 +124392,7 @@ Domain to not audit.
40734 </summary>
40735 </param>
40736 </interface>
40737 -<interface name="unconfined_search_keys" lineno="518">
40738 +<interface name="unconfined_search_keys" lineno="522">
40739 <summary>
40740 Search keys for the unconfined domain.
40741 </summary>
40742 @@ -121938,7 +124402,7 @@ Domain allowed access.
40743 </summary>
40744 </param>
40745 </interface>
40746 -<interface name="unconfined_create_keys" lineno="536">
40747 +<interface name="unconfined_create_keys" lineno="540">
40748 <summary>
40749 Create keys for the unconfined domain.
40750 </summary>
40751 @@ -121948,7 +124412,7 @@ Domain allowed access.
40752 </summary>
40753 </param>
40754 </interface>
40755 -<interface name="unconfined_write_keys" lineno="554">
40756 +<interface name="unconfined_write_keys" lineno="558">
40757 <summary>
40758 Write keys for the unconfined domain.
40759 </summary>
40760 @@ -121958,7 +124422,7 @@ Domain allowed access.
40761 </summary>
40762 </param>
40763 </interface>
40764 -<interface name="unconfined_dbus_send" lineno="572">
40765 +<interface name="unconfined_dbus_send" lineno="576">
40766 <summary>
40767 Send messages to the unconfined domain over dbus.
40768 </summary>
40769 @@ -121968,7 +124432,7 @@ Domain allowed access.
40770 </summary>
40771 </param>
40772 </interface>
40773 -<interface name="unconfined_dbus_chat" lineno="592">
40774 +<interface name="unconfined_dbus_chat" lineno="596">
40775 <summary>
40776 Send and receive messages from
40777 unconfined_t over dbus.
40778 @@ -121979,7 +124443,7 @@ Domain allowed access.
40779 </summary>
40780 </param>
40781 </interface>
40782 -<interface name="unconfined_dbus_connect" lineno="613">
40783 +<interface name="unconfined_dbus_connect" lineno="617">
40784 <summary>
40785 Connect to the the unconfined DBUS
40786 for service (acquire_svc).
40787 @@ -122115,7 +124579,7 @@ The user domain
40788 </param>
40789 <rolebase/>
40790 </interface>
40791 -<interface name="userdom_manage_tmp_role" lineno="463">
40792 +<interface name="userdom_manage_tmp_role" lineno="472">
40793 <summary>
40794 Manage user temporary files
40795 </summary>
40796 @@ -122131,7 +124595,7 @@ Domain allowed access.
40797 </param>
40798 <rolebase/>
40799 </interface>
40800 -<interface name="userdom_exec_user_tmp_files" lineno="490">
40801 +<interface name="userdom_exec_user_tmp_files" lineno="499">
40802 <summary>
40803 The execute access user temporary files.
40804 </summary>
40805 @@ -122142,7 +124606,7 @@ Domain allowed access.
40806 </param>
40807 <rolebase/>
40808 </interface>
40809 -<interface name="userdom_manage_tmpfs_role" lineno="526">
40810 +<interface name="userdom_manage_tmpfs_role" lineno="535">
40811 <summary>
40812 Role access for the user tmpfs type
40813 that the user has full access.
40814 @@ -122168,7 +124632,7 @@ Domain allowed access.
40815 </param>
40816 <rolecap/>
40817 </interface>
40818 -<template name="userdom_basic_networking_template" lineno="552">
40819 +<template name="userdom_basic_networking_template" lineno="561">
40820 <summary>
40821 The template allowing the user basic
40822 network permissions
40823 @@ -122181,7 +124645,7 @@ is the prefix for user_t).
40824 </param>
40825 <rolebase/>
40826 </template>
40827 -<template name="userdom_change_password_template" lineno="592">
40828 +<template name="userdom_change_password_template" lineno="601">
40829 <summary>
40830 The template for allowing the user to change passwords.
40831 </summary>
40832 @@ -122193,7 +124657,7 @@ is the prefix for user_t).
40833 </param>
40834 <rolebase/>
40835 </template>
40836 -<template name="userdom_common_user_template" lineno="622">
40837 +<template name="userdom_common_user_template" lineno="631">
40838 <summary>
40839 The template containing rules common to unprivileged
40840 users and administrative users.
40841 @@ -122211,7 +124675,7 @@ is the prefix for user_t).
40842 </summary>
40843 </param>
40844 </template>
40845 -<template name="userdom_login_user_template" lineno="945">
40846 +<template name="userdom_login_user_template" lineno="954">
40847 <summary>
40848 The template for creating a login user.
40849 </summary>
40850 @@ -122229,7 +124693,7 @@ is the prefix for user_t).
40851 </summary>
40852 </param>
40853 </template>
40854 -<template name="userdom_restricted_user_template" lineno="1068">
40855 +<template name="userdom_restricted_user_template" lineno="1077">
40856 <summary>
40857 The template for creating a unprivileged login user.
40858 </summary>
40859 @@ -122247,7 +124711,7 @@ is the prefix for user_t).
40860 </summary>
40861 </param>
40862 </template>
40863 -<template name="userdom_restricted_xwindows_user_template" lineno="1109">
40864 +<template name="userdom_restricted_xwindows_user_template" lineno="1118">
40865 <summary>
40866 The template for creating a unprivileged xwindows login user.
40867 </summary>
40868 @@ -122268,7 +124732,7 @@ is the prefix for user_t).
40869 </summary>
40870 </param>
40871 </template>
40872 -<template name="userdom_unpriv_user_template" lineno="1192">
40873 +<template name="userdom_unpriv_user_template" lineno="1201">
40874 <summary>
40875 The template for creating a unprivileged user roughly
40876 equivalent to a regular linux user.
40877 @@ -122291,7 +124755,7 @@ is the prefix for user_t).
40878 </summary>
40879 </param>
40880 </template>
40881 -<template name="userdom_admin_user_template" lineno="1312">
40882 +<template name="userdom_admin_user_template" lineno="1321">
40883 <summary>
40884 The template for creating an administrative user.
40885 </summary>
40886 @@ -122320,7 +124784,7 @@ is the prefix for sysadm_t).
40887 </summary>
40888 </param>
40889 </template>
40890 -<interface name="userdom_security_admin_template" lineno="1491">
40891 +<interface name="userdom_security_admin_template" lineno="1501">
40892 <summary>
40893 Allow user to run as a secadm
40894 </summary>
40895 @@ -122346,7 +124810,7 @@ The role of the object to create.
40896 </summary>
40897 </param>
40898 </interface>
40899 -<template name="userdom_xdg_user_template" lineno="1594">
40900 +<template name="userdom_xdg_user_template" lineno="1604">
40901 <summary>
40902 Allow user to interact with xdg content types
40903 </summary>
40904 @@ -122367,7 +124831,7 @@ Domain allowed access.
40905 </summary>
40906 </param>
40907 </template>
40908 -<interface name="userdom_user_application_type" lineno="1643">
40909 +<interface name="userdom_user_application_type" lineno="1653">
40910 <summary>
40911 Make the specified type usable as
40912 a user application domain type.
40913 @@ -122378,7 +124842,7 @@ Type to be used as a user application domain.
40914 </summary>
40915 </param>
40916 </interface>
40917 -<interface name="userdom_user_application_domain" lineno="1664">
40918 +<interface name="userdom_user_application_domain" lineno="1674">
40919 <summary>
40920 Make the specified type usable as
40921 a user application domain.
40922 @@ -122394,7 +124858,7 @@ Type to be used as the domain entry point.
40923 </summary>
40924 </param>
40925 </interface>
40926 -<interface name="userdom_user_home_content" lineno="1681">
40927 +<interface name="userdom_user_home_content" lineno="1691">
40928 <summary>
40929 Make the specified type usable in a
40930 user home directory.
40931 @@ -122406,7 +124870,7 @@ user home directory.
40932 </summary>
40933 </param>
40934 </interface>
40935 -<interface name="userdom_user_tmp_file" lineno="1707">
40936 +<interface name="userdom_user_tmp_file" lineno="1717">
40937 <summary>
40938 Make the specified type usable as a
40939 user temporary file.
40940 @@ -122418,7 +124882,7 @@ temporary directories.
40941 </summary>
40942 </param>
40943 </interface>
40944 -<interface name="userdom_user_tmpfs_file" lineno="1724">
40945 +<interface name="userdom_user_tmpfs_file" lineno="1734">
40946 <summary>
40947 Make the specified type usable as a
40948 user tmpfs file.
40949 @@ -122430,7 +124894,7 @@ tmpfs directories.
40950 </summary>
40951 </param>
40952 </interface>
40953 -<interface name="userdom_attach_admin_tun_iface" lineno="1739">
40954 +<interface name="userdom_attach_admin_tun_iface" lineno="1749">
40955 <summary>
40956 Allow domain to attach to TUN devices created by administrative users.
40957 </summary>
40958 @@ -122440,7 +124904,7 @@ Domain allowed access.
40959 </summary>
40960 </param>
40961 </interface>
40962 -<interface name="userdom_setattr_user_ptys" lineno="1758">
40963 +<interface name="userdom_setattr_user_ptys" lineno="1768">
40964 <summary>
40965 Set the attributes of a user pty.
40966 </summary>
40967 @@ -122450,7 +124914,7 @@ Domain allowed access.
40968 </summary>
40969 </param>
40970 </interface>
40971 -<interface name="userdom_create_user_pty" lineno="1776">
40972 +<interface name="userdom_create_user_pty" lineno="1786">
40973 <summary>
40974 Create a user pty.
40975 </summary>
40976 @@ -122460,7 +124924,7 @@ Domain allowed access.
40977 </summary>
40978 </param>
40979 </interface>
40980 -<interface name="userdom_getattr_user_home_dirs" lineno="1794">
40981 +<interface name="userdom_getattr_user_home_dirs" lineno="1804">
40982 <summary>
40983 Get the attributes of user home directories.
40984 </summary>
40985 @@ -122470,7 +124934,7 @@ Domain allowed access.
40986 </summary>
40987 </param>
40988 </interface>
40989 -<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1813">
40990 +<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1823">
40991 <summary>
40992 Do not audit attempts to get the attributes of user home directories.
40993 </summary>
40994 @@ -122480,7 +124944,7 @@ Domain to not audit.
40995 </summary>
40996 </param>
40997 </interface>
40998 -<interface name="userdom_search_user_home_dirs" lineno="1831">
40999 +<interface name="userdom_search_user_home_dirs" lineno="1841">
41000 <summary>
41001 Search user home directories.
41002 </summary>
41003 @@ -122490,7 +124954,7 @@ Domain allowed access.
41004 </summary>
41005 </param>
41006 </interface>
41007 -<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1858">
41008 +<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1868">
41009 <summary>
41010 Do not audit attempts to search user home directories.
41011 </summary>
41012 @@ -122508,7 +124972,7 @@ Domain to not audit.
41013 </param>
41014 <infoflow type="none"/>
41015 </interface>
41016 -<interface name="userdom_list_user_home_dirs" lineno="1876">
41017 +<interface name="userdom_list_user_home_dirs" lineno="1886">
41018 <summary>
41019 List user home directories.
41020 </summary>
41021 @@ -122518,7 +124982,7 @@ Domain allowed access.
41022 </summary>
41023 </param>
41024 </interface>
41025 -<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1895">
41026 +<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1905">
41027 <summary>
41028 Do not audit attempts to list user home subdirectories.
41029 </summary>
41030 @@ -122528,7 +124992,7 @@ Domain to not audit.
41031 </summary>
41032 </param>
41033 </interface>
41034 -<interface name="userdom_create_user_home_dirs" lineno="1913">
41035 +<interface name="userdom_create_user_home_dirs" lineno="1923">
41036 <summary>
41037 Create user home directories.
41038 </summary>
41039 @@ -122538,7 +125002,7 @@ Domain allowed access.
41040 </summary>
41041 </param>
41042 </interface>
41043 -<interface name="userdom_manage_user_home_dirs" lineno="1931">
41044 +<interface name="userdom_manage_user_home_dirs" lineno="1941">
41045 <summary>
41046 Manage user home directories.
41047 </summary>
41048 @@ -122548,7 +125012,7 @@ Domain allowed access.
41049 </summary>
41050 </param>
41051 </interface>
41052 -<interface name="userdom_relabelto_user_home_dirs" lineno="1949">
41053 +<interface name="userdom_relabelto_user_home_dirs" lineno="1959">
41054 <summary>
41055 Relabel to user home directories.
41056 </summary>
41057 @@ -122558,7 +125022,7 @@ Domain allowed access.
41058 </summary>
41059 </param>
41060 </interface>
41061 -<interface name="userdom_home_filetrans_user_home_dir" lineno="1973">
41062 +<interface name="userdom_home_filetrans_user_home_dir" lineno="1983">
41063 <summary>
41064 Create directories in the home dir root with
41065 the user home directory type.
41066 @@ -122574,7 +125038,7 @@ The name of the object being created.
41067 </summary>
41068 </param>
41069 </interface>
41070 -<interface name="userdom_user_home_domtrans" lineno="2010">
41071 +<interface name="userdom_user_home_domtrans" lineno="2020">
41072 <summary>
41073 Do a domain transition to the specified
41074 domain when executing a program in the
41075 @@ -122603,7 +125067,7 @@ Domain to transition to.
41076 </summary>
41077 </param>
41078 </interface>
41079 -<interface name="userdom_dontaudit_search_user_home_content" lineno="2030">
41080 +<interface name="userdom_dontaudit_search_user_home_content" lineno="2040">
41081 <summary>
41082 Do not audit attempts to search user home content directories.
41083 </summary>
41084 @@ -122613,7 +125077,7 @@ Domain to not audit.
41085 </summary>
41086 </param>
41087 </interface>
41088 -<interface name="userdom_list_all_user_home_content" lineno="2048">
41089 +<interface name="userdom_list_all_user_home_content" lineno="2058">
41090 <summary>
41091 List all users home content directories.
41092 </summary>
41093 @@ -122623,7 +125087,7 @@ Domain allowed access.
41094 </summary>
41095 </param>
41096 </interface>
41097 -<interface name="userdom_list_user_home_content" lineno="2067">
41098 +<interface name="userdom_list_user_home_content" lineno="2077">
41099 <summary>
41100 List contents of users home directory.
41101 </summary>
41102 @@ -122633,7 +125097,7 @@ Domain allowed access.
41103 </summary>
41104 </param>
41105 </interface>
41106 -<interface name="userdom_manage_user_home_content_dirs" lineno="2086">
41107 +<interface name="userdom_manage_user_home_content_dirs" lineno="2096">
41108 <summary>
41109 Create, read, write, and delete directories
41110 in a user home subdirectory.
41111 @@ -122644,7 +125108,7 @@ Domain allowed access.
41112 </summary>
41113 </param>
41114 </interface>
41115 -<interface name="userdom_delete_all_user_home_content_dirs" lineno="2105">
41116 +<interface name="userdom_delete_all_user_home_content_dirs" lineno="2115">
41117 <summary>
41118 Delete all user home content directories.
41119 </summary>
41120 @@ -122654,7 +125118,7 @@ Domain allowed access.
41121 </summary>
41122 </param>
41123 </interface>
41124 -<interface name="userdom_delete_user_home_content_dirs" lineno="2125">
41125 +<interface name="userdom_delete_user_home_content_dirs" lineno="2135">
41126 <summary>
41127 Delete directories in a user home subdirectory.
41128 </summary>
41129 @@ -122664,7 +125128,7 @@ Domain allowed access.
41130 </summary>
41131 </param>
41132 </interface>
41133 -<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2143">
41134 +<interface name="userdom_setattr_all_user_home_content_dirs" lineno="2153">
41135 <summary>
41136 Set attributes of all user home content directories.
41137 </summary>
41138 @@ -122674,7 +125138,7 @@ Domain allowed access.
41139 </summary>
41140 </param>
41141 </interface>
41142 -<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2163">
41143 +<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="2173">
41144 <summary>
41145 Do not audit attempts to set the
41146 attributes of user home files.
41147 @@ -122685,7 +125149,7 @@ Domain to not audit.
41148 </summary>
41149 </param>
41150 </interface>
41151 -<interface name="userdom_map_user_home_content_files" lineno="2181">
41152 +<interface name="userdom_map_user_home_content_files" lineno="2191">
41153 <summary>
41154 Map user home files.
41155 </summary>
41156 @@ -122695,7 +125159,7 @@ Domain allowed access.
41157 </summary>
41158 </param>
41159 </interface>
41160 -<interface name="userdom_mmap_user_home_content_files" lineno="2199">
41161 +<interface name="userdom_mmap_user_home_content_files" lineno="2209">
41162 <summary>
41163 Mmap user home files.
41164 </summary>
41165 @@ -122705,7 +125169,7 @@ Domain allowed access.
41166 </summary>
41167 </param>
41168 </interface>
41169 -<interface name="userdom_read_user_home_content_files" lineno="2218">
41170 +<interface name="userdom_read_user_home_content_files" lineno="2228">
41171 <summary>
41172 Read user home files.
41173 </summary>
41174 @@ -122715,7 +125179,7 @@ Domain allowed access.
41175 </summary>
41176 </param>
41177 </interface>
41178 -<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2237">
41179 +<interface name="userdom_dontaudit_read_user_home_content_files" lineno="2247">
41180 <summary>
41181 Do not audit attempts to read user home files.
41182 </summary>
41183 @@ -122725,7 +125189,7 @@ Domain to not audit.
41184 </summary>
41185 </param>
41186 </interface>
41187 -<interface name="userdom_read_all_user_home_content" lineno="2256">
41188 +<interface name="userdom_read_all_user_home_content" lineno="2266">
41189 <summary>
41190 Read all user home content, including application-specific resources.
41191 </summary>
41192 @@ -122735,7 +125199,7 @@ Domain allowed access
41193 </summary>
41194 </param>
41195 </interface>
41196 -<interface name="userdom_manage_all_user_home_content" lineno="2278">
41197 +<interface name="userdom_manage_all_user_home_content" lineno="2288">
41198 <summary>
41199 Manage all user home content, including application-specific resources.
41200 </summary>
41201 @@ -122745,7 +125209,7 @@ Domain allowed access
41202 </summary>
41203 </param>
41204 </interface>
41205 -<interface name="userdom_map_all_user_home_content_files" lineno="2300">
41206 +<interface name="userdom_map_all_user_home_content_files" lineno="2310">
41207 <summary>
41208 Map all user home content, including application-specific resources.
41209 </summary>
41210 @@ -122755,7 +125219,7 @@ Domain allowed access
41211 </summary>
41212 </param>
41213 </interface>
41214 -<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2318">
41215 +<interface name="userdom_dontaudit_append_user_home_content_files" lineno="2328">
41216 <summary>
41217 Do not audit attempts to append user home files.
41218 </summary>
41219 @@ -122765,7 +125229,7 @@ Domain to not audit.
41220 </summary>
41221 </param>
41222 </interface>
41223 -<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2336">
41224 +<interface name="userdom_dontaudit_write_user_home_content_files" lineno="2346">
41225 <summary>
41226 Do not audit attempts to write user home files.
41227 </summary>
41228 @@ -122775,7 +125239,7 @@ Domain to not audit.
41229 </summary>
41230 </param>
41231 </interface>
41232 -<interface name="userdom_delete_all_user_home_content_files" lineno="2354">
41233 +<interface name="userdom_delete_all_user_home_content_files" lineno="2364">
41234 <summary>
41235 Delete all user home content files.
41236 </summary>
41237 @@ -122785,7 +125249,7 @@ Domain allowed access.
41238 </summary>
41239 </param>
41240 </interface>
41241 -<interface name="userdom_delete_user_home_content_files" lineno="2374">
41242 +<interface name="userdom_delete_user_home_content_files" lineno="2384">
41243 <summary>
41244 Delete files in a user home subdirectory.
41245 </summary>
41246 @@ -122795,7 +125259,27 @@ Domain allowed access.
41247 </summary>
41248 </param>
41249 </interface>
41250 -<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2392">
41251 +<interface name="userdom_relabel_generic_user_home_dirs" lineno="2402">
41252 +<summary>
41253 +Relabel generic user home dirs.
41254 +</summary>
41255 +<param name="domain">
41256 +<summary>
41257 +Domain allowed access.
41258 +</summary>
41259 +</param>
41260 +</interface>
41261 +<interface name="userdom_relabel_generic_user_home_files" lineno="2420">
41262 +<summary>
41263 +Relabel generic user home files.
41264 +</summary>
41265 +<param name="domain">
41266 +<summary>
41267 +Domain allowed access.
41268 +</summary>
41269 +</param>
41270 +</interface>
41271 +<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="2438">
41272 <summary>
41273 Do not audit attempts to relabel user home files.
41274 </summary>
41275 @@ -122805,7 +125289,7 @@ Domain to not audit.
41276 </summary>
41277 </param>
41278 </interface>
41279 -<interface name="userdom_read_user_home_content_symlinks" lineno="2410">
41280 +<interface name="userdom_read_user_home_content_symlinks" lineno="2456">
41281 <summary>
41282 Read user home subdirectory symbolic links.
41283 </summary>
41284 @@ -122815,7 +125299,7 @@ Domain allowed access.
41285 </summary>
41286 </param>
41287 </interface>
41288 -<interface name="userdom_exec_user_home_content_files" lineno="2430">
41289 +<interface name="userdom_exec_user_home_content_files" lineno="2476">
41290 <summary>
41291 Execute user home files.
41292 </summary>
41293 @@ -122826,7 +125310,7 @@ Domain allowed access.
41294 </param>
41295 <rolecap/>
41296 </interface>
41297 -<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2457">
41298 +<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="2503">
41299 <summary>
41300 Do not audit attempts to execute user home files.
41301 </summary>
41302 @@ -122836,7 +125320,7 @@ Domain to not audit.
41303 </summary>
41304 </param>
41305 </interface>
41306 -<interface name="userdom_manage_user_home_content_files" lineno="2476">
41307 +<interface name="userdom_manage_user_home_content_files" lineno="2522">
41308 <summary>
41309 Create, read, write, and delete files
41310 in a user home subdirectory.
41311 @@ -122847,7 +125331,7 @@ Domain allowed access.
41312 </summary>
41313 </param>
41314 </interface>
41315 -<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2497">
41316 +<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="2543">
41317 <summary>
41318 Do not audit attempts to create, read, write, and delete directories
41319 in a user home subdirectory.
41320 @@ -122858,7 +125342,7 @@ Domain to not audit.
41321 </summary>
41322 </param>
41323 </interface>
41324 -<interface name="userdom_manage_user_home_content_symlinks" lineno="2516">
41325 +<interface name="userdom_manage_user_home_content_symlinks" lineno="2562">
41326 <summary>
41327 Create, read, write, and delete symbolic links
41328 in a user home subdirectory.
41329 @@ -122869,7 +125353,7 @@ Domain allowed access.
41330 </summary>
41331 </param>
41332 </interface>
41333 -<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2536">
41334 +<interface name="userdom_delete_all_user_home_content_symlinks" lineno="2582">
41335 <summary>
41336 Delete all user home content symbolic links.
41337 </summary>
41338 @@ -122879,7 +125363,7 @@ Domain allowed access.
41339 </summary>
41340 </param>
41341 </interface>
41342 -<interface name="userdom_delete_user_home_content_symlinks" lineno="2556">
41343 +<interface name="userdom_delete_user_home_content_symlinks" lineno="2602">
41344 <summary>
41345 Delete symbolic links in a user home directory.
41346 </summary>
41347 @@ -122889,7 +125373,7 @@ Domain allowed access.
41348 </summary>
41349 </param>
41350 </interface>
41351 -<interface name="userdom_manage_user_home_content_pipes" lineno="2575">
41352 +<interface name="userdom_manage_user_home_content_pipes" lineno="2621">
41353 <summary>
41354 Create, read, write, and delete named pipes
41355 in a user home subdirectory.
41356 @@ -122900,7 +125384,7 @@ Domain allowed access.
41357 </summary>
41358 </param>
41359 </interface>
41360 -<interface name="userdom_manage_user_home_content_sockets" lineno="2596">
41361 +<interface name="userdom_manage_user_home_content_sockets" lineno="2642">
41362 <summary>
41363 Create, read, write, and delete named sockets
41364 in a user home subdirectory.
41365 @@ -122911,7 +125395,7 @@ Domain allowed access.
41366 </summary>
41367 </param>
41368 </interface>
41369 -<interface name="userdom_user_home_dir_filetrans" lineno="2633">
41370 +<interface name="userdom_user_home_dir_filetrans" lineno="2679">
41371 <summary>
41372 Create objects in a user home directory
41373 with an automatic type transition to
41374 @@ -122938,7 +125422,7 @@ The name of the object being created.
41375 </summary>
41376 </param>
41377 </interface>
41378 -<interface name="userdom_user_home_content_filetrans" lineno="2670">
41379 +<interface name="userdom_user_home_content_filetrans" lineno="2716">
41380 <summary>
41381 Create objects in a directory located
41382 in a user home directory with an
41383 @@ -122966,7 +125450,7 @@ The name of the object being created.
41384 </summary>
41385 </param>
41386 </interface>
41387 -<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2701">
41388 +<interface name="userdom_user_home_dir_filetrans_user_cert" lineno="2747">
41389 <summary>
41390 Automatically use the user_cert_t label for selected resources
41391 created in a users home directory
41392 @@ -122987,7 +125471,7 @@ Name of the resource that is being created
41393 </summary>
41394 </param>
41395 </interface>
41396 -<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2731">
41397 +<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2777">
41398 <summary>
41399 Create objects in a user home directory
41400 with an automatic type transition to
41401 @@ -123009,7 +125493,27 @@ The name of the object being created.
41402 </summary>
41403 </param>
41404 </interface>
41405 -<interface name="userdom_read_user_certs" lineno="2751">
41406 +<interface name="userdom_exec_user_bin_files" lineno="2796">
41407 +<summary>
41408 +Execute user executable files.
41409 +</summary>
41410 +<param name="domain">
41411 +<summary>
41412 +Domain allowed access.
41413 +</summary>
41414 +</param>
41415 +</interface>
41416 +<interface name="userdom_manage_user_bin" lineno="2816">
41417 +<summary>
41418 +Manage user executable files.
41419 +</summary>
41420 +<param name="domain">
41421 +<summary>
41422 +Domain allowed access.
41423 +</summary>
41424 +</param>
41425 +</interface>
41426 +<interface name="userdom_read_user_certs" lineno="2838">
41427 <summary>
41428 Read user SSL certificates.
41429 </summary>
41430 @@ -123020,7 +125524,7 @@ Domain allowed access.
41431 </param>
41432 <rolecap/>
41433 </interface>
41434 -<interface name="userdom_dontaudit_manage_user_certs" lineno="2774">
41435 +<interface name="userdom_dontaudit_manage_user_certs" lineno="2861">
41436 <summary>
41437 Do not audit attempts to manage
41438 the user SSL certificates.
41439 @@ -123032,7 +125536,7 @@ Domain allowed access.
41440 </param>
41441 <rolecap/>
41442 </interface>
41443 -<interface name="userdom_manage_user_certs" lineno="2794">
41444 +<interface name="userdom_manage_user_certs" lineno="2881">
41445 <summary>
41446 Manage user SSL certificates.
41447 </summary>
41448 @@ -123042,7 +125546,7 @@ Domain allowed access.
41449 </summary>
41450 </param>
41451 </interface>
41452 -<interface name="userdom_write_user_tmp_sockets" lineno="2815">
41453 +<interface name="userdom_write_user_tmp_sockets" lineno="2902">
41454 <summary>
41455 Write to user temporary named sockets.
41456 </summary>
41457 @@ -123052,7 +125556,7 @@ Domain allowed access.
41458 </summary>
41459 </param>
41460 </interface>
41461 -<interface name="userdom_list_user_tmp" lineno="2835">
41462 +<interface name="userdom_list_user_tmp" lineno="2922">
41463 <summary>
41464 List user temporary directories.
41465 </summary>
41466 @@ -123062,7 +125566,7 @@ Domain allowed access.
41467 </summary>
41468 </param>
41469 </interface>
41470 -<interface name="userdom_dontaudit_list_user_tmp" lineno="2857">
41471 +<interface name="userdom_dontaudit_list_user_tmp" lineno="2944">
41472 <summary>
41473 Do not audit attempts to list user
41474 temporary directories.
41475 @@ -123073,7 +125577,7 @@ Domain to not audit.
41476 </summary>
41477 </param>
41478 </interface>
41479 -<interface name="userdom_delete_user_tmp_dirs" lineno="2875">
41480 +<interface name="userdom_delete_user_tmp_dirs" lineno="2962">
41481 <summary>
41482 Delete users temporary directories.
41483 </summary>
41484 @@ -123083,7 +125587,7 @@ Domain allowed access.
41485 </summary>
41486 </param>
41487 </interface>
41488 -<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2894">
41489 +<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2981">
41490 <summary>
41491 Do not audit attempts to manage users
41492 temporary directories.
41493 @@ -123094,7 +125598,7 @@ Domain to not audit.
41494 </summary>
41495 </param>
41496 </interface>
41497 -<interface name="userdom_read_user_tmp_files" lineno="2912">
41498 +<interface name="userdom_read_user_tmp_files" lineno="2999">
41499 <summary>
41500 Read user temporary files.
41501 </summary>
41502 @@ -123104,7 +125608,7 @@ Domain allowed access.
41503 </summary>
41504 </param>
41505 </interface>
41506 -<interface name="userdom_map_user_tmp_files" lineno="2933">
41507 +<interface name="userdom_map_user_tmp_files" lineno="3020">
41508 <summary>
41509 Map user temporary files.
41510 </summary>
41511 @@ -123114,7 +125618,7 @@ Domain allowed access.
41512 </summary>
41513 </param>
41514 </interface>
41515 -<interface name="userdom_dontaudit_read_user_tmp_files" lineno="2952">
41516 +<interface name="userdom_dontaudit_read_user_tmp_files" lineno="3039">
41517 <summary>
41518 Do not audit attempts to read users
41519 temporary files.
41520 @@ -123125,7 +125629,7 @@ Domain to not audit.
41521 </summary>
41522 </param>
41523 </interface>
41524 -<interface name="userdom_dontaudit_append_user_tmp_files" lineno="2971">
41525 +<interface name="userdom_dontaudit_append_user_tmp_files" lineno="3058">
41526 <summary>
41527 Do not audit attempts to append users
41528 temporary files.
41529 @@ -123136,7 +125640,7 @@ Domain to not audit.
41530 </summary>
41531 </param>
41532 </interface>
41533 -<interface name="userdom_rw_user_tmp_files" lineno="2989">
41534 +<interface name="userdom_rw_user_tmp_files" lineno="3076">
41535 <summary>
41536 Read and write user temporary files.
41537 </summary>
41538 @@ -123146,7 +125650,7 @@ Domain allowed access.
41539 </summary>
41540 </param>
41541 </interface>
41542 -<interface name="userdom_delete_user_tmp_files" lineno="3010">
41543 +<interface name="userdom_delete_user_tmp_files" lineno="3097">
41544 <summary>
41545 Delete users temporary files.
41546 </summary>
41547 @@ -123156,7 +125660,7 @@ Domain allowed access.
41548 </summary>
41549 </param>
41550 </interface>
41551 -<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="3029">
41552 +<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="3116">
41553 <summary>
41554 Do not audit attempts to manage users
41555 temporary files.
41556 @@ -123167,7 +125671,7 @@ Domain to not audit.
41557 </summary>
41558 </param>
41559 </interface>
41560 -<interface name="userdom_read_user_tmp_symlinks" lineno="3047">
41561 +<interface name="userdom_read_user_tmp_symlinks" lineno="3134">
41562 <summary>
41563 Read user temporary symbolic links.
41564 </summary>
41565 @@ -123177,7 +125681,7 @@ Domain allowed access.
41566 </summary>
41567 </param>
41568 </interface>
41569 -<interface name="userdom_delete_user_tmp_symlinks" lineno="3068">
41570 +<interface name="userdom_delete_user_tmp_symlinks" lineno="3155">
41571 <summary>
41572 Delete users temporary symbolic links.
41573 </summary>
41574 @@ -123187,7 +125691,7 @@ Domain allowed access.
41575 </summary>
41576 </param>
41577 </interface>
41578 -<interface name="userdom_manage_user_tmp_dirs" lineno="3087">
41579 +<interface name="userdom_manage_user_tmp_dirs" lineno="3174">
41580 <summary>
41581 Create, read, write, and delete user
41582 temporary directories.
41583 @@ -123198,7 +125702,7 @@ Domain allowed access.
41584 </summary>
41585 </param>
41586 </interface>
41587 -<interface name="userdom_delete_user_tmp_named_pipes" lineno="3107">
41588 +<interface name="userdom_delete_user_tmp_named_pipes" lineno="3194">
41589 <summary>
41590 Delete users temporary named pipes.
41591 </summary>
41592 @@ -123208,7 +125712,7 @@ Domain allowed access.
41593 </summary>
41594 </param>
41595 </interface>
41596 -<interface name="userdom_manage_user_tmp_files" lineno="3126">
41597 +<interface name="userdom_manage_user_tmp_files" lineno="3213">
41598 <summary>
41599 Create, read, write, and delete user
41600 temporary files.
41601 @@ -123219,7 +125723,7 @@ Domain allowed access.
41602 </summary>
41603 </param>
41604 </interface>
41605 -<interface name="userdom_delete_user_tmp_named_sockets" lineno="3146">
41606 +<interface name="userdom_delete_user_tmp_named_sockets" lineno="3233">
41607 <summary>
41608 Delete users temporary named sockets.
41609 </summary>
41610 @@ -123229,7 +125733,7 @@ Domain allowed access.
41611 </summary>
41612 </param>
41613 </interface>
41614 -<interface name="userdom_manage_user_tmp_symlinks" lineno="3165">
41615 +<interface name="userdom_manage_user_tmp_symlinks" lineno="3252">
41616 <summary>
41617 Create, read, write, and delete user
41618 temporary symbolic links.
41619 @@ -123240,7 +125744,7 @@ Domain allowed access.
41620 </summary>
41621 </param>
41622 </interface>
41623 -<interface name="userdom_dontaudit_rw_user_tmp_pipes" lineno="3186">
41624 +<interface name="userdom_dontaudit_rw_user_tmp_pipes" lineno="3273">
41625 <summary>
41626 Do not audit attempts to read and write
41627 temporary pipes.
41628 @@ -123251,7 +125755,7 @@ Domain allowed access.
41629 </summary>
41630 </param>
41631 </interface>
41632 -<interface name="userdom_manage_user_tmp_pipes" lineno="3205">
41633 +<interface name="userdom_manage_user_tmp_pipes" lineno="3292">
41634 <summary>
41635 Create, read, write, and delete user
41636 temporary named pipes.
41637 @@ -123262,7 +125766,7 @@ Domain allowed access.
41638 </summary>
41639 </param>
41640 </interface>
41641 -<interface name="userdom_manage_user_tmp_sockets" lineno="3226">
41642 +<interface name="userdom_manage_user_tmp_sockets" lineno="3313">
41643 <summary>
41644 Create, read, write, and delete user
41645 temporary named sockets.
41646 @@ -123273,7 +125777,7 @@ Domain allowed access.
41647 </summary>
41648 </param>
41649 </interface>
41650 -<interface name="userdom_user_tmp_filetrans" lineno="3263">
41651 +<interface name="userdom_user_tmp_filetrans" lineno="3350">
41652 <summary>
41653 Create objects in a user temporary directory
41654 with an automatic type transition to
41655 @@ -123300,7 +125804,7 @@ The name of the object being created.
41656 </summary>
41657 </param>
41658 </interface>
41659 -<interface name="userdom_tmp_filetrans_user_tmp" lineno="3295">
41660 +<interface name="userdom_tmp_filetrans_user_tmp" lineno="3382">
41661 <summary>
41662 Create objects in the temporary directory
41663 with an automatic type transition to
41664 @@ -123322,7 +125826,7 @@ The name of the object being created.
41665 </summary>
41666 </param>
41667 </interface>
41668 -<interface name="userdom_map_user_tmpfs_files" lineno="3313">
41669 +<interface name="userdom_map_user_tmpfs_files" lineno="3400">
41670 <summary>
41671 Map user tmpfs files.
41672 </summary>
41673 @@ -123332,7 +125836,7 @@ Domain allowed access.
41674 </summary>
41675 </param>
41676 </interface>
41677 -<interface name="userdom_read_user_tmpfs_files" lineno="3331">
41678 +<interface name="userdom_read_user_tmpfs_files" lineno="3418">
41679 <summary>
41680 Read user tmpfs files.
41681 </summary>
41682 @@ -123342,7 +125846,7 @@ Domain allowed access.
41683 </summary>
41684 </param>
41685 </interface>
41686 -<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3351">
41687 +<interface name="userdom_dontaudit_read_user_tmpfs_files" lineno="3438">
41688 <summary>
41689 dontaudit Read attempts of user tmpfs files.
41690 </summary>
41691 @@ -123352,7 +125856,7 @@ Domain allowed access.
41692 </summary>
41693 </param>
41694 </interface>
41695 -<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3370">
41696 +<interface name="userdom_relabel_user_tmpfs_dirs" lineno="3457">
41697 <summary>
41698 relabel to/from user tmpfs dirs
41699 </summary>
41700 @@ -123362,7 +125866,7 @@ Domain allowed access.
41701 </summary>
41702 </param>
41703 </interface>
41704 -<interface name="userdom_relabel_user_tmpfs_files" lineno="3389">
41705 +<interface name="userdom_relabel_user_tmpfs_files" lineno="3476">
41706 <summary>
41707 relabel to/from user tmpfs files
41708 </summary>
41709 @@ -123372,7 +125876,7 @@ Domain allowed access.
41710 </summary>
41711 </param>
41712 </interface>
41713 -<interface name="userdom_user_runtime_content" lineno="3411">
41714 +<interface name="userdom_user_runtime_content" lineno="3498">
41715 <summary>
41716 Make the specified type usable in
41717 the directory /run/user/%{USERID}/.
41718 @@ -123384,7 +125888,7 @@ user_runtime_content_dir_t.
41719 </summary>
41720 </param>
41721 </interface>
41722 -<interface name="userdom_search_user_runtime" lineno="3431">
41723 +<interface name="userdom_search_user_runtime" lineno="3518">
41724 <summary>
41725 Search users runtime directories.
41726 </summary>
41727 @@ -123394,7 +125898,7 @@ Domain allowed access.
41728 </summary>
41729 </param>
41730 </interface>
41731 -<interface name="userdom_search_user_runtime_root" lineno="3450">
41732 +<interface name="userdom_search_user_runtime_root" lineno="3537">
41733 <summary>
41734 Search user runtime root directories.
41735 </summary>
41736 @@ -123404,7 +125908,18 @@ Domain allowed access.
41737 </summary>
41738 </param>
41739 </interface>
41740 -<interface name="userdom_manage_user_runtime_root_dirs" lineno="3470">
41741 +<interface name="userdom_dontaudit_search_user_runtime_root" lineno="3557">
41742 +<summary>
41743 +Do not audit attempts to search
41744 +user runtime root directories.
41745 +</summary>
41746 +<param name="domain">
41747 +<summary>
41748 +Domain to not audit.
41749 +</summary>
41750 +</param>
41751 +</interface>
41752 +<interface name="userdom_manage_user_runtime_root_dirs" lineno="3576">
41753 <summary>
41754 Create, read, write, and delete user
41755 runtime root dirs.
41756 @@ -123415,7 +125930,7 @@ Domain allowed access.
41757 </summary>
41758 </param>
41759 </interface>
41760 -<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3489">
41761 +<interface name="userdom_relabel_user_runtime_root_dirs" lineno="3595">
41762 <summary>
41763 Relabel to and from user runtime root dirs.
41764 </summary>
41765 @@ -123425,7 +125940,7 @@ Domain allowed access.
41766 </summary>
41767 </param>
41768 </interface>
41769 -<interface name="userdom_manage_user_runtime_dirs" lineno="3508">
41770 +<interface name="userdom_manage_user_runtime_dirs" lineno="3614">
41771 <summary>
41772 Create, read, write, and delete user
41773 runtime dirs.
41774 @@ -123436,7 +125951,7 @@ Domain allowed access.
41775 </summary>
41776 </param>
41777 </interface>
41778 -<interface name="userdom_mounton_user_runtime_dirs" lineno="3528">
41779 +<interface name="userdom_mounton_user_runtime_dirs" lineno="3634">
41780 <summary>
41781 Mount a filesystem on user runtime dir
41782 directories.
41783 @@ -123447,7 +125962,7 @@ Domain allowed access.
41784 </summary>
41785 </param>
41786 </interface>
41787 -<interface name="userdom_relabelto_user_runtime_dirs" lineno="3546">
41788 +<interface name="userdom_relabelto_user_runtime_dirs" lineno="3652">
41789 <summary>
41790 Relabel to user runtime directories.
41791 </summary>
41792 @@ -123457,7 +125972,7 @@ Domain allowed access.
41793 </summary>
41794 </param>
41795 </interface>
41796 -<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3564">
41797 +<interface name="userdom_relabelfrom_user_runtime_dirs" lineno="3670">
41798 <summary>
41799 Relabel from user runtime directories.
41800 </summary>
41801 @@ -123467,7 +125982,7 @@ Domain allowed access.
41802 </summary>
41803 </param>
41804 </interface>
41805 -<interface name="userdom_delete_user_runtime_files" lineno="3582">
41806 +<interface name="userdom_delete_user_runtime_files" lineno="3688">
41807 <summary>
41808 delete user runtime files
41809 </summary>
41810 @@ -123477,7 +125992,7 @@ Domain allowed access.
41811 </summary>
41812 </param>
41813 </interface>
41814 -<interface name="userdom_search_all_user_runtime" lineno="3601">
41815 +<interface name="userdom_search_all_user_runtime" lineno="3707">
41816 <summary>
41817 Search users runtime directories.
41818 </summary>
41819 @@ -123487,7 +126002,7 @@ Domain allowed access.
41820 </summary>
41821 </param>
41822 </interface>
41823 -<interface name="userdom_list_all_user_runtime" lineno="3620">
41824 +<interface name="userdom_list_all_user_runtime" lineno="3726">
41825 <summary>
41826 List user runtime directories.
41827 </summary>
41828 @@ -123497,7 +126012,7 @@ Domain allowed access.
41829 </summary>
41830 </param>
41831 </interface>
41832 -<interface name="userdom_delete_all_user_runtime_dirs" lineno="3639">
41833 +<interface name="userdom_delete_all_user_runtime_dirs" lineno="3745">
41834 <summary>
41835 delete user runtime directories
41836 </summary>
41837 @@ -123507,7 +126022,7 @@ Domain allowed access.
41838 </summary>
41839 </param>
41840 </interface>
41841 -<interface name="userdom_delete_all_user_runtime_files" lineno="3657">
41842 +<interface name="userdom_delete_all_user_runtime_files" lineno="3763">
41843 <summary>
41844 delete user runtime files
41845 </summary>
41846 @@ -123517,7 +126032,7 @@ Domain allowed access.
41847 </summary>
41848 </param>
41849 </interface>
41850 -<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3675">
41851 +<interface name="userdom_delete_all_user_runtime_symlinks" lineno="3781">
41852 <summary>
41853 delete user runtime symlink files
41854 </summary>
41855 @@ -123527,7 +126042,7 @@ Domain allowed access.
41856 </summary>
41857 </param>
41858 </interface>
41859 -<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3693">
41860 +<interface name="userdom_delete_all_user_runtime_named_pipes" lineno="3799">
41861 <summary>
41862 delete user runtime fifo files
41863 </summary>
41864 @@ -123537,7 +126052,7 @@ Domain allowed access.
41865 </summary>
41866 </param>
41867 </interface>
41868 -<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3711">
41869 +<interface name="userdom_delete_all_user_runtime_named_sockets" lineno="3817">
41870 <summary>
41871 delete user runtime socket files
41872 </summary>
41873 @@ -123547,7 +126062,7 @@ Domain allowed access.
41874 </summary>
41875 </param>
41876 </interface>
41877 -<interface name="userdom_delete_all_user_runtime_blk_files" lineno="3729">
41878 +<interface name="userdom_delete_all_user_runtime_blk_files" lineno="3835">
41879 <summary>
41880 delete user runtime blk files
41881 </summary>
41882 @@ -123557,7 +126072,7 @@ Domain allowed access.
41883 </summary>
41884 </param>
41885 </interface>
41886 -<interface name="userdom_delete_all_user_runtime_chr_files" lineno="3747">
41887 +<interface name="userdom_delete_all_user_runtime_chr_files" lineno="3853">
41888 <summary>
41889 delete user runtime chr files
41890 </summary>
41891 @@ -123567,7 +126082,7 @@ Domain allowed access.
41892 </summary>
41893 </param>
41894 </interface>
41895 -<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3777">
41896 +<interface name="userdom_pid_filetrans_user_runtime_root" lineno="3883">
41897 <summary>
41898 Create objects in the pid directory
41899 with an automatic type transition to
41900 @@ -123589,7 +126104,7 @@ The name of the object being created.
41901 </summary>
41902 </param>
41903 </interface>
41904 -<interface name="userdom_runtime_filetrans_user_runtime_root" lineno="3804">
41905 +<interface name="userdom_runtime_filetrans_user_runtime_root" lineno="3910">
41906 <summary>
41907 Create objects in the runtime directory
41908 with an automatic type transition to
41909 @@ -123611,7 +126126,7 @@ The name of the object being created.
41910 </summary>
41911 </param>
41912 </interface>
41913 -<interface name="userdom_user_runtime_filetrans" lineno="3840">
41914 +<interface name="userdom_user_runtime_filetrans" lineno="3946">
41915 <summary>
41916 Create objects in a user runtime
41917 directory with an automatic type
41918 @@ -123639,7 +126154,7 @@ The name of the object being created.
41919 </summary>
41920 </param>
41921 </interface>
41922 -<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3871">
41923 +<interface name="userdom_user_runtime_filetrans_user_tmp" lineno="3977">
41924 <summary>
41925 Create objects in the user runtime directory
41926 with an automatic type transition to
41927 @@ -123661,7 +126176,7 @@ The name of the object being created.
41928 </summary>
41929 </param>
41930 </interface>
41931 -<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="3901">
41932 +<interface name="userdom_user_runtime_root_filetrans_user_runtime" lineno="4007">
41933 <summary>
41934 Create objects in the user runtime root
41935 directory with an automatic type transition
41936 @@ -123683,7 +126198,7 @@ The name of the object being created.
41937 </summary>
41938 </param>
41939 </interface>
41940 -<interface name="userdom_user_run_filetrans_user_runtime" lineno="3932">
41941 +<interface name="userdom_user_run_filetrans_user_runtime" lineno="4038">
41942 <summary>
41943 Create objects in the user runtime root
41944 directory with an automatic type transition
41945 @@ -123705,7 +126220,7 @@ The name of the object being created.
41946 </summary>
41947 </param>
41948 </interface>
41949 -<interface name="userdom_rw_user_tmpfs_files" lineno="3950">
41950 +<interface name="userdom_rw_user_tmpfs_files" lineno="4056">
41951 <summary>
41952 Read and write user tmpfs files.
41953 </summary>
41954 @@ -123715,7 +126230,7 @@ Domain allowed access.
41955 </summary>
41956 </param>
41957 </interface>
41958 -<interface name="userdom_delete_user_tmpfs_files" lineno="3971">
41959 +<interface name="userdom_delete_user_tmpfs_files" lineno="4077">
41960 <summary>
41961 Delete user tmpfs files.
41962 </summary>
41963 @@ -123725,7 +126240,7 @@ Domain allowed access.
41964 </summary>
41965 </param>
41966 </interface>
41967 -<interface name="userdom_manage_user_tmpfs_files" lineno="3990">
41968 +<interface name="userdom_manage_user_tmpfs_files" lineno="4096">
41969 <summary>
41970 Create, read, write, and delete user tmpfs files.
41971 </summary>
41972 @@ -123735,7 +126250,7 @@ Domain allowed access.
41973 </summary>
41974 </param>
41975 </interface>
41976 -<interface name="userdom_getattr_user_ttys" lineno="4010">
41977 +<interface name="userdom_getattr_user_ttys" lineno="4116">
41978 <summary>
41979 Get the attributes of a user domain tty.
41980 </summary>
41981 @@ -123745,7 +126260,7 @@ Domain allowed access.
41982 </summary>
41983 </param>
41984 </interface>
41985 -<interface name="userdom_dontaudit_getattr_user_ttys" lineno="4028">
41986 +<interface name="userdom_dontaudit_getattr_user_ttys" lineno="4134">
41987 <summary>
41988 Do not audit attempts to get the attributes of a user domain tty.
41989 </summary>
41990 @@ -123755,7 +126270,7 @@ Domain to not audit.
41991 </summary>
41992 </param>
41993 </interface>
41994 -<interface name="userdom_setattr_user_ttys" lineno="4046">
41995 +<interface name="userdom_setattr_user_ttys" lineno="4152">
41996 <summary>
41997 Set the attributes of a user domain tty.
41998 </summary>
41999 @@ -123765,7 +126280,7 @@ Domain allowed access.
42000 </summary>
42001 </param>
42002 </interface>
42003 -<interface name="userdom_dontaudit_setattr_user_ttys" lineno="4064">
42004 +<interface name="userdom_dontaudit_setattr_user_ttys" lineno="4170">
42005 <summary>
42006 Do not audit attempts to set the attributes of a user domain tty.
42007 </summary>
42008 @@ -123775,7 +126290,7 @@ Domain to not audit.
42009 </summary>
42010 </param>
42011 </interface>
42012 -<interface name="userdom_use_user_ttys" lineno="4082">
42013 +<interface name="userdom_use_user_ttys" lineno="4188">
42014 <summary>
42015 Read and write a user domain tty.
42016 </summary>
42017 @@ -123785,7 +126300,7 @@ Domain allowed access.
42018 </summary>
42019 </param>
42020 </interface>
42021 -<interface name="userdom_use_user_ptys" lineno="4100">
42022 +<interface name="userdom_use_user_ptys" lineno="4206">
42023 <summary>
42024 Read and write a user domain pty.
42025 </summary>
42026 @@ -123795,7 +126310,7 @@ Domain allowed access.
42027 </summary>
42028 </param>
42029 </interface>
42030 -<interface name="userdom_use_inherited_user_terminals" lineno="4135">
42031 +<interface name="userdom_use_inherited_user_terminals" lineno="4241">
42032 <summary>
42033 Read and write a user TTYs and PTYs.
42034 </summary>
42035 @@ -123821,7 +126336,7 @@ Domain allowed access.
42036 </param>
42037 <infoflow type="both" weight="10"/>
42038 </interface>
42039 -<interface name="userdom_use_user_terminals" lineno="4176">
42040 +<interface name="userdom_use_user_terminals" lineno="4282">
42041 <summary>
42042 Read, write and open a user TTYs and PTYs.
42043 </summary>
42044 @@ -123853,7 +126368,7 @@ Domain allowed access.
42045 </param>
42046 <infoflow type="both" weight="10"/>
42047 </interface>
42048 -<interface name="userdom_dontaudit_use_user_terminals" lineno="4192">
42049 +<interface name="userdom_dontaudit_use_user_terminals" lineno="4298">
42050 <summary>
42051 Do not audit attempts to read and write
42052 a user domain tty and pty.
42053 @@ -123864,7 +126379,7 @@ Domain to not audit.
42054 </summary>
42055 </param>
42056 </interface>
42057 -<interface name="userdom_spec_domtrans_all_users" lineno="4213">
42058 +<interface name="userdom_spec_domtrans_all_users" lineno="4319">
42059 <summary>
42060 Execute a shell in all user domains. This
42061 is an explicit transition, requiring the
42062 @@ -123876,7 +126391,7 @@ Domain allowed to transition.
42063 </summary>
42064 </param>
42065 </interface>
42066 -<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4236">
42067 +<interface name="userdom_xsession_spec_domtrans_all_users" lineno="4342">
42068 <summary>
42069 Execute an Xserver session in all user domains. This
42070 is an explicit transition, requiring the
42071 @@ -123888,7 +126403,7 @@ Domain allowed to transition.
42072 </summary>
42073 </param>
42074 </interface>
42075 -<interface name="userdom_spec_domtrans_unpriv_users" lineno="4259">
42076 +<interface name="userdom_spec_domtrans_unpriv_users" lineno="4365">
42077 <summary>
42078 Execute a shell in all unprivileged user domains. This
42079 is an explicit transition, requiring the
42080 @@ -123900,7 +126415,7 @@ Domain allowed to transition.
42081 </summary>
42082 </param>
42083 </interface>
42084 -<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4282">
42085 +<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="4388">
42086 <summary>
42087 Execute an Xserver session in all unprivileged user domains. This
42088 is an explicit transition, requiring the
42089 @@ -123912,7 +126427,7 @@ Domain allowed to transition.
42090 </summary>
42091 </param>
42092 </interface>
42093 -<interface name="userdom_rw_unpriv_user_semaphores" lineno="4303">
42094 +<interface name="userdom_rw_unpriv_user_semaphores" lineno="4409">
42095 <summary>
42096 Read and write unpriviledged user SysV sempaphores.
42097 </summary>
42098 @@ -123922,7 +126437,7 @@ Domain allowed access.
42099 </summary>
42100 </param>
42101 </interface>
42102 -<interface name="userdom_manage_unpriv_user_semaphores" lineno="4321">
42103 +<interface name="userdom_manage_unpriv_user_semaphores" lineno="4427">
42104 <summary>
42105 Manage unpriviledged user SysV sempaphores.
42106 </summary>
42107 @@ -123932,7 +126447,7 @@ Domain allowed access.
42108 </summary>
42109 </param>
42110 </interface>
42111 -<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4340">
42112 +<interface name="userdom_rw_unpriv_user_shared_mem" lineno="4446">
42113 <summary>
42114 Read and write unpriviledged user SysV shared
42115 memory segments.
42116 @@ -123943,7 +126458,7 @@ Domain allowed access.
42117 </summary>
42118 </param>
42119 </interface>
42120 -<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4359">
42121 +<interface name="userdom_manage_unpriv_user_shared_mem" lineno="4465">
42122 <summary>
42123 Manage unpriviledged user SysV shared
42124 memory segments.
42125 @@ -123954,7 +126469,7 @@ Domain allowed access.
42126 </summary>
42127 </param>
42128 </interface>
42129 -<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4379">
42130 +<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="4485">
42131 <summary>
42132 Execute bin_t in the unprivileged user domains. This
42133 is an explicit transition, requiring the
42134 @@ -123966,7 +126481,7 @@ Domain allowed to transition.
42135 </summary>
42136 </param>
42137 </interface>
42138 -<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4402">
42139 +<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="4508">
42140 <summary>
42141 Execute all entrypoint files in unprivileged user
42142 domains. This is an explicit transition, requiring the
42143 @@ -123978,7 +126493,7 @@ Domain allowed access.
42144 </summary>
42145 </param>
42146 </interface>
42147 -<interface name="userdom_search_user_home_content" lineno="4423">
42148 +<interface name="userdom_search_user_home_content" lineno="4529">
42149 <summary>
42150 Search users home directories.
42151 </summary>
42152 @@ -123988,7 +126503,7 @@ Domain allowed access.
42153 </summary>
42154 </param>
42155 </interface>
42156 -<interface name="userdom_signull_unpriv_users" lineno="4442">
42157 +<interface name="userdom_signull_unpriv_users" lineno="4548">
42158 <summary>
42159 Send signull to unprivileged user domains.
42160 </summary>
42161 @@ -123998,7 +126513,7 @@ Domain allowed access.
42162 </summary>
42163 </param>
42164 </interface>
42165 -<interface name="userdom_signal_unpriv_users" lineno="4460">
42166 +<interface name="userdom_signal_unpriv_users" lineno="4566">
42167 <summary>
42168 Send general signals to unprivileged user domains.
42169 </summary>
42170 @@ -124008,7 +126523,7 @@ Domain allowed access.
42171 </summary>
42172 </param>
42173 </interface>
42174 -<interface name="userdom_use_unpriv_users_fds" lineno="4478">
42175 +<interface name="userdom_use_unpriv_users_fds" lineno="4584">
42176 <summary>
42177 Inherit the file descriptors from unprivileged user domains.
42178 </summary>
42179 @@ -124018,7 +126533,7 @@ Domain allowed access.
42180 </summary>
42181 </param>
42182 </interface>
42183 -<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4506">
42184 +<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="4612">
42185 <summary>
42186 Do not audit attempts to inherit the file descriptors
42187 from unprivileged user domains.
42188 @@ -124038,7 +126553,7 @@ Domain to not audit.
42189 </param>
42190 <infoflow type="none"/>
42191 </interface>
42192 -<interface name="userdom_dontaudit_use_user_ptys" lineno="4524">
42193 +<interface name="userdom_dontaudit_use_user_ptys" lineno="4630">
42194 <summary>
42195 Do not audit attempts to use user ptys.
42196 </summary>
42197 @@ -124048,7 +126563,7 @@ Domain to not audit.
42198 </summary>
42199 </param>
42200 </interface>
42201 -<interface name="userdom_relabelto_user_ptys" lineno="4542">
42202 +<interface name="userdom_relabelto_user_ptys" lineno="4648">
42203 <summary>
42204 Relabel files to unprivileged user pty types.
42205 </summary>
42206 @@ -124058,7 +126573,7 @@ Domain allowed access.
42207 </summary>
42208 </param>
42209 </interface>
42210 -<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4561">
42211 +<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="4667">
42212 <summary>
42213 Do not audit attempts to relabel files from
42214 user pty types.
42215 @@ -124069,7 +126584,7 @@ Domain to not audit.
42216 </summary>
42217 </param>
42218 </interface>
42219 -<interface name="userdom_write_user_tmp_files" lineno="4579">
42220 +<interface name="userdom_write_user_tmp_files" lineno="4685">
42221 <summary>
42222 Write all users files in /tmp
42223 </summary>
42224 @@ -124079,7 +126594,7 @@ Domain allowed access.
42225 </summary>
42226 </param>
42227 </interface>
42228 -<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4598">
42229 +<interface name="userdom_dontaudit_write_user_tmp_files" lineno="4704">
42230 <summary>
42231 Do not audit attempts to write users
42232 temporary files.
42233 @@ -124090,7 +126605,7 @@ Domain to not audit.
42234 </summary>
42235 </param>
42236 </interface>
42237 -<interface name="userdom_dontaudit_use_user_ttys" lineno="4616">
42238 +<interface name="userdom_dontaudit_use_user_ttys" lineno="4722">
42239 <summary>
42240 Do not audit attempts to use user ttys.
42241 </summary>
42242 @@ -124100,7 +126615,7 @@ Domain to not audit.
42243 </summary>
42244 </param>
42245 </interface>
42246 -<interface name="userdom_read_all_users_state" lineno="4634">
42247 +<interface name="userdom_read_all_users_state" lineno="4740">
42248 <summary>
42249 Read the process state of all user domains.
42250 </summary>
42251 @@ -124110,7 +126625,7 @@ Domain allowed access.
42252 </summary>
42253 </param>
42254 </interface>
42255 -<interface name="userdom_getattr_all_users" lineno="4654">
42256 +<interface name="userdom_getattr_all_users" lineno="4760">
42257 <summary>
42258 Get the attributes of all user domains.
42259 </summary>
42260 @@ -124120,7 +126635,7 @@ Domain allowed access.
42261 </summary>
42262 </param>
42263 </interface>
42264 -<interface name="userdom_use_all_users_fds" lineno="4672">
42265 +<interface name="userdom_use_all_users_fds" lineno="4778">
42266 <summary>
42267 Inherit the file descriptors from all user domains
42268 </summary>
42269 @@ -124130,7 +126645,7 @@ Domain allowed access.
42270 </summary>
42271 </param>
42272 </interface>
42273 -<interface name="userdom_dontaudit_use_all_users_fds" lineno="4691">
42274 +<interface name="userdom_dontaudit_use_all_users_fds" lineno="4797">
42275 <summary>
42276 Do not audit attempts to inherit the file
42277 descriptors from any user domains.
42278 @@ -124141,7 +126656,7 @@ Domain to not audit.
42279 </summary>
42280 </param>
42281 </interface>
42282 -<interface name="userdom_signal_all_users" lineno="4709">
42283 +<interface name="userdom_signal_all_users" lineno="4815">
42284 <summary>
42285 Send general signals to all user domains.
42286 </summary>
42287 @@ -124151,7 +126666,7 @@ Domain allowed access.
42288 </summary>
42289 </param>
42290 </interface>
42291 -<interface name="userdom_sigchld_all_users" lineno="4727">
42292 +<interface name="userdom_sigchld_all_users" lineno="4833">
42293 <summary>
42294 Send a SIGCHLD signal to all user domains.
42295 </summary>
42296 @@ -124161,7 +126676,7 @@ Domain allowed access.
42297 </summary>
42298 </param>
42299 </interface>
42300 -<interface name="userdom_read_all_users_keys" lineno="4745">
42301 +<interface name="userdom_read_all_users_keys" lineno="4851">
42302 <summary>
42303 Read keys for all user domains.
42304 </summary>
42305 @@ -124171,7 +126686,7 @@ Domain allowed access.
42306 </summary>
42307 </param>
42308 </interface>
42309 -<interface name="userdom_write_all_users_keys" lineno="4763">
42310 +<interface name="userdom_write_all_users_keys" lineno="4869">
42311 <summary>
42312 Write keys for all user domains.
42313 </summary>
42314 @@ -124181,7 +126696,7 @@ Domain allowed access.
42315 </summary>
42316 </param>
42317 </interface>
42318 -<interface name="userdom_rw_all_users_keys" lineno="4781">
42319 +<interface name="userdom_rw_all_users_keys" lineno="4887">
42320 <summary>
42321 Read and write keys for all user domains.
42322 </summary>
42323 @@ -124191,7 +126706,7 @@ Domain allowed access.
42324 </summary>
42325 </param>
42326 </interface>
42327 -<interface name="userdom_create_all_users_keys" lineno="4799">
42328 +<interface name="userdom_create_all_users_keys" lineno="4905">
42329 <summary>
42330 Create keys for all user domains.
42331 </summary>
42332 @@ -124201,7 +126716,7 @@ Domain allowed access.
42333 </summary>
42334 </param>
42335 </interface>
42336 -<interface name="userdom_manage_all_users_keys" lineno="4817">
42337 +<interface name="userdom_manage_all_users_keys" lineno="4923">
42338 <summary>
42339 Manage keys for all user domains.
42340 </summary>
42341 @@ -124211,7 +126726,7 @@ Domain allowed access.
42342 </summary>
42343 </param>
42344 </interface>
42345 -<interface name="userdom_dbus_send_all_users" lineno="4835">
42346 +<interface name="userdom_dbus_send_all_users" lineno="4941">
42347 <summary>
42348 Send a dbus message to all user domains.
42349 </summary>
42350 @@ -124221,7 +126736,7 @@ Domain allowed access.
42351 </summary>
42352 </param>
42353 </interface>
42354 -<interface name="userdom_manage_user_tmp_chr_files" lineno="4857">
42355 +<interface name="userdom_manage_user_tmp_chr_files" lineno="4963">
42356 <summary>
42357 Create, read, write, and delete user
42358 temporary character files.
42359 @@ -124232,7 +126747,7 @@ Domain allowed access.
42360 </summary>
42361 </param>
42362 </interface>
42363 -<interface name="userdom_relabel_user_certs" lineno="4878">
42364 +<interface name="userdom_relabel_user_certs" lineno="4984">
42365 <summary>
42366 Allow relabeling resources to user_cert_t
42367 </summary>
42368 @@ -124242,7 +126757,7 @@ Domain allowed access
42369 </summary>
42370 </param>
42371 </interface>
42372 -<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="4901">
42373 +<interface name="userdom_dontaudit_rw_all_users_stream_sockets" lineno="5007">
42374 <summary>
42375 Do not audit attempts to read and write
42376 unserdomain stream.
42377 @@ -124644,7 +127159,17 @@ Domain allowed access.
42378 </summary>
42379 </param>
42380 </interface>
42381 -<interface name="xdg_watch_data_dirs" lineno="648">
42382 +<interface name="xdg_search_data_dirs" lineno="648">
42383 +<summary>
42384 +Search through the xdg data home directories
42385 +</summary>
42386 +<param name="domain">
42387 +<summary>
42388 +Domain allowed access
42389 +</summary>
42390 +</param>
42391 +</interface>
42392 +<interface name="xdg_watch_data_dirs" lineno="666">
42393 <summary>
42394 Watch the xdg data home directories
42395 </summary>
42396 @@ -124654,7 +127179,7 @@ Domain allowed access.
42397 </summary>
42398 </param>
42399 </interface>
42400 -<interface name="xdg_watch_all_data_dirs" lineno="666">
42401 +<interface name="xdg_watch_all_data_dirs" lineno="684">
42402 <summary>
42403 Watch all the xdg data home directories
42404 </summary>
42405 @@ -124664,7 +127189,7 @@ Domain allowed access.
42406 </summary>
42407 </param>
42408 </interface>
42409 -<interface name="xdg_read_data_files" lineno="684">
42410 +<interface name="xdg_read_data_files" lineno="702">
42411 <summary>
42412 Read the xdg data home files
42413 </summary>
42414 @@ -124674,7 +127199,7 @@ Domain allowed access.
42415 </summary>
42416 </param>
42417 </interface>
42418 -<interface name="xdg_read_all_data_files" lineno="707">
42419 +<interface name="xdg_read_all_data_files" lineno="725">
42420 <summary>
42421 Read all xdg_data_type files
42422 </summary>
42423 @@ -124684,7 +127209,7 @@ Domain allowed access.
42424 </summary>
42425 </param>
42426 </interface>
42427 -<interface name="xdg_data_filetrans" lineno="747">
42428 +<interface name="xdg_data_filetrans" lineno="765">
42429 <summary>
42430 Create objects in an xdg_data directory
42431 with an automatic type transition to
42432 @@ -124711,7 +127236,7 @@ Optional name of the file or directory created
42433 </summary>
42434 </param>
42435 </interface>
42436 -<interface name="xdg_generic_user_home_dir_filetrans_data" lineno="780">
42437 +<interface name="xdg_generic_user_home_dir_filetrans_data" lineno="798">
42438 <summary>
42439 Create objects in the user home dir with an automatic type transition to
42440 the xdg_data_t type.
42441 @@ -124732,7 +127257,7 @@ Name of the directory created
42442 </summary>
42443 </param>
42444 </interface>
42445 -<interface name="xdg_create_data_dirs" lineno="798">
42446 +<interface name="xdg_create_data_dirs" lineno="816">
42447 <summary>
42448 Create xdg data home directories
42449 </summary>
42450 @@ -124742,7 +127267,7 @@ Domain allowed access
42451 </summary>
42452 </param>
42453 </interface>
42454 -<interface name="xdg_manage_data" lineno="816">
42455 +<interface name="xdg_manage_data" lineno="834">
42456 <summary>
42457 Manage the xdg data home files
42458 </summary>
42459 @@ -124752,7 +127277,7 @@ Domain allowed access.
42460 </summary>
42461 </param>
42462 </interface>
42463 -<interface name="xdg_manage_all_data" lineno="841">
42464 +<interface name="xdg_manage_all_data" lineno="859">
42465 <summary>
42466 Manage all the xdg data home files, regardless of their specific type
42467 </summary>
42468 @@ -124762,7 +127287,7 @@ Domain allowed access.
42469 </summary>
42470 </param>
42471 </interface>
42472 -<interface name="xdg_relabel_data" lineno="866">
42473 +<interface name="xdg_relabel_data" lineno="884">
42474 <summary>
42475 Allow relabeling the xdg data home files
42476 </summary>
42477 @@ -124772,7 +127297,7 @@ Domain allowed access.
42478 </summary>
42479 </param>
42480 </interface>
42481 -<interface name="xdg_relabel_all_data" lineno="890">
42482 +<interface name="xdg_relabel_all_data" lineno="908">
42483 <summary>
42484 Allow relabeling the xdg data home files, regardless of their type
42485 </summary>
42486 @@ -124782,7 +127307,7 @@ Domain allowed access.
42487 </summary>
42488 </param>
42489 </interface>
42490 -<interface name="xdg_watch_documents_dirs" lineno="914">
42491 +<interface name="xdg_watch_documents_dirs" lineno="932">
42492 <summary>
42493 Watch the xdg documents home directories
42494 </summary>
42495 @@ -124792,7 +127317,7 @@ Domain allowed access.
42496 </summary>
42497 </param>
42498 </interface>
42499 -<interface name="xdg_generic_user_home_dir_filetrans_documents" lineno="943">
42500 +<interface name="xdg_generic_user_home_dir_filetrans_documents" lineno="961">
42501 <summary>
42502 Create objects in the user home dir with an automatic type transition to
42503 the xdg_documents_t type.
42504 @@ -124813,7 +127338,7 @@ Name of the directory created
42505 </summary>
42506 </param>
42507 </interface>
42508 -<interface name="xdg_manage_documents" lineno="961">
42509 +<interface name="xdg_manage_documents" lineno="979">
42510 <summary>
42511 Manage documents content
42512 </summary>
42513 @@ -124823,7 +127348,7 @@ Domain allowed access
42514 </summary>
42515 </param>
42516 </interface>
42517 -<interface name="xdg_relabel_documents" lineno="982">
42518 +<interface name="xdg_relabel_documents" lineno="1000">
42519 <summary>
42520 Allow relabeling the documents resources
42521 </summary>
42522 @@ -124833,7 +127358,7 @@ Domain allowed access.
42523 </summary>
42524 </param>
42525 </interface>
42526 -<interface name="xdg_watch_downloads_dirs" lineno="1004">
42527 +<interface name="xdg_watch_downloads_dirs" lineno="1022">
42528 <summary>
42529 Watch the xdg downloads home directories
42530 </summary>
42531 @@ -124843,7 +127368,7 @@ Domain allowed access.
42532 </summary>
42533 </param>
42534 </interface>
42535 -<interface name="xdg_read_downloads" lineno="1022">
42536 +<interface name="xdg_read_downloads" lineno="1040">
42537 <summary>
42538 Read downloaded content
42539 </summary>
42540 @@ -124853,7 +127378,7 @@ Domain allowed access
42541 </summary>
42542 </param>
42543 </interface>
42544 -<interface name="xdg_create_downloads" lineno="1045">
42545 +<interface name="xdg_create_downloads" lineno="1063">
42546 <summary>
42547 Create downloaded content
42548 </summary>
42549 @@ -124863,7 +127388,7 @@ Domain allowed access
42550 </summary>
42551 </param>
42552 </interface>
42553 -<interface name="xdg_write_downloads" lineno="1068">
42554 +<interface name="xdg_write_downloads" lineno="1086">
42555 <summary>
42556 Write downloaded content
42557 </summary>
42558 @@ -124873,7 +127398,7 @@ Domain allowed access
42559 </summary>
42560 </param>
42561 </interface>
42562 -<interface name="xdg_generic_user_home_dir_filetrans_downloads" lineno="1102">
42563 +<interface name="xdg_generic_user_home_dir_filetrans_downloads" lineno="1120">
42564 <summary>
42565 Create objects in the user home dir with an automatic type transition to
42566 the xdg_downloads_t type.
42567 @@ -124894,7 +127419,7 @@ Name of the directory created
42568 </summary>
42569 </param>
42570 </interface>
42571 -<interface name="xdg_manage_downloads" lineno="1120">
42572 +<interface name="xdg_manage_downloads" lineno="1138">
42573 <summary>
42574 Manage downloaded content
42575 </summary>
42576 @@ -124904,7 +127429,7 @@ Domain allowed access
42577 </summary>
42578 </param>
42579 </interface>
42580 -<interface name="xdg_relabel_downloads" lineno="1141">
42581 +<interface name="xdg_relabel_downloads" lineno="1159">
42582 <summary>
42583 Allow relabeling the downloads resources
42584 </summary>
42585 @@ -124914,7 +127439,7 @@ Domain allowed access.
42586 </summary>
42587 </param>
42588 </interface>
42589 -<interface name="xdg_watch_pictures_dirs" lineno="1163">
42590 +<interface name="xdg_watch_pictures_dirs" lineno="1181">
42591 <summary>
42592 Watch the xdg pictures home directories
42593 </summary>
42594 @@ -124924,7 +127449,7 @@ Domain allowed access.
42595 </summary>
42596 </param>
42597 </interface>
42598 -<interface name="xdg_read_pictures" lineno="1181">
42599 +<interface name="xdg_read_pictures" lineno="1199">
42600 <summary>
42601 Read user pictures content
42602 </summary>
42603 @@ -124934,7 +127459,7 @@ Domain allowed access
42604 </summary>
42605 </param>
42606 </interface>
42607 -<interface name="xdg_generic_user_home_dir_filetrans_pictures" lineno="1215">
42608 +<interface name="xdg_generic_user_home_dir_filetrans_pictures" lineno="1233">
42609 <summary>
42610 Create objects in the user home dir with an automatic type transition to
42611 the xdg_pictures_t type.
42612 @@ -124955,7 +127480,7 @@ Name of the directory created
42613 </summary>
42614 </param>
42615 </interface>
42616 -<interface name="xdg_manage_pictures" lineno="1233">
42617 +<interface name="xdg_manage_pictures" lineno="1251">
42618 <summary>
42619 Manage pictures content
42620 </summary>
42621 @@ -124965,7 +127490,7 @@ Domain allowed access
42622 </summary>
42623 </param>
42624 </interface>
42625 -<interface name="xdg_relabel_pictures" lineno="1254">
42626 +<interface name="xdg_relabel_pictures" lineno="1272">
42627 <summary>
42628 Allow relabeling the pictures resources
42629 </summary>
42630 @@ -124975,7 +127500,7 @@ Domain allowed access.
42631 </summary>
42632 </param>
42633 </interface>
42634 -<interface name="xdg_watch_music_dirs" lineno="1276">
42635 +<interface name="xdg_watch_music_dirs" lineno="1294">
42636 <summary>
42637 Watch the xdg music home directories
42638 </summary>
42639 @@ -124985,7 +127510,7 @@ Domain allowed access.
42640 </summary>
42641 </param>
42642 </interface>
42643 -<interface name="xdg_read_music" lineno="1294">
42644 +<interface name="xdg_read_music" lineno="1312">
42645 <summary>
42646 Read user music content
42647 </summary>
42648 @@ -124995,7 +127520,7 @@ Domain allowed access
42649 </summary>
42650 </param>
42651 </interface>
42652 -<interface name="xdg_generic_user_home_dir_filetrans_music" lineno="1328">
42653 +<interface name="xdg_generic_user_home_dir_filetrans_music" lineno="1346">
42654 <summary>
42655 Create objects in the user home dir with an automatic type transition to
42656 the xdg_pictures_t type.
42657 @@ -125016,7 +127541,7 @@ Name of the directory created
42658 </summary>
42659 </param>
42660 </interface>
42661 -<interface name="xdg_manage_music" lineno="1346">
42662 +<interface name="xdg_manage_music" lineno="1364">
42663 <summary>
42664 Manage music content
42665 </summary>
42666 @@ -125026,7 +127551,7 @@ Domain allowed access
42667 </summary>
42668 </param>
42669 </interface>
42670 -<interface name="xdg_relabel_music" lineno="1367">
42671 +<interface name="xdg_relabel_music" lineno="1385">
42672 <summary>
42673 Allow relabeling the music resources
42674 </summary>
42675 @@ -125036,7 +127561,7 @@ Domain allowed access.
42676 </summary>
42677 </param>
42678 </interface>
42679 -<interface name="xdg_watch_videos_dirs" lineno="1389">
42680 +<interface name="xdg_watch_videos_dirs" lineno="1407">
42681 <summary>
42682 Watch the xdg video content
42683 </summary>
42684 @@ -125046,7 +127571,7 @@ Domain allowed access.
42685 </summary>
42686 </param>
42687 </interface>
42688 -<interface name="xdg_read_videos" lineno="1407">
42689 +<interface name="xdg_read_videos" lineno="1425">
42690 <summary>
42691 Read user video content
42692 </summary>
42693 @@ -125056,7 +127581,7 @@ Domain allowed access
42694 </summary>
42695 </param>
42696 </interface>
42697 -<interface name="xdg_generic_user_home_dir_filetrans_videos" lineno="1441">
42698 +<interface name="xdg_generic_user_home_dir_filetrans_videos" lineno="1459">
42699 <summary>
42700 Create objects in the user home dir with an automatic type transition to
42701 the xdg_videos_t type.
42702 @@ -125077,7 +127602,7 @@ Name of the directory created
42703 </summary>
42704 </param>
42705 </interface>
42706 -<interface name="xdg_manage_videos" lineno="1459">
42707 +<interface name="xdg_manage_videos" lineno="1477">
42708 <summary>
42709 Manage video content
42710 </summary>
42711 @@ -125087,7 +127612,7 @@ Domain allowed access
42712 </summary>
42713 </param>
42714 </interface>
42715 -<interface name="xdg_relabel_videos" lineno="1480">
42716 +<interface name="xdg_relabel_videos" lineno="1498">
42717 <summary>
42718 Allow relabeling the videos resources
42719 </summary>
42720 @@ -125097,7 +127622,7 @@ Domain allowed access.
42721 </summary>
42722 </param>
42723 </interface>
42724 -<interface name="xdg_cache_home_content" lineno="1506">
42725 +<interface name="xdg_cache_home_content" lineno="1524">
42726 <summary>
42727 Mark the selected type as an xdg_cache_home_type
42728 </summary>
42729 @@ -125107,7 +127632,7 @@ Type to give the xdg_cache_home_type attribute to
42730 </summary>
42731 </param>
42732 </interface>
42733 -<interface name="xdg_config_home_content" lineno="1520">
42734 +<interface name="xdg_config_home_content" lineno="1538">
42735 <summary>
42736 Mark the selected type as an xdg_config_home_type
42737 </summary>
42738 @@ -125117,7 +127642,7 @@ Type to give the xdg_config_home_type attribute to
42739 </summary>
42740 </param>
42741 </interface>
42742 -<interface name="xdg_data_home_content" lineno="1534">
42743 +<interface name="xdg_data_home_content" lineno="1552">
42744 <summary>
42745 Mark the selected type as an xdg_data_home_type
42746 </summary>
42747 @@ -125127,7 +127652,7 @@ Type to give the xdg_data_home_type attribute to
42748 </summary>
42749 </param>
42750 </interface>
42751 -<interface name="xdg_read_cache_home_files" lineno="1548">
42752 +<interface name="xdg_read_cache_home_files" lineno="1566">
42753 <summary>
42754 Read the xdg cache home files
42755 </summary>
42756 @@ -125137,7 +127662,7 @@ Domain allowed access.
42757 </summary>
42758 </param>
42759 </interface>
42760 -<interface name="xdg_read_all_cache_home_files" lineno="1562">
42761 +<interface name="xdg_read_all_cache_home_files" lineno="1580">
42762 <summary>
42763 Read all xdg_cache_home_type files
42764 </summary>
42765 @@ -125147,7 +127672,7 @@ Domain allowed access.
42766 </summary>
42767 </param>
42768 </interface>
42769 -<interface name="xdg_cache_home_filetrans" lineno="1593">
42770 +<interface name="xdg_cache_home_filetrans" lineno="1611">
42771 <summary>
42772 Create objects in an xdg_cache_home directory
42773 with an automatic type transition to
42774 @@ -125174,7 +127699,7 @@ Name of the file or directory created
42775 </summary>
42776 </param>
42777 </interface>
42778 -<interface name="xdg_generic_user_home_dir_filetrans_cache_home" lineno="1618">
42779 +<interface name="xdg_generic_user_home_dir_filetrans_cache_home" lineno="1636">
42780 <summary>
42781 Create objects in the user home dir with an automatic type transition to
42782 the xdg_cache_home_t type.
42783 @@ -125195,7 +127720,7 @@ Name of the directory created
42784 </summary>
42785 </param>
42786 </interface>
42787 -<interface name="xdg_create_cache_home_dirs" lineno="1632">
42788 +<interface name="xdg_create_cache_home_dirs" lineno="1650">
42789 <summary>
42790 Create xdg cache home directories
42791 </summary>
42792 @@ -125205,7 +127730,7 @@ Domain allowed access
42793 </summary>
42794 </param>
42795 </interface>
42796 -<interface name="xdg_manage_cache_home" lineno="1646">
42797 +<interface name="xdg_manage_cache_home" lineno="1664">
42798 <summary>
42799 Manage the xdg cache home files
42800 </summary>
42801 @@ -125215,7 +127740,7 @@ Domain allowed access.
42802 </summary>
42803 </param>
42804 </interface>
42805 -<interface name="xdg_manage_all_cache_home" lineno="1660">
42806 +<interface name="xdg_manage_all_cache_home" lineno="1678">
42807 <summary>
42808 Manage all the xdg cache home files regardless of their specific type
42809 </summary>
42810 @@ -125225,7 +127750,7 @@ Domain allowed access.
42811 </summary>
42812 </param>
42813 </interface>
42814 -<interface name="xdg_relabel_cache_home" lineno="1674">
42815 +<interface name="xdg_relabel_cache_home" lineno="1692">
42816 <summary>
42817 Allow relabeling the xdg cache home files
42818 </summary>
42819 @@ -125235,7 +127760,7 @@ Domain allowed access.
42820 </summary>
42821 </param>
42822 </interface>
42823 -<interface name="xdg_relabel_all_cache_home" lineno="1688">
42824 +<interface name="xdg_relabel_all_cache_home" lineno="1706">
42825 <summary>
42826 Allow relabeling the xdg cache home files, regardless of their specific type
42827 </summary>
42828 @@ -125245,7 +127770,7 @@ Domain allowed access.
42829 </summary>
42830 </param>
42831 </interface>
42832 -<interface name="xdg_search_config_home_dirs" lineno="1702">
42833 +<interface name="xdg_search_config_home_dirs" lineno="1720">
42834 <summary>
42835 Search through the xdg config home directories
42836 </summary>
42837 @@ -125255,7 +127780,7 @@ Domain allowed access.
42838 </summary>
42839 </param>
42840 </interface>
42841 -<interface name="xdg_read_config_home_files" lineno="1716">
42842 +<interface name="xdg_read_config_home_files" lineno="1734">
42843 <summary>
42844 Read the xdg config home files
42845 </summary>
42846 @@ -125265,7 +127790,7 @@ Domain allowed access.
42847 </summary>
42848 </param>
42849 </interface>
42850 -<interface name="xdg_read_all_config_home_files" lineno="1730">
42851 +<interface name="xdg_read_all_config_home_files" lineno="1748">
42852 <summary>
42853 Read all xdg_config_home_type files
42854 </summary>
42855 @@ -125275,7 +127800,7 @@ Domain allowed access.
42856 </summary>
42857 </param>
42858 </interface>
42859 -<interface name="xdg_config_home_filetrans" lineno="1761">
42860 +<interface name="xdg_config_home_filetrans" lineno="1779">
42861 <summary>
42862 Create objects in an xdg_config_home directory
42863 with an automatic type transition to
42864 @@ -125302,7 +127827,7 @@ Name of the file or directory created
42865 </summary>
42866 </param>
42867 </interface>
42868 -<interface name="xdg_generic_user_home_dir_filetrans_config_home" lineno="1786">
42869 +<interface name="xdg_generic_user_home_dir_filetrans_config_home" lineno="1804">
42870 <summary>
42871 Create objects in the user home dir with an automatic type transition to
42872 the xdg_config_home_t type.
42873 @@ -125323,7 +127848,7 @@ Name of the directory created
42874 </summary>
42875 </param>
42876 </interface>
42877 -<interface name="xdg_create_config_home_dirs" lineno="1800">
42878 +<interface name="xdg_create_config_home_dirs" lineno="1818">
42879 <summary>
42880 Create xdg config home directories
42881 </summary>
42882 @@ -125333,7 +127858,7 @@ Domain allowed access
42883 </summary>
42884 </param>
42885 </interface>
42886 -<interface name="xdg_manage_config_home" lineno="1814">
42887 +<interface name="xdg_manage_config_home" lineno="1832">
42888 <summary>
42889 Manage the xdg config home files
42890 </summary>
42891 @@ -125343,7 +127868,7 @@ Domain allowed access.
42892 </summary>
42893 </param>
42894 </interface>
42895 -<interface name="xdg_manage_all_config_home" lineno="1828">
42896 +<interface name="xdg_manage_all_config_home" lineno="1846">
42897 <summary>
42898 Manage all the xdg config home files regardless of their specific type
42899 </summary>
42900 @@ -125353,7 +127878,7 @@ Domain allowed access.
42901 </summary>
42902 </param>
42903 </interface>
42904 -<interface name="xdg_relabel_config_home" lineno="1842">
42905 +<interface name="xdg_relabel_config_home" lineno="1860">
42906 <summary>
42907 Allow relabeling the xdg config home files
42908 </summary>
42909 @@ -125363,7 +127888,7 @@ Domain allowed access.
42910 </summary>
42911 </param>
42912 </interface>
42913 -<interface name="xdg_relabel_all_config_home" lineno="1856">
42914 +<interface name="xdg_relabel_all_config_home" lineno="1874">
42915 <summary>
42916 Allow relabeling the xdg config home files, regardless of their specific type
42917 </summary>
42918 @@ -125373,7 +127898,7 @@ Domain allowed access.
42919 </summary>
42920 </param>
42921 </interface>
42922 -<interface name="xdg_read_data_home_files" lineno="1870">
42923 +<interface name="xdg_read_data_home_files" lineno="1888">
42924 <summary>
42925 Read the xdg data home files
42926 </summary>
42927 @@ -125383,7 +127908,7 @@ Domain allowed access.
42928 </summary>
42929 </param>
42930 </interface>
42931 -<interface name="xdg_read_all_data_home_files" lineno="1884">
42932 +<interface name="xdg_read_all_data_home_files" lineno="1902">
42933 <summary>
42934 Read all xdg_data_home_type files
42935 </summary>
42936 @@ -125393,7 +127918,7 @@ Domain allowed access.
42937 </summary>
42938 </param>
42939 </interface>
42940 -<interface name="xdg_data_home_filetrans" lineno="1915">
42941 +<interface name="xdg_data_home_filetrans" lineno="1933">
42942 <summary>
42943 Create objects in an xdg_data_home directory
42944 with an automatic type transition to
42945 @@ -125420,7 +127945,7 @@ Optional name of the file or directory created
42946 </summary>
42947 </param>
42948 </interface>
42949 -<interface name="xdg_generic_user_home_dir_filetrans_data_home" lineno="1940">
42950 +<interface name="xdg_generic_user_home_dir_filetrans_data_home" lineno="1958">
42951 <summary>
42952 Create objects in the user home dir with an automatic type transition to
42953 the xdg_data_home_t type.
42954 @@ -125441,7 +127966,7 @@ Name of the directory created
42955 </summary>
42956 </param>
42957 </interface>
42958 -<interface name="xdg_create_data_home_dirs" lineno="1954">
42959 +<interface name="xdg_create_data_home_dirs" lineno="1972">
42960 <summary>
42961 Create xdg data home directories
42962 </summary>
42963 @@ -125451,7 +127976,7 @@ Domain allowed access
42964 </summary>
42965 </param>
42966 </interface>
42967 -<interface name="xdg_manage_data_home" lineno="1968">
42968 +<interface name="xdg_manage_data_home" lineno="1986">
42969 <summary>
42970 Manage the xdg data home files
42971 </summary>
42972 @@ -125461,7 +127986,7 @@ Domain allowed access.
42973 </summary>
42974 </param>
42975 </interface>
42976 -<interface name="xdg_manage_all_data_home" lineno="1982">
42977 +<interface name="xdg_manage_all_data_home" lineno="2000">
42978 <summary>
42979 Manage all the xdg data home files, regardless of their specific type
42980 </summary>
42981 @@ -125471,7 +127996,7 @@ Domain allowed access.
42982 </summary>
42983 </param>
42984 </interface>
42985 -<interface name="xdg_relabel_data_home" lineno="1996">
42986 +<interface name="xdg_relabel_data_home" lineno="2014">
42987 <summary>
42988 Allow relabeling the xdg data home files
42989 </summary>
42990 @@ -125481,7 +128006,7 @@ Domain allowed access.
42991 </summary>
42992 </param>
42993 </interface>
42994 -<interface name="xdg_relabel_all_data_home" lineno="2010">
42995 +<interface name="xdg_relabel_all_data_home" lineno="2028">
42996 <summary>
42997 Allow relabeling the xdg data home files, regardless of their type
42998 </summary>
42999 @@ -125491,7 +128016,7 @@ Domain allowed access.
43000 </summary>
43001 </param>
43002 </interface>
43003 -<interface name="xdg_read_downloads_home" lineno="2024">
43004 +<interface name="xdg_read_downloads_home" lineno="2042">
43005 <summary>
43006 Read downloaded content
43007 </summary>
43008 @@ -125501,7 +128026,7 @@ Domain allowed access
43009 </summary>
43010 </param>
43011 </interface>
43012 -<interface name="xdg_read_videos_home" lineno="2038">
43013 +<interface name="xdg_read_videos_home" lineno="2056">
43014 <summary>
43015 Read user video content
43016 </summary>
43017 @@ -125511,7 +128036,7 @@ Domain allowed access
43018 </summary>
43019 </param>
43020 </interface>
43021 -<interface name="xdg_read_pictures_home" lineno="2052">
43022 +<interface name="xdg_read_pictures_home" lineno="2070">
43023 <summary>
43024 Read user pictures content
43025 </summary>
43026 @@ -125521,7 +128046,7 @@ Domain allowed access
43027 </summary>
43028 </param>
43029 </interface>
43030 -<interface name="xdg_read_music_home" lineno="2066">
43031 +<interface name="xdg_read_music_home" lineno="2084">
43032 <summary>
43033 Read user music content
43034 </summary>
43035 @@ -125531,7 +128056,7 @@ Domain allowed access
43036 </summary>
43037 </param>
43038 </interface>
43039 -<interface name="xdg_create_downloads_home" lineno="2080">
43040 +<interface name="xdg_create_downloads_home" lineno="2098">
43041 <summary>
43042 Create downloaded content
43043 </summary>
43044 @@ -125541,7 +128066,7 @@ Domain allowed access
43045 </summary>
43046 </param>
43047 </interface>
43048 -<interface name="xdg_write_downloads_home" lineno="2094">
43049 +<interface name="xdg_write_downloads_home" lineno="2112">
43050 <summary>
43051 Write downloaded content
43052 </summary>
43053 @@ -125551,7 +128076,7 @@ Domain allowed access
43054 </summary>
43055 </param>
43056 </interface>
43057 -<interface name="xdg_manage_downloads_home" lineno="2108">
43058 +<interface name="xdg_manage_downloads_home" lineno="2126">
43059 <summary>
43060 Manage downloaded content
43061 </summary>
43062 @@ -125561,7 +128086,7 @@ Domain allowed access
43063 </summary>
43064 </param>
43065 </interface>
43066 -<interface name="xdg_manage_documents_home" lineno="2122">
43067 +<interface name="xdg_manage_documents_home" lineno="2140">
43068 <summary>
43069 Manage documents content
43070 </summary>
43071 @@ -125571,7 +128096,7 @@ Domain allowed access
43072 </summary>
43073 </param>
43074 </interface>
43075 -<interface name="xdg_manage_music_home" lineno="2136">
43076 +<interface name="xdg_manage_music_home" lineno="2154">
43077 <summary>
43078 Manage music content
43079 </summary>
43080 @@ -125581,7 +128106,7 @@ Domain allowed access
43081 </summary>
43082 </param>
43083 </interface>
43084 -<interface name="xdg_manage_pictures_home" lineno="2150">
43085 +<interface name="xdg_manage_pictures_home" lineno="2168">
43086 <summary>
43087 Manage pictures content
43088 </summary>
43089 @@ -125591,7 +128116,7 @@ Domain allowed access
43090 </summary>
43091 </param>
43092 </interface>
43093 -<interface name="xdg_manage_videos_home" lineno="2164">
43094 +<interface name="xdg_manage_videos_home" lineno="2182">
43095 <summary>
43096 Manage video content
43097 </summary>
43098
43099 diff --git a/policy/booleans.conf b/policy/booleans.conf
43100 index 368c5856..900fa523 100644
43101 --- a/policy/booleans.conf
43102 +++ b/policy/booleans.conf
43103 @@ -128,6 +128,22 @@ puppet_manage_all_files = false
43104 #
43105 rkhunter_connect_http = false
43106
43107 +#
43108 +# Determine whether the user application exec
43109 +# domain attribute should be respected for
43110 +# shutdown access. If not enabled, only user
43111 +# domains themselves may use shutdown.
43112 +#
43113 +shutdown_allow_user_exec_domains = false
43114 +
43115 +#
43116 +# Determine whether the user application
43117 +# exec domain attribute should be respected
43118 +# for su access. If not enabled, only user
43119 +# domains themselves may use su.
43120 +#
43121 +su_allow_user_exec_domains = false
43122 +
43123 #
43124 # Determine whether all sudo domains
43125 # can connect to TCP HTTP ports. This
43126 @@ -137,6 +153,14 @@ rkhunter_connect_http = false
43127 #
43128 sudo_all_tcp_connect_http_port = false
43129
43130 +#
43131 +# Determine whether the user application exec
43132 +# domain attribute should be respected for sudo
43133 +# access. If not enabled, only user domains
43134 +# themselves may use sudo.
43135 +#
43136 +sudo_allow_user_exec_domains = false
43137 +
43138 #
43139 # Determine whether authorized users can control the daemon,
43140 # which requires usbguard-daemon to be able modify its rules in
43141 @@ -1157,6 +1181,28 @@ allow_httpd_collectd_script_anon_write = false
43142 #
43143 condor_tcp_network_connect = false
43144
43145 +#
43146 +# Allow containers to manage cgroups.
43147 +# This is required for systemd to run inside
43148 +# containers.
43149 +#
43150 +container_manage_cgroup = false
43151 +
43152 +#
43153 +# Allow container engines to mount on all non-security files.
43154 +#
43155 +container_mounton_non_security = false
43156 +
43157 +#
43158 +# Allow containers to use NFS filesystems.
43159 +#
43160 +container_use_nfs = false
43161 +
43162 +#
43163 +# Allow containers to use CIFS filesystems.
43164 +#
43165 +container_use_samba = false
43166 +
43167 #
43168 # Determine whether system cron jobs
43169 # can relabel filesystem for
43170 @@ -1506,6 +1552,18 @@ nscd_use_shm = false
43171 #
43172 allow_httpd_nutups_cgi_script_anon_write = false
43173
43174 +#
43175 +# Determine whether obfs4proxy can bind
43176 +# tcp sockets to all unreserved ports.
43177 +#
43178 +obfs4proxy_bind_all_unreserved_ports = false
43179 +
43180 +#
43181 +# Determine whether obfs4proxy can bind
43182 +# tcp sockets to all http ports.
43183 +#
43184 +obfs4proxy_bind_http_ports = false
43185 +
43186 #
43187 # Determine whether openvpn can
43188 # read generic user home content files.
43189 @@ -2005,12 +2063,6 @@ systemd_socket_proxyd_bind_any = false
43190 #
43191 systemd_socket_proxyd_connect_any = false
43192
43193 -#
43194 -# Allow systemd-tmpfilesd to populate missing configuration files from factory
43195 -# template directory.
43196 -#
43197 -systemd_tmpfilesd_factory = false
43198 -
43199 #
43200 # Determine whether tmpfiles can manage
43201 # all non-security sensitive resources.
43202
43203 diff --git a/policy/modules.conf b/policy/modules.conf
43204 index 2a5a2aeb..f94f6cc4 100644
43205 --- a/policy/modules.conf
43206 +++ b/policy/modules.conf
43207 @@ -1307,6 +1307,13 @@ condor = module
43208 #
43209 consolesetup = module
43210
43211 +# Layer: services
43212 +# Module: container
43213 +#
43214 +# Policy for containers
43215 +#
43216 +container = module
43217 +
43218 # Layer: services
43219 # Module: corosync
43220 #
43221 @@ -1461,6 +1468,13 @@ dkim = module
43222 #
43223 dnsmasq = module
43224
43225 +# Layer: services
43226 +# Module: docker
43227 +#
43228 +# Policy for docker
43229 +#
43230 +docker = module
43231 +
43232 # Layer: services
43233 # Module: dovecot
43234 #
43235 @@ -2000,6 +2014,13 @@ nx = module
43236 #
43237 obex = module
43238
43239 +# Layer: services
43240 +# Module: obfs4proxy
43241 +#
43242 +# obfs4proxy.
43243 +#
43244 +obfs4proxy = module
43245 +
43246 # Layer: services
43247 # Module: oddjob
43248 #
43249 @@ -2105,6 +2126,13 @@ pkcs = module
43250 #
43251 plymouthd = module
43252
43253 +# Layer: services
43254 +# Module: podman
43255 +#
43256 +# Policy for podman
43257 +#
43258 +podman = module
43259 +
43260 # Layer: services
43261 # Module: policykit
43262 #
43263 @@ -2329,6 +2357,13 @@ rlogin = module
43264 #
43265 rngd = module
43266
43267 +# Layer: services
43268 +# Module: rootlesskit
43269 +#
43270 +# Policy for RootlessKit
43271 +#
43272 +rootlesskit = module
43273 +
43274 # Layer: services
43275 # Module: rpc
43276 #
43277
43278 diff --git a/policy/modules/kernel/corenetwork.if b/policy/modules/kernel/corenetwork.if
43279 index 086f0fe8..a0cb0bed 100644
43280 --- a/policy/modules/kernel/corenetwork.if
43281 +++ b/policy/modules/kernel/corenetwork.if
43282 @@ -57540,6 +57540,427 @@ interface(`corenet_relabelto_ntp_server_packets',`
43283
43284
43285
43286 +########################################
43287 +## <summary>
43288 +## Send and receive TCP traffic on the ntske port.
43289 +## </summary>
43290 +## <param name="domain">
43291 +## <summary>
43292 +## Domain allowed access.
43293 +## </summary>
43294 +## </param>
43295 +## <infoflow type="both" weight="10"/>
43296 +#
43297 +interface(`corenet_tcp_sendrecv_ntske_port',`
43298 + refpolicywarn(`$0() has been deprecated, please remove.')
43299 +')
43300 +
43301 +########################################
43302 +## <summary>
43303 +## Send UDP traffic on the ntske port.
43304 +## </summary>
43305 +## <param name="domain">
43306 +## <summary>
43307 +## Domain allowed access.
43308 +## </summary>
43309 +## </param>
43310 +## <infoflow type="write" weight="10"/>
43311 +#
43312 +interface(`corenet_udp_send_ntske_port',`
43313 + refpolicywarn(`$0() has been deprecated, please remove.')
43314 +')
43315 +
43316 +########################################
43317 +## <summary>
43318 +## Do not audit attempts to send UDP traffic on the ntske port.
43319 +## </summary>
43320 +## <param name="domain">
43321 +## <summary>
43322 +## Domain to not audit.
43323 +## </summary>
43324 +## </param>
43325 +## <infoflow type="none"/>
43326 +#
43327 +interface(`corenet_dontaudit_udp_send_ntske_port',`
43328 + refpolicywarn(`$0() has been deprecated, please remove.')
43329 +')
43330 +
43331 +########################################
43332 +## <summary>
43333 +## Receive UDP traffic on the ntske port.
43334 +## </summary>
43335 +## <param name="domain">
43336 +## <summary>
43337 +## Domain allowed access.
43338 +## </summary>
43339 +## </param>
43340 +## <infoflow type="read" weight="10"/>
43341 +#
43342 +interface(`corenet_udp_receive_ntske_port',`
43343 + refpolicywarn(`$0() has been deprecated, please remove.')
43344 +')
43345 +
43346 +########################################
43347 +## <summary>
43348 +## Do not audit attempts to receive UDP traffic on the ntske port.
43349 +## </summary>
43350 +## <param name="domain">
43351 +## <summary>
43352 +## Domain to not audit.
43353 +## </summary>
43354 +## </param>
43355 +## <infoflow type="none"/>
43356 +#
43357 +interface(`corenet_dontaudit_udp_receive_ntske_port',`
43358 + refpolicywarn(`$0() has been deprecated, please remove.')
43359 +')
43360 +
43361 +########################################
43362 +## <summary>
43363 +## Send and receive UDP traffic on the ntske port.
43364 +## </summary>
43365 +## <param name="domain">
43366 +## <summary>
43367 +## Domain allowed access.
43368 +## </summary>
43369 +## </param>
43370 +## <infoflow type="both" weight="10"/>
43371 +#
43372 +interface(`corenet_udp_sendrecv_ntske_port',`
43373 + refpolicywarn(`$0() has been deprecated, please remove.')
43374 +')
43375 +
43376 +########################################
43377 +## <summary>
43378 +## Do not audit attempts to send and receive
43379 +## UDP traffic on the ntske port.
43380 +## </summary>
43381 +## <param name="domain">
43382 +## <summary>
43383 +## Domain to not audit.
43384 +## </summary>
43385 +## </param>
43386 +## <infoflow type="none"/>
43387 +#
43388 +interface(`corenet_dontaudit_udp_sendrecv_ntske_port',`
43389 + refpolicywarn(`$0() has been deprecated, please remove.')
43390 +')
43391 +
43392 +########################################
43393 +## <summary>
43394 +## Bind TCP sockets to the ntske port.
43395 +## </summary>
43396 +## <param name="domain">
43397 +## <summary>
43398 +## Domain allowed access.
43399 +## </summary>
43400 +## </param>
43401 +## <infoflow type="none"/>
43402 +#
43403 +interface(`corenet_tcp_bind_ntske_port',`
43404 + gen_require(`
43405 + type ntske_port_t;
43406 + ')
43407 +
43408 + allow $1 ntske_port_t:tcp_socket name_bind;
43409 +
43410 +')
43411 +
43412 +########################################
43413 +## <summary>
43414 +## Bind UDP sockets to the ntske port.
43415 +## </summary>
43416 +## <param name="domain">
43417 +## <summary>
43418 +## Domain allowed access.
43419 +## </summary>
43420 +## </param>
43421 +## <infoflow type="none"/>
43422 +#
43423 +interface(`corenet_udp_bind_ntske_port',`
43424 + gen_require(`
43425 + type ntske_port_t;
43426 + ')
43427 +
43428 + allow $1 ntske_port_t:udp_socket name_bind;
43429 +
43430 +')
43431 +
43432 +########################################
43433 +## <summary>
43434 +## Make a TCP connection to the ntske port.
43435 +## </summary>
43436 +## <param name="domain">
43437 +## <summary>
43438 +## Domain allowed access.
43439 +## </summary>
43440 +## </param>
43441 +#
43442 +interface(`corenet_tcp_connect_ntske_port',`
43443 + gen_require(`
43444 + type ntske_port_t;
43445 + ')
43446 +
43447 + allow $1 ntske_port_t:tcp_socket name_connect;
43448 +')
43449 +
43450 +
43451 +########################################
43452 +## <summary>
43453 +## Send ntske_client packets.
43454 +## </summary>
43455 +## <param name="domain">
43456 +## <summary>
43457 +## Domain allowed access.
43458 +## </summary>
43459 +## </param>
43460 +## <infoflow type="write" weight="10"/>
43461 +#
43462 +interface(`corenet_send_ntske_client_packets',`
43463 + gen_require(`
43464 + type ntske_client_packet_t;
43465 + ')
43466 +
43467 + allow $1 ntske_client_packet_t:packet send;
43468 +')
43469 +
43470 +########################################
43471 +## <summary>
43472 +## Do not audit attempts to send ntske_client packets.
43473 +## </summary>
43474 +## <param name="domain">
43475 +## <summary>
43476 +## Domain to not audit.
43477 +## </summary>
43478 +## </param>
43479 +## <infoflow type="none"/>
43480 +#
43481 +interface(`corenet_dontaudit_send_ntske_client_packets',`
43482 + gen_require(`
43483 + type ntske_client_packet_t;
43484 + ')
43485 +
43486 + dontaudit $1 ntske_client_packet_t:packet send;
43487 +')
43488 +
43489 +########################################
43490 +## <summary>
43491 +## Receive ntske_client packets.
43492 +## </summary>
43493 +## <param name="domain">
43494 +## <summary>
43495 +## Domain allowed access.
43496 +## </summary>
43497 +## </param>
43498 +## <infoflow type="read" weight="10"/>
43499 +#
43500 +interface(`corenet_receive_ntske_client_packets',`
43501 + gen_require(`
43502 + type ntske_client_packet_t;
43503 + ')
43504 +
43505 + allow $1 ntske_client_packet_t:packet recv;
43506 +')
43507 +
43508 +########################################
43509 +## <summary>
43510 +## Do not audit attempts to receive ntske_client packets.
43511 +## </summary>
43512 +## <param name="domain">
43513 +## <summary>
43514 +## Domain allowed access.
43515 +## </summary>
43516 +## </param>
43517 +## <infoflow type="none"/>
43518 +#
43519 +interface(`corenet_dontaudit_receive_ntske_client_packets',`
43520 + gen_require(`
43521 + type ntske_client_packet_t;
43522 + ')
43523 +
43524 + dontaudit $1 ntske_client_packet_t:packet recv;
43525 +')
43526 +
43527 +########################################
43528 +## <summary>
43529 +## Send and receive ntske_client packets.
43530 +## </summary>
43531 +## <param name="domain">
43532 +## <summary>
43533 +## Domain allowed access.
43534 +## </summary>
43535 +## </param>
43536 +## <infoflow type="both" weight="10"/>
43537 +#
43538 +interface(`corenet_sendrecv_ntske_client_packets',`
43539 + corenet_send_ntske_client_packets($1)
43540 + corenet_receive_ntske_client_packets($1)
43541 +')
43542 +
43543 +########################################
43544 +## <summary>
43545 +## Do not audit attempts to send and receive ntske_client packets.
43546 +## </summary>
43547 +## <param name="domain">
43548 +## <summary>
43549 +## Domain to not audit.
43550 +## </summary>
43551 +## </param>
43552 +## <infoflow type="none"/>
43553 +#
43554 +interface(`corenet_dontaudit_sendrecv_ntske_client_packets',`
43555 + corenet_dontaudit_send_ntske_client_packets($1)
43556 + corenet_dontaudit_receive_ntske_client_packets($1)
43557 +')
43558 +
43559 +########################################
43560 +## <summary>
43561 +## Relabel packets to ntske_client the packet type.
43562 +## </summary>
43563 +## <param name="domain">
43564 +## <summary>
43565 +## Domain allowed access.
43566 +## </summary>
43567 +## </param>
43568 +#
43569 +interface(`corenet_relabelto_ntske_client_packets',`
43570 + gen_require(`
43571 + type ntske_client_packet_t;
43572 + ')
43573 +
43574 + allow $1 ntske_client_packet_t:packet relabelto;
43575 +')
43576 +
43577 +
43578 +########################################
43579 +## <summary>
43580 +## Send ntske_server packets.
43581 +## </summary>
43582 +## <param name="domain">
43583 +## <summary>
43584 +## Domain allowed access.
43585 +## </summary>
43586 +## </param>
43587 +## <infoflow type="write" weight="10"/>
43588 +#
43589 +interface(`corenet_send_ntske_server_packets',`
43590 + gen_require(`
43591 + type ntske_server_packet_t;
43592 + ')
43593 +
43594 + allow $1 ntske_server_packet_t:packet send;
43595 +')
43596 +
43597 +########################################
43598 +## <summary>
43599 +## Do not audit attempts to send ntske_server packets.
43600 +## </summary>
43601 +## <param name="domain">
43602 +## <summary>
43603 +## Domain to not audit.
43604 +## </summary>
43605 +## </param>
43606 +## <infoflow type="none"/>
43607 +#
43608 +interface(`corenet_dontaudit_send_ntske_server_packets',`
43609 + gen_require(`
43610 + type ntske_server_packet_t;
43611 + ')
43612 +
43613 + dontaudit $1 ntske_server_packet_t:packet send;
43614 +')
43615 +
43616 +########################################
43617 +## <summary>
43618 +## Receive ntske_server packets.
43619 +## </summary>
43620 +## <param name="domain">
43621 +## <summary>
43622 +## Domain allowed access.
43623 +## </summary>
43624 +## </param>
43625 +## <infoflow type="read" weight="10"/>
43626 +#
43627 +interface(`corenet_receive_ntske_server_packets',`
43628 + gen_require(`
43629 + type ntske_server_packet_t;
43630 + ')
43631 +
43632 + allow $1 ntske_server_packet_t:packet recv;
43633 +')
43634 +
43635 +########################################
43636 +## <summary>
43637 +## Do not audit attempts to receive ntske_server packets.
43638 +## </summary>
43639 +## <param name="domain">
43640 +## <summary>
43641 +## Domain allowed access.
43642 +## </summary>
43643 +## </param>
43644 +## <infoflow type="none"/>
43645 +#
43646 +interface(`corenet_dontaudit_receive_ntske_server_packets',`
43647 + gen_require(`
43648 + type ntske_server_packet_t;
43649 + ')
43650 +
43651 + dontaudit $1 ntske_server_packet_t:packet recv;
43652 +')
43653 +
43654 +########################################
43655 +## <summary>
43656 +## Send and receive ntske_server packets.
43657 +## </summary>
43658 +## <param name="domain">
43659 +## <summary>
43660 +## Domain allowed access.
43661 +## </summary>
43662 +## </param>
43663 +## <infoflow type="both" weight="10"/>
43664 +#
43665 +interface(`corenet_sendrecv_ntske_server_packets',`
43666 + corenet_send_ntske_server_packets($1)
43667 + corenet_receive_ntske_server_packets($1)
43668 +')
43669 +
43670 +########################################
43671 +## <summary>
43672 +## Do not audit attempts to send and receive ntske_server packets.
43673 +## </summary>
43674 +## <param name="domain">
43675 +## <summary>
43676 +## Domain to not audit.
43677 +## </summary>
43678 +## </param>
43679 +## <infoflow type="none"/>
43680 +#
43681 +interface(`corenet_dontaudit_sendrecv_ntske_server_packets',`
43682 + corenet_dontaudit_send_ntske_server_packets($1)
43683 + corenet_dontaudit_receive_ntske_server_packets($1)
43684 +')
43685 +
43686 +########################################
43687 +## <summary>
43688 +## Relabel packets to ntske_server the packet type.
43689 +## </summary>
43690 +## <param name="domain">
43691 +## <summary>
43692 +## Domain allowed access.
43693 +## </summary>
43694 +## </param>
43695 +#
43696 +interface(`corenet_relabelto_ntske_server_packets',`
43697 + gen_require(`
43698 + type ntske_server_packet_t;
43699 + ')
43700 +
43701 + allow $1 ntske_server_packet_t:packet relabelto;
43702 +')
43703 +
43704 +
43705 +
43706 +
43707 ########################################
43708 ## <summary>
43709 ## Send and receive TCP traffic on the oa_system port.
43710
43711 diff --git a/policy/modules/kernel/corenetwork.te b/policy/modules/kernel/corenetwork.te
43712 index 372deb5b..7632e589 100644
43713 --- a/policy/modules/kernel/corenetwork.te
43714 +++ b/policy/modules/kernel/corenetwork.te
43715 @@ -2,7 +2,7 @@
43716 # This is a generated file! Instead of modifying this file, the
43717 # corenetwork.te.in or corenetwork.te.m4 file should be modified.
43718 #
43719 -policy_module(corenetwork, 1.29.0)
43720 +policy_module(corenetwork)
43721
43722 ########################################
43723 #
43724 @@ -36,6 +36,11 @@ dev_node(ppp_device_t)
43725 type tun_tap_device_t;
43726 dev_node(tun_tap_device_t)
43727
43728 +# double quotes needed here to avoid a build error
43729 +optional_policy(`
43730 + container_mountpoint(tun_tap_device_t)
43731 +')
43732 +
43733 ########################################
43734 #
43735 # Ports and packets
43736 @@ -59,6 +64,7 @@ type icmp_packet_t, packet_type;
43737 #
43738 type netlabel_peer_t;
43739 sid netmsg gen_context(system_u:object_r:netlabel_peer_t,mls_systemhigh)
43740 +mcs_constrained(netlabel_peer_t)
43741
43742 #
43743 # port_t is the default type of INET port numbers.
43744 @@ -1162,6 +1168,13 @@ typeattribute ntp_port_t reserved_port_type;
43745 portcon udp 123 gen_context(system_u:object_r:ntp_port_t,s0)
43746
43747
43748 +type ntske_port_t, port_type, defined_port_type;
43749 +type ntske_client_packet_t, packet_type, client_packet_type;
43750 +type ntske_server_packet_t, packet_type, server_packet_type;
43751 +typeattribute ntske_port_t unreserved_port_type;
43752 +portcon tcp 4460 gen_context(system_u:object_r:ntske_port_t,s0)
43753 +
43754 +
43755 type oa_system_port_t, port_type, defined_port_type;
43756 type oa_system_client_packet_t, packet_type, client_packet_type;
43757 type oa_system_server_packet_t, packet_type, server_packet_type;